1.9 The Legal Framework In this section you must be able to:

Slides:



Advertisements
Similar presentations
Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Advertisements

Data Protection Information Management / Jody McKenzie.
The Data Protection (Jersey) Law 2005.
Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
Legislation in ICT.
University of Sunderland Professionalism and Personal Skills Unit 11 Professionalism and Personal Skills Computer Legislation.
Legislation Who governs e-commerce?. E-commerce is regulated by laws and guidelines. These aim to ensure that sites operate effectively and that online.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Data Protection Act.
Data Protection Act Description The Data Protection Act controls how your personal information can be used and protects from the misuse of your.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Data Protection Overview
The Data Protection Act
Data Protection Act. Lesson Objectives To understand the data protection act.
The Legal Framework Can you work out which slide each bullet point should go on?!
Regulation of Personal Information Daniel Pettitt, Leon Sewell and Matthew Pallot.
General Purpose Packages
Data Protection and You Your Rights & The Law Registration Basics Other Activities Disclaimer: This presentation only provides an introductory info. Please.
3.4 Legal Implications. Overview Demonstrate knowledge and understanding of the Computer Misuse Act. Describe the roles of the BBFC (British Board of.
Elma Graham. To understand what data protection is To reflect on how data protection affects you To consider how you would safeguard the data of others.
The Data Protection Act 1998 The Eight Principles.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
Data Protection: An enabler? David Freeland, Senior Policy Officer 23 October 2014.
Data Protection Act AS Module Heathcote Ch. 12.
Data Protection Act & Freedom of Information Simon Mansell Corporate Governance and Information Team.
Data Protection Corporate training Data Protection Act 1998 Replaces DPA 1994 EC directive 94/46/EC The Information Commissioner The courts.
The Data Protection Act - Confidentiality and Associated Problems.
DATA PROTECTION ACT 1998 Became law on 1 March 2000 Only applies to the use of personal data, that is data which relates to an identifiable living individual,
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
The Data Protection Act What the Act covers The misuse of personal data by organisations and businesses.
Introduction Data protection is relevant to every individual, business or organisation today, not just Local Government. As well as protecting privacy,
Data Protection - Rights & Responsibilities Information Commissioner’s Office Orkney Practice Forum 4 th July 2007.
THE DATA PROTECTION ACT Data Protection Act 1998 DPA 1. Reasons2. People3. Principles 4. Exemptions 4 key points you need to learn/understand/revise.
LEGISLATION. DATA PROTECTION ACT (1998) The aim of this act give people the right to know what information is held about them. It also sets out rules.
Information Systems Unit 3.
Legal Implications You need to know about the following:
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
DATA PROTECTION ACT (DPA). WHAT IS THE DATA PROTECTION ACT?  The Data Protection Act The Data Protection Act (DPA) gives individuals the right.
DATA PROTECTION ACT INTRODUCTION The Data Protection Act 1998 came into force on the 1 st March It is more far reaching than its predecessor,
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
DATA PROTECTION ACT DATA PROTECTION ACT  Gives rights to data subjects (i.e. people who have data stored about them on a computer)  Information.
ICT and the Law You need to know about 3 laws covering the use and misuse of ICT.
Data protection—training materials [Name and details of speaker]
Presented by Ms. Teki Akuetteh LLM (IT and Telecom Law) 16/07/2013Data Protection Act, 2012: A call for Action1.
ICT, Communication & related Legislations. Produced by Neil Liggett. Acts of Law – shared data & information.
Introduction to Data Protection Plan »Brief Introduction to Data Protection  Example  Principles  P3, 4, 7  Sensitive Data  Conditions for Processing.
Data Protection Laws in the European Union John Armstrong CMS Cameron McKenna.
The Data Protection Act 1998
The Data Protection Act 1998
Learning Intention Legislations impact on security of information
Handout 2: Data Protection and Copyright
Legislation in ICT.
Data Protection Act.
The Data Protection Act 1998
Data Protection Legislation
G.D.P.R General Data Protection Regulations
Legal and Ethical Issues
Legislation in ICT.
Presentation transcript:

1.9 The Legal Framework In this section you must be able to: Describe the provisions of the Computer Misuse Act. Describe the principles of software copyright and licensing agreements. Recall the nature, purpose and provisions of the current data protection legislation – rights, duties, exemptions, etc.

New Crimes Made Possible by ICT New technology has created opportunities for crime: Software piracy (copying software illegally to sell) Hacking (unauthorised access to computer systems) Creation and distribution of viruses Distributing pornographic and other obscene material Fraudulent trading Credit card fraud Terrorist activity and blackmail

Abuse of ICT There are also opportunities for the abuse of ICT: Sending unsolicited e-mails (now an offence in some countries) Creating inappropriate or misleading web-sites Registering a domain that might appear to belong to someone else – “cyber-squatting” Inappropriate use of ICT is not necessarily illegal. It’s important to distinguish between: Unethical use of ICT – i.e. morally questionable Criminal activity – i.e. an offence under the various laws covering use of ICT

Where do Laws Come From? There are three sources of law: Case law – i.e. judges’ rulings in court cases Acts of Parliament – e.g. Data Protection Act European laws & directives – e.g. VDU use Laws change for many reasons: Social and political pressure – e.g. dangerous dogs Reaction to specific cases – e.g. Gold & Shiffreen Combinations and clarifications of previous laws To close loopholes – e.g. “making off” and hacking

Laws Affecting ICT There are various laws covering use of ICT Computer Misuse Act 1990 Data Protection Act 1984 & 1998 Copyright, Designs and Patents Act 1988 European VDU & health directive 1992 Plus, more general guidelines such as: Health and Safety legislation Offices, Shops and Railways Act 1963 Contract law – shink-wrap agreement controversy! Plus what about things such as professional advice given by a computer?

Computer Misuse Act In 1988 two teenagers “hacked” the Duke of Edinburgh’s e-mail account and changed a message They were taken to court, but hadn’t actually committed an offence (there was no theft and no fraud committed) People also started getting worried about viruses, which had started to appear in 1986 In response, the government introduced the Computer Misuse Act in 1990

Computer Misuse Act Under the CMA there are three offences: Unauthorised access to computer programs or data Unauthorised access with further criminal intent Unauthorised modification of computer material (programs or data) However… Unauthorised access can be difficult to detect The first people to be prosecuted (in 1997) were caught when boasting about their crime!

Computer Misuse Act The CMA therefore protects us against: Hacking Theft and Fraud “Logic Bombs” “Denial of Service” attacks Viruses could commit offences at different levels depending on the payload: Some display harmless messages Some are deliberately malicious Some are unintentionally dangerous

Other Measures to Prevent Misuse Other steps can be taken to prevent misuse. JavaScript, for example, was created with computer misuse in mind and was designed to prevent it being used to create viruses: JavaScript cannot write directly to discs (other than cookies) and so cannot delete or change any files There is no direct access to memory or to other hardware

Copyright and Patent Patents cover the ideas and concepts on which products or services operate: You can only patent software that performs a technical function – e.g. an encryption algorithm You can’t patent software that performs a human function, such as translating English to French Copyright covers the implementation of the idea – the actual words, images and sounds that you use

Copyright, Designs and Patents Act Under this act it is illegal to: Copy software Run pirated software Transmit software over a telecommunications link (thereby copying it) The act is enforced by FAST – the Federation Against Software Theft (also FACT for general copyright) The enforcement is complicated by: The confusion between copyright and patent Whether you can copyright a “look and feel” Contracts such as licensing and acceptable use agreements

Using Computers to Combat Crime Computers can also be used to solve crimes: The Police National Computer (PNC) now allows forces across the country to share information Number-plate recognition can be used to identify people committing motoring offences Mobile phone records can be used to locate criminals and victims of crime Audit logs and records of e-mails and network traffic could be used as evidence

Data Protection We all have a right to privacy There might be a variety of reasons why you’d want to keep something private: It might be possible to using the information for fraudulent purposes The information might be of a sensitive nature, such as medical records You might just not want people to know! The Data Protection Act is to protect privacy

Data Protection Act The Data Protection Act… Was introduced in 1984 and updated in 1998 to create a standard for data protection across Europe Originally covered personal data that are automatically processed but now covers some manual records as well Defines the terms data subject (the person about whom data is held) and data controller (called data user in the 1984 version) Requires that all data controllers (and the nature of the processing they do) must be recorded on the public register of data controllers Is overseen by the Information Commissioner

Data Protection Act – Eight Principles Under the Data Protection Act, data must be… fairly and lawfully processed; processed for limited purposes and not in any manner incompatible with those purposes; adequate, relevant and not excessive; accurate; not kept for longer than is necessary; processed in line with the data subject's rights; secure; not transferred to countries without adequate protection.

Processing Personal Data Personal data covers both facts and opinions about the individual. It also includes information regarding the intentions of the data controller towards the individual. Processing can only be carried out where: the individual has given his or her consent; the processing is necessary for the performance of a contract with the individual; the processing is required under a legal obligation; the processing is necessary to protect the vital interests of the individual; the processing is necessary to carry out public functions; the processing is necessary in order to pursue the legitimate interests of the data controller or third parties

Data Protection Act – What Else? It covers any information recorded as part of a “relevant filing system” – i.e. information that is “readily accessible” Data controllers must take security measures to safeguard personal data – i.e. to prevent unlawful processing or disclosure There are certain exemptions from the DPA Data subjects have rights that are defined in the act

DPA – The Rights of Individuals If data are held about you, you are entitled to be… given a description of the data told for what purposes the data are processed told the recipients or the classes of recipients to whom the data may have been disclosed given a copy of the information with any unintelligible terms explained given any information available to the controller about the source of the data given an explanation as to how any automated decisions taken about you have been made

DPA – The Rights of Individuals Further rights include: The right to access the data held – within 40 days and at a cost of no more than £10 for computer records and £50 for paper records The right to rectify, block, erase or destroy details that are inaccurate, or opinions based on inaccurate data The right not to have your details used for direct marketing The right to compensation for damage caused if the Data Protection Act is breached

Exemptions from the DPA The Act does not apply to: Payroll, pensions and accounts data Names and addresses held for distribution purposes Personal, family, household of recreational use Data can be disclosed to an agent of the subject, or in response to a medical emergency Use of data in cases dealing with national security, the prevention of crime, or the collection of taxes & duty

Criminal Offences under the DPA Notification offences – where the data controller fails to notify the commissioner of processing or changes to processing Procuring and selling offences – disclosing, selling or obtaining data without authorisation Enforced access offences – e.g. you can’t make someone make an access request as a condition of employment Other – such as failure to respond to a request or to breach an enforcement notice

Freedom of Information Act Covers all types of 'recorded' information held by public authorities Covers personal and non-personal data Public authorities include: Government Departments local authorities NHS bodies schools, colleges and universities the Police Parliament The Post Office The National Gallery The Parole Board Plus lots, lots more!