The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.

Slides:



Advertisements
Similar presentations
I. Positive IT has had a massive impact in the last 40 years. People rely on using technology to stay in touch with people. Technology has had a positive.
Advertisements

Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Administrative Systems and the Law What you need to know to produce an oral presentation for Unit 7 When the presentations will take place Resources you.
Unit 4- Assignment 3 P5, P6, M2 BTEC Business Level 3.
Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
Legislation in ICT.
Higher Administration and IT Administrative Practices.
Software Copyright. Learning Objectives: By the end of this topic you should be able to:
Health and Safety Legislation
Health and Safety.
Copyright, Designs and Patents Act. Introduction You have spent three months working on your coursework. It is absolutely brilliant,, you just know that.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
The Data Protection Act The Data Protection Act controls how your personal information is used by organisations, businesses or the government. Everyone.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
The Legal Framework Can you work out which slide each bullet point should go on?!
Administrative Practices Outcome 1
General Purpose Packages
Law Additional Exercise ANSWERS. Question #1 (a) Any one of: gain unauthorised access (1st) to computer material (1) gain (unauthorised) access to computer.
3.4 Legal Implications. Overview Demonstrate knowledge and understanding of the Computer Misuse Act. Describe the roles of the BBFC (British Board of.
Department of Consumer and Employment Protection Resources Safety 1 Please read this before using presentation This presentation is based on content presented.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
The Four Laws relating to ICT Health and safety Data protection act Copyright Computer misuse act By Marcus Ellis.
The Data Protection Act (1998). The Data Protection Act allows you to Check if any organisation keeps information about you on computer or in paper form.
Data Protection Corporate training Data Protection Act 1998 Replaces DPA 1994 EC directive 94/46/EC The Information Commissioner The courts.
The Data Protection Act By Ian Hughes Data should not be kept longer than is necessary for the specified purpose. Data processing should meet the.
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Federation Against Software Theft. What Is Copyright? What is copyright infringement? What are the penalties for copyright infringement? What is a trade.
Everyone has a duty to comply with the Act, including employers, employees, trainees, self-employed, manufacturers, suppliers, designers, importers of.
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
Computing and Information Science 1 Databases START.
12/12/2015 Data Protection Act /12/2015 The DP Act A law that protects personal privacy and upholds individual’s rights Anyone who handles personal.
LEGISLATION. DATA PROTECTION ACT (1998) The aim of this act give people the right to know what information is held about them. It also sets out rules.
Information Systems Unit 3.
» The Health and Safety at Work etc. Act 1974 is the primary piece of legislation covering occupational health and safety in the United Kingdom. » The.
Legal Implications You need to know about the following:
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Legal duties of employer and employees Health & Safety legislation has recently grown. Initially it was introduced in response to accidents that involved.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Laws related to ICT   There are 4 laws that you might be asked about in the exams: Health & Safety at Work Act The Computer Misuse Act 1990 The Copyright,
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Computing, Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
Computing, Ethics and The Law
Copyright. What is Copyright? Copyright is a form of legal protection for the creator of a piece of work. It gives the creator (an author, composer, artist,
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
ICT and the Law You need to know about 3 laws covering the use and misuse of ICT.
Business Ethics and Social Responsibility GCSE Business and Communication Systems Business and Communication Systems.
Computing and Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
Data protection act. During the second half of the 20th century, businesses, organisations and the government began using computers to store information.
Learning Intention Legislations impact on security of information
WORKPLACE LEGISLATION
PowerPoint presentation
Data Protection Act and Other Laws
Handout 2: Data Protection and Copyright
Legislation in ICT.
Unit 7 – Organisational Systems Security
Legal and Ethical Issues
Legislation in ICT.
How it affects policies and procedures
Presentation transcript:

The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8 million employees had no legal safety protection at their workplace. Safety is everybody’s responsibility. The employees and organisations must comply with the following rules for the health and safety system to work. 1.To provide adequate control of the health and safety risks that appear from work activities. 2. To consult with employees or colleagues with the matters affecting their health and safety 3. To maintain safe and healthy working conditions. 4. To provide information, instruction and supervision for their workplace.

5. To ensure staff are aware of instructions provided off the suppliers or manufacturers of the equipment being used. 6. To ensure safe handling and use of substances. 7. To avoid accidents and cases of work – related ill health. 8. To ensure that all employees are able to do their tasks i.e. to ensure that employees can cope with the duties the job entails. This will be done through adequate training. 9. Employers should ensure that there are adequate training schemes in operation to ensure that employees are given the correct safety training for the equipment they use and the environment in which this equipment is situated.

The computer Misuse act 1990 is a law in the United Kingdom that makes illegal activities such has hacking into other peoples systems, the misusing of software and helping other people access protected files of someone else’s computer serious crimes. The computer misuse act allows people to be prosecuted if they commit one of the following crimes- Unauthorised access to certain computer material for example copying programmes illegally. Unauthorised access with intent to commit a crime. To gain unauthorised access data for blackmail purposes. This mostly relates to the hacking and dispensing viruses. Although other computer offences can be attempted in this act.

The Copyright act makes it illegal to copy and use a file or software without the owners permission. The consequences if you are found guilty of breaking the rules of this act are up to 5 years imprisonment and a hefty fine. Several other countries have based their own acts on the 1990 misuse act using it as a model for their own act. The computer misuse act is an act passed by the government of the United Kingdom.

Copyright, Design and Patent act was introduced to protect the copyright of individuals who have created original pieces. For example authors of books, composers of music and software developer. This act gives creators of literacy, dramatic, musical and artistic works the right to decide the ways in which their material may be used. Software privacy has become a huge problem with people frequently copying items of friends or buying illegal copies of products from markets or other such places. It has been estimated lately that at least a staggering 40% Of all software is copied.

The penalties for this act are up to two years imprisonment and unlimited fines. Interpretation is related to the single creation rather than the idea behind the creation. For example, your idea for a musical or film would not itself be protected, but the actual content of the musical or film you write would be. In other words, someone else is still permitted to write their own book around the same idea, provided they do not directly copy or adapt yours to do so. Some of the types of work covered under this act are as follows – Dramatics – plays, dance etc Artistic- Photography, Painting, logos Literary – Song lyrics, manuscripts, Computer Programmes, newsletters and articles.

The Data protection act gives you the right to know what information is held about you, and lays out the rules to be followed for this information to be handled in a proper manner. The act works in two ways, firstly it says that anyone who processes personal information must conform with eight principles, which make sure that all personal information is: Processed fairly and lawfully Processed for limited purposes Adequate, Relevant and excessive Accurate, when required, kept up to date

Not kept for longer than is necessary Processed in agreement, with your rights Kept Secure Not to be transferred to the countries without the adequate protection The second part covered by the act is that individuals with important rights, to help them find out what personal information is being held on a computer and most paper records. If the individual or an organisation is unable to access any personal information, they are allowed to, or if they feel that their data has not been handled according to the policy of the eight principles. Then they can contact the information Commissioners Office for assistance.