Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.

Slides:



Advertisements
Similar presentations
Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Advertisements

Administrative Systems and the Law What you need to know to produce an oral presentation for Unit 7 When the presentations will take place Resources you.
Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Legislation in ICT.
University of Sunderland Professionalism and Personal Skills Unit 11 Professionalism and Personal Skills Computer Legislation.
Data Protection Act.
Data Protection Act Description The Data Protection Act controls how your personal information can be used and protects from the misuse of your.
The Data Protection Act
Data Protection Act. Lesson Objectives To understand the data protection act.
The Legal Framework Can you work out which slide each bullet point should go on?!
1 AQA ICT AS Level © Nelson Thornes Data Protection Act.
General Purpose Packages
3.4 Legal Implications. Overview Demonstrate knowledge and understanding of the Computer Misuse Act. Describe the roles of the BBFC (British Board of.
Elma Graham. To understand what data protection is To reflect on how data protection affects you To consider how you would safeguard the data of others.
© Copyright © A Quick Guide. What does the law actually say? Introduced to protect people who have created original pieces of work. Books, Music, Films,
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
The Data Protection Act (1998). The Data Protection Act allows you to Check if any organisation keeps information about you on computer or in paper form.
What is personal data? Personal data is data about an individual which they consider to be private.
The Data Protection Act By Ian Hughes Data should not be kept longer than is necessary for the specified purpose. Data processing should meet the.
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
Data Protection Act (1984, 1998). 2 Data Protection Act There are many organisations which hold personal information about individuals Examples: Loyalty.
Everyone has a duty to comply with the Act, including employers, employees, trainees, self-employed, manufacturers, suppliers, designers, importers of.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
The Data Protection Act What the Act covers The misuse of personal data by organisations and businesses.
Computing and Information Science 1 Databases START.
THE DATA PROTECTION ACT Data Protection Act 1998 DPA 1. Reasons2. People3. Principles 4. Exemptions 4 key points you need to learn/understand/revise.
Data Protection Act (1998).
Legal Implications You need to know about the following:
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Laws related to ICT   There are 4 laws that you might be asked about in the exams: Health & Safety at Work Act The Computer Misuse Act 1990 The Copyright,
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Computing, Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
DATA PROTECTION ACT (DPA). WHAT IS THE DATA PROTECTION ACT?  The Data Protection Act The Data Protection Act (DPA) gives individuals the right.
What is the Data Protection Act (DPA)? 1998 The Data Protection Act 1998 seeks to strike a balance between the rights of individuals and the sometimes.
Computing, Ethics and The Law
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
DATA PROTECTION ACT DATA PROTECTION ACT  Gives rights to data subjects (i.e. people who have data stored about them on a computer)  Information.
ICT and the Law You need to know about 3 laws covering the use and misuse of ICT.
Computing and Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
Data protection act. During the second half of the 20th century, businesses, organisations and the government began using computers to store information.
The Data Protection Act 1998
The Data Protection Act 1998
Learning Intention Legislations impact on security of information
Data Protection GCSE ICT Mrs N Steventon-2005.
Handout 2: Data Protection and Copyright
Legislation in ICT.
Data Protection Act.
TB2 Lesson 5 Data Protection
The Data Protection Act 1998
Understanding the issues related to the use of information
The Data Protection Act & ICT Law
Data Protection Act.
Legal and Ethical Issues
What is the Data Protection Act (DPA)? 1998
Legislation in ICT.
Data Protection.
Copyright, Design and Patents Act (1988)
Presentation transcript:

Legislation in ICT

Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data Protection Act? Data Protection Act: What rights do we have? What is an Information Commissioner, Data Controller and Data Subject? Are there any exemptions to the Data Protection Act?

Data Protection Act (1998) What is it and why was it created? The Data Protection Act was developed to give protection and lay down the rules about how personal data can be used. It was created to protect individuals from misuse of this data. It governs the collection and processing of data by organisations and the individual rights to access the data if they wish.

Data Protection Act (1998) What are the eight principles of it? 1. Data must be kept secure; 2. Data stored must be relevant; 3. Data stored must be kept no longer than necessary; 4. Data stored must be kept accurate and up-to-date; 5. Data must be obtained and processed lawfully; 6. Data must be processed within the data subject rights; 7. Data must be obtained and specified for lawful purposes; 8. Data must not be transferred to countries without adequate data protection laws.

Data Protection Act (1998) What rights do we have as data subjects? To be supplied with the data held about us; To change incorrect data; To prevent data being used about us if it will cause distress; To stop data being used in attempts to sell us something; To use the law to gain compensation.

Data Protection Act (1998) What is an Information Commissioner, Data Controller and Data Subject? Information Commissioner: Person who has the power to enforce the Act. Data Controller: Person or Company that collects and keeps data about people. Data Subject: Person who has data about them stored outside their direct control.

Data Protection Act (1998) Are there any exemptions to the Data Protection Act? Any data held for National Security reasons e.g. MI5 Police can access personal information in order to solve crimes. The taxman can access personal information to ensure people pay their tax! Any data held for domestic purposes at home e.g. birthday lists, address books.

Computer Misuse Act (1990) What is the Computer Misuse Act (1990) and why was it created? What are the three principles of the Computer Misuse Act?

Computer Misuse Act (1990) What is it and why was it created? The Computer Misuse Act (1990) was developed to cope with the problems of computer hackers and viruses. Hacker: Unauthorised user who attempts to or gains access to an information system Virus: A virus is a program written to cause mischief or damage to a computer system.

Computer Misuse Act (1990) What are the three principles of the Act? 1. It is illegal to access unauthorised data e.g. Hacking. 2. It is illegal to access unauthorised data and intend to do it again e.g. Blackmail and fraud purposes. 3. It is illegal to access unauthorised data and amend it e.g. Planting Viruses and deleting files.

Copyright, Design and Patents Act (1988) Introduced to protect people who have created original pieces of work. Books, Music, Films, Games, Applications. 2 main purposes of the Act: To ensure people are rewarded for their endeavours. To give protection to the copyright holder if someone tries to steal their work.

Copyright, Design and Patents Act (1988) The Act protects a wide range of work… written and computer based. Includes: Copying Software; Copying or Downloading music; Copying images or photographs from the Web; Copying text from web pages.