Presentation is loading. Please wait.

Presentation is loading. Please wait.

Legal Implications 1 Computing Science and the Law V2 Data Protection Act Computer Misuse Act Copyright, Designs and Patents Act Communications Act Health.

Similar presentations


Presentation on theme: "Legal Implications 1 Computing Science and the Law V2 Data Protection Act Computer Misuse Act Copyright, Designs and Patents Act Communications Act Health."— Presentation transcript:

1 Legal Implications 1 Computing Science and the Law V2 Data Protection Act Computer Misuse Act Copyright, Designs and Patents Act Communications Act Health and Safety Regulations

2 2 The data protection Act was introduced to protect the rights of anybody who has their personal information stored on a computer system. Within the act: Data Subjects are the people whose information is being stored. Data Users are the companies or organisations (clubs, charities etc) who are using the subjects’ data. Information Commissioner is a government appointed individual who maintains a list of who is storing what data. All companies who store personal data must register with the Information Commissioner's Office. Computing Science and the Law V2 Data Protection Act 1998

3 3 The 8 principles of the Data Protection Act are: 1. Data is processed fairly and lawfully Data not to be used for any criminal activity such as fraud, identification theft etc. 2. Data is obtained for specified and lawful purposes Data users must have a good reason for collecting and using the personal data and only collect relevant data. 3. Data stored is adequate, relevant and not excessive Only hold personal data about customers that is sufficient for the purpose you are holding it for. 4. Data is always accurate and up to date Data must be accurate as inaccuracies could affect them negatively. E.g. wrongly recorded debt could lead to a poor credit rating and a loan being refused. Data Protection Act 1998

4 4 5. Data is not kept any longer than necessary Subjects data is deleted or removed after it has not been used for a set period of time. For example a survey that collects personal data would have to delete the original data once the survey is complete. 6. Data is processed in accordance with the data subject’s rights You have the right to see the personal data being held about you. 7. Data is securely stored Data users must insure that data is held in a secure location, with security in place to prevent access by unauthorised personnel. 8. Data is not transferred to another country without similar data protection legislation. Data users must be assured that their data will not be passed to countries without adequate security in place to meet the principles of the UK’s data protection laws. Computing Science and the Law V2 Data Protection Act 1998

5 5 Exemptions from the Act All companies have to comply with the above regulations except the Police and national security departments of the Government, such as MI5. Computing Science and the Law V2 Clip 1 The Lights are On Clip 2 What you Need to Know Data Protection Act 1988

6 6 Computing Science and the Law V2 Data Protection Act 1998 Now Read page 25 and do Rev. Ex 6 questions 1-4 from page 36.

7 Computer Misuse Act 1990 7 Illegal to misuse computers to perform the following actions: 1.Unauthorised access to computer material It is unlawful to hack into computer systems to gain private and confidential information. Hackers often delete, steal or alter the data they access. 2.Unauthorised access with intent to commit or facilitate commission of further offences Illegal for hacker to access protected data so that they can use the data for illegal purposes (selling data on, fraud, bribery etc). 3. Unauthorised acts with intent to impair the operation of computer Illegal to send computer viruses to perform harm to computer systems. Deliberately crashing a website by overloading the host server (DOS attacks).

8 Computer Misuse Act 1990 8 Now Read page 26 and do Rev. Ex 6 question 5 from page 36.

9 Copyright, Designs and Patents Act 1988 9 Under copyright law it is illegal to: 1.Make or sell unauthorised copies of software 2.Possess pirate software for your own use 3.If you are a company to knowingly use software you have not paid for Computing Science and the Law V2

10 Copyright, Designs and Patents Act 1988 10 Computing Science and the Law V2 Now Read page 27 and do Rev. Ex 6 question 6 from page 36.

11 1.Dishonestly obtaining electronic communications services Using someone’s Internet services (usually Wi-Fi) without permission. Cloning a mobile phone. Copying someone’s phone SIM card. The copy is then inserted into another phone. The owner of the original SIM will end up paying the bill for both phones. 11 Deals with abuse of telecommunication- phone lines, Wi-Fi, mobile phone network, television, broadcasting and postal services. Computing Science and the Law V2 Communications Act 2003

12 12 Computing Science and the Law V2 2. Possession of equipment used to dishonestly obtain communications services: Owning software used to illegally connect to password protected Wi-Fi hotspot Owning hardware used to copy phone SIMs. 3. Improper use of a public electronic communications network: Sending a message grossly offensive, indecent, obscene or menacing nature. Communications Act 2003 This could be an e-mail, text message or social network post. Sending a message that is deliberately designed to cause annoyance, inconvenience or needless anxiety to another.

13 13 Computing Science and the Law V2 Communications Act 2003 Now Read page 28 and do Rev. Ex 6 questions 7-8 from page 36.

14 Employers have a responsibility to ensure that computer users can safely use a computer system without a detrimental affect on their health. Health & Safety Regulations These responsibilities include: Monitors - Providing workstation users with tilt and swivel, anti-glare monitors to avoid eye and neck strain. Keyboards - Providing workstation users with adjustable keyboards with clearly defined characters and enough space in front to provide wrist support. Chairs - Providing workstation users with fully adjustable chairs to allow users to sit comfortably to prevent back strain. Environment - Providing an environment which has appropriate desk space, is spacious enough and has appropriate lighting to avoid eye strain. Health and Safety (Display Screen Equipment) Regulations 1992. Clip

15 Health & Safety Regulations Computing Science and the Law V2 15 As well as providing a healthy working environment, employers are also responsible for: 1.Conducting a risk assessment (measuring length of time at workstations, assessing equipment use). 2.Providing free eye exams for staff who continually use computer systems. 3.Providing training in correct computer use (posture, positioning of equipment, the importance of regular short breaks, how to use a mouse).

16 Health & Safety Regulations 16 Health problems associated with working with computers include: 1.Repetitive strain injury (RSI) Pain from muscles, nerves and tendons caused by repetitive movement and overuse. Mostly affects the upper body, such as the forearm, elbow, wrist, hands, neck and shoulders, and may also cause stiffness and swelling. 2.Eye strain Symptoms such as fatigue, pain in or around the eyes, blurred vision, headache and occasional double vision. 3.Back pain Result of being crouched and hunched towards the monitors and computer due to the design and positioning of peripherals. Can cause severe and acute pain in the upper back, particularly pain in the neck and or shoulders. 4.Computer Related Stress Tight shoulders whilst sat at the computer, having a fuzzy mind and not able to think clearly and getting angry at computer crashing or losing your data.

17 Health & Safety Regulations 17 Now Read page 30 and do Rev. Ex 6 questions 10-12 from page 36.

18 Legal Implications 18 With a partner, do Task 8 from page 29.Write your answers in your jotter.


Download ppt "Legal Implications 1 Computing Science and the Law V2 Data Protection Act Computer Misuse Act Copyright, Designs and Patents Act Communications Act Health."

Similar presentations


Ads by Google