Computer Legislation The need for computer laws Go to Contents.

Slides:



Advertisements
Similar presentations
I. Positive IT has had a massive impact in the last 40 years. People rely on using technology to stay in touch with people. Technology has had a positive.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Northside I.S.D. Acceptable Use Policy
Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Hart District Acceptable Use Policy Acceptable Use Policy.
Administrative Systems and the Law What you need to know to produce an oral presentation for Unit 7 When the presentations will take place Resources you.
Woodland Hills School District Computer Network Acceptable Use Policy.
Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
Legislation in ICT.
Higher Administration and IT Administrative Practices.
1 Pertemuan 7 Points of Exposure Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
University of Sunderland Professionalism and Personal Skills Unit 11 Professionalism and Personal Skills Computer Legislation.
Legalities of ICT Chapter 7.
Health and Safety Legislation
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
 The Data Protection Act 1998 is an Act of Parliament which defines UK law on the processing of data on identifiable living people and it is the main.
The Legal Framework Can you work out which slide each bullet point should go on?!
1 AQA ICT AS Level © Nelson Thornes Data Protection Act.
General Purpose Packages
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
G041: Lecture 16 Section B Revision Questions
Computer Law University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and Information.
3.4 Legal Implications. Overview Demonstrate knowledge and understanding of the Computer Misuse Act. Describe the roles of the BBFC (British Board of.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
ACPS Acceptable Use Policy Grades 3-5. A Good Technology User: Uses the computer and other technology with good intentions and for educational purposes.
13.6 Legal Aspects Corporate IT Security Policy. Objectives Understand the need for a corporate information technology security policy and its role within.
Code of Conduct 344 Code of Conduct 344. Code of Conduct 344 Introduction; Do you agree with the following statements? Employers need their employees.
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
Data Protection Act (1984, 1998). 2 Data Protection Act There are many organisations which hold personal information about individuals Examples: Loyalty.
ACCEPTABLE INTERNET USE POLICY BY: BRANDON POLK, SUBHAN NADEEM.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
Internet Safety Internet Safety LPM
ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 0 – Introduction School of Computer.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Information Systems Unit 3.
Legal Implications You need to know about the following:
Human Rights Act, Privacy in the context of auditing Phil Huggins Chief Technologist, IRM PLC
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
Welcome to the ICT Department Unit 3_4 Code of Conduct.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
Computing, Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
Woodland Hills School District Computer Network Acceptable Use Policy.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Computing, Ethics and The Law
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Implementation of legislation (Chapter 47) By Haley Court.
DATA PROTECTION ACT DATA PROTECTION ACT  Gives rights to data subjects (i.e. people who have data stored about them on a computer)  Information.
Computing and Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
Data protection act. During the second half of the 20th century, businesses, organisations and the government began using computers to store information.
Data Protection Act and Other Laws
Legislation in ICT.
TB2 Lesson 5 Data Protection
Regulation of Investigatory Powers Act 2000
Understanding the issues related to the use of information
Learning Area 1 Information And Communication Technology and Society
EU REGULATIONS PERTAINING TO CONTAMINATED LAND
Identify the laws and guidelines that affect day-to-day use of IT.
Legal and Ethical Issues
Legislation in ICT.
How it affects policies and procedures
Communicating in the IT Industry
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

Computer Legislation The need for computer laws Go to Contents

Contents Why do we need computer laws? Who do the laws affect? What protection do the laws offer? What protection do the laws offer? What aspect of using ICT is affected? EU regulations on the use of computers. Internet code of practice. Internet code of practice.

Why do we need computer laws? In the 1960s it was realised that data processing on computers could affect people’s liberties and privacy. It was also realised that with different laws in different countries, international trade and business could be affected.

Who do the laws affect? The data protection laws are designed to protect all people who have personal data about them stored on computer. The computer misuse laws are designed to prevent ‘hackers’ breaking into other people’s computers, and to prosecute those who try to damage data on other computers. The computer safety laws are designed to prevent workers suffering from computer related illnesses. The copyright laws protect the intellectual work of people. The Regulation of Investigatory Powers Act (RIPA) was designed to prevent criminals and terrorists communicating electronically.

What protection do the laws offer? The data protection act, the safety laws and the copyright laws are designed to protect individual people. The computer misuse laws and the RIPA are designed to protect individual people, organisations and the state as a whole.

What aspect of using ICT is affected? These laws are mainly concerned with the safety, storage and movement of computer data. The main idea of these laws is to protect the data from unauthorised users. The exception is the RIPA which allows government to view data to make sure that it is not being used for criminal purposes.

EU regulations on the use of computers. Most of the computer laws have come out of the EU Data Protection Directive (1995), which was designed to make all the European EU countries have computer laws that were more or less the same. More on the Data Protection Directive Go to the Anti-Spam Directive

Internet code of practice. This is a set of rules that students should follow in their place of study. You should not:- Receive, send or display offensive messages or pictures on any computer Access undesirable material Violate copyright laws Use other people’s passwords Gamble online Carry out a commercial business

EU Data Protection Directive (1995) There are two basic statements in this directive: All organisations that collect, store and use personal data (data users) must be registered with their country’s data protection registrar. The data must follow these guidelines: – The data must be collected fairly and lawfully. – The data must be used for the purpose that it was collected for. – The data must be kept secure. – The data must not be kept any longer than necessary. – Only the data needed must be collected.

EU anti-spam directive (2003) This directive tells member countries to make: sending spam from inside the EU illegal. using Spyware illegal. using unauthorized digital tracking illegal.