Legislation Who governs e-commerce?. E-commerce is regulated by laws and guidelines. These aim to ensure that sites operate effectively and that online.

Slides:



Advertisements
Similar presentations
By Andy Scott, Michael Murray and Adam Kanopa
Advertisements

Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Data Protection Information Management / Jody McKenzie.
CHAPTER 4 E-ENVIRONMENT
Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Legislation in ICT.
Security, Privacy, and Ethics Online Computer Crimes.
Consumers Online: Privacy, Security and Identity Professor Margaret Jackson and Marita Shelly Presentation to the RMIT Financial Literacy, Banking & Identity.
Introduction to the APPs and the OAIC’s regulatory approach Presented by: Este Darin-Cooper Director, Regulation and Strategy May 2015.
Legalities of ICT Chapter 7.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Data Protection Act.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Data Protection Overview
 The Data Protection Act 1998 is an Act of Parliament which defines UK law on the processing of data on identifiable living people and it is the main.
The Legal Framework Can you work out which slide each bullet point should go on?!
CENTRAL SCOTLAND POLICE Data Protection & Information Security Stuart Macfarlane Information Governance Unit Police Service of Scotland.
Higher Administration
Limitations and Constraints on Marketing (1)
General Purpose Packages
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
E-commerce Law Consumer Protection. This lecture will examine legislation protecting consumers. We will look specifically at: –Consumer Protection (Distance.
Legislation For e-commerce to operate correctly, it needs to adhere to the relevant legislation. These laws protect both the business and the consumer.
CLOUD AND SECURITY: A LEGISLATOR'S PERSPECTIVE 6/7/2013.
Law Additional Exercise ANSWERS. Question #1 (a) Any one of: gain unauthorised access (1st) to computer material (1) gain (unauthorised) access to computer.
Computers, the law and ethics  Lesson Objective: Understand some of the legal & ethical issues in developing computer systems  Learning Outcome: Know.
3.4 Legal Implications. Overview Demonstrate knowledge and understanding of the Computer Misuse Act. Describe the roles of the BBFC (British Board of.
Computer Legislation The need for computer laws Go to Contents.
Crime & Malpractice AS Module Heathcote Ch. 10.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
Data Protection Act 171 Computers and privacy There are problems as more computers are used There are problems as more computers are used More and more.
Data Protection Act AS Module Heathcote Ch. 12.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
Everyone has a duty to comply with the Act, including employers, employees, trainees, self-employed, manufacturers, suppliers, designers, importers of.
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
The Data Protection Act What the Act covers The misuse of personal data by organisations and businesses.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
LEGISLATION. DATA PROTECTION ACT (1998) The aim of this act give people the right to know what information is held about them. It also sets out rules.
Information Systems Unit 3.
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Computing, Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
Computing, Ethics and The Law
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
ICT and the Law You need to know about 3 laws covering the use and misuse of ICT.
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
1 AQA ICT AS Level © Nelson Thornes Safety and security Chip and Pin.
[ Direct marketing – an introduction to data protection and privacy] For [insert name of organisation] presented by [insert name of presenter] on [date]
BTEC ICT Level 3 Unit 8 E-Commerce
The Data Protection Act 1998
Learning Intention Legislations impact on security of information
Legislation in ICT.
TB2 Lesson 5 Data Protection
The Data Protection Act 1998
Regulation of Investigatory Powers Act 2000
Data Protection Legislation
Understanding the issues related to the use of information
BTEC ICT Level 3 Unit 8 E-Commerce
Presentation transcript:

Legislation Who governs e-commerce?

E-commerce is regulated by laws and guidelines. These aim to ensure that sites operate effectively and that online trading is fair and lawful. These laws protect both the business and the consumer. All the legislation discussed in this section relates to the UK only. Data Protection Act (1998) The Data Protection Act (1998) was designed to protect sensitive data held in databases. It was originally passed in 1984, with an update in 1998 which was brought into effect in It is upheld by the Information Commissioner. Every business that stores data electronically, for example, information about customers, must register and state the data that they plan to hold.

There are eight principles in the Act The data subject is the person to whom the data refers. Under the Act, the data subject has several specific rights, including: the right to compensation for unauthorised disclosure of data the right to compensation for unauthorised inaccurate data the right to access data and apply for verification or erasure where it is inaccurate the right to compensation for unauthorised access, loss or destruction.

Activity Visit Ico.org This is the website of the Information Commissioner's Office. Find more information on each principle of the Data Protection Act and make notes: What might an e-commerce site do that would contravene the rules of the Data. Protection Act? What would happen if they did?

Computer Misuse Act (1990) The Data Protection Act was designed to protect sensitive data stored on computers, but there was no legislation to prosecute those who hacked or attacked computer systems with viruses. Toward s the end of the 1980s, with the increase o f computer use, it was becoming necessary to legislate against these serious problems. The Computer Misuse Act (1990) introduced three new offences: un authorised access t o computer programs or data un authorised access with the intent to commit further offences un authorised modification of computer material (for example prog ra ms or data). The Act makes a distinction between computer misuse and computer abuse. Computer misuse- an illegal act involving a computer. Computer abuse- a legal, but un ethical act, involving a computer.

Consumer Credit Act 1974 Customers paying by credit card are protected by the Consumer Credit Act for payments up to £25,000. So, if a payment cannot be made by the customer, the business will still receive the money from the bank and can therefore confidently send out the products purchased. The Act also guarantees a cooling-off period during which customers can change their mind about a purchase- for mail order goods the cooling-off period is 14 days. This is good for the customer, but can be disadvantageous to a company as it means that, even after a purchase has been completed, there is the possibility of the customer asking for a refund.

Trading Standards The Trading Standards Institute works with consumers and businesses to maintain fair trading. It is part of local government and ensures that legislation is enforced, such as the: Trade Descriptions Act (1968) Consumer Protection Act (1987) Price Marking Order (2004) The Trading Standards Institute also deals with issues such as counterfeit goods, the sale of alcohol and tobacco to underage persons and the exploitation of vulnerable consumers from seams and doorstep crime. E- commerce websites must clearly describe their products. This is especially important because customers can only see pictures of the products before purchasing, not the items themselves.

Freedom of Information Act (2000) This Act gives the public the 'right to know'. The public can request information about public bodies, such as the government, and legal entities, such as businesses. Copyright Legislation The Copyright, Designs and Patents Act (1988) protects all works such as music, art, writing and programming code once it is tangible, which means in a fixed form. As the Internet has grown, the question of whether websites are subject to protection under copyright has often been discussed. It is now accepted that a website becomes tangible once it is coded and saved on to storage media, especially if the source code is also printed. Websites are therefore protected by copyright.

Activity Find more information about the rights the Freedom of Information Act gives to members of the public. Make notes. Can members of the public obtain any information or are there restrictions? What information can people obtain from e-commerce businesses?

E-commerce regulations The Electronic Commerce Regulations (2002) specified several rights to ensure fair trading through e-commerce sites, including: The business should provide information about itself such as its name, its geographic location and a method of contact Communications cannot be sent unless the sender is easily identifiable and that any offer or promotion is unambiguous When an order is placed, the business must acknowledge the receipt of the order by electronic means without delay Allowing a customer to correct misplaced orders, such as typing in 100 instead of 10.