1/10
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Laws: Computer Misuse Act
Proper title: Computer Misuse Act 1990
What it covers:
Criminalises unauthorised access to computer systems (hacking)
Covers unauthorised modification (e.g. malware, viruses)
Includes offences like DDoS attacks and creating hacking tools
Application to computing:
Core cybercrime law for IT professionals
Ethical hacking/penetration testing must have permission
Organisations must secure systems to prevent breaches
Laws: Copyright, Designs and Patent Act
Proper title: Copyright, Designs and Patents Act 1988
What it covers:
Protects intellectual property (software, code, digital media)
Gives creators rights over copying, distribution, and modification
Application to computing:
Software piracy is illegal
Developers own code unless contracted otherwise
Impacts open-source licensing and digital content use
Equality Act
Proper title: Equality Act 2010
What it covers:
Protects individuals from discrimination (e.g. race, gender, disability)
Requires fair treatment in employment and services
Application to computing:
IT workplaces must avoid discrimination
Software and websites should be inclusive
Links to accessibility requirements (e.g. UI design)
GDPR
Proper title: UK General Data Protection Regulation (UK GDPR) + Data Protection Act 2018
What it covers:
Governs how personal data is collected, stored, and processed
Gives individuals rights (access, deletion, correction)
Requires lawful, fair, and transparent data use
Application to computing:
Affects databases, websites, apps, cloud systems
Requires encryption, security, and data minimisation
Data breaches must be reported
Health & Safety at Work Act
Proper title: Health and Safety at Work etc. Act 1974
What it covers:
Ensures safety of employees in the workplace
Application to computing:
Covers workstation ergonomics (RSI, screen use)
Safe server rooms, electrical equipment
Risk assessments for IT environments
Freedom of Information Act
Proper title: Freedom of Information Act 2000
What it covers:
Gives public access to information held by public bodies
Application to computing:
Public sector IT systems must store retrievable data
Data management systems must support information requests
Requires proper data organisation and security
Disability Discrimination Act
Proper title: Disability Discrimination Act 1995 (largely replaced by Equality Act 2010)
What it covers:
Prevented discrimination against disabled people
Application to computing:
Basis for accessibility standards (now under Equality Act)
Influences screen readers, captions, accessible UI design
Consumer Protection Act
Proper title: Consumer Protection Act 1987
What it covers:
Protects consumers from unsafe or defective products
Application to computing:
Hardware/software must be safe and reliable
Faulty software causing damage could lead to liability
Applies to apps, devices, and digital products
WEEE
Proper title: Waste Electrical and Electronic Equipment (WEEE) Regulations 2013
What it covers:
Governs disposal and recycling of electronic waste
Application to computing:
IT companies must recycle old hardware properly
Impacts disposal of PCs, servers, peripherals
Encourages environmentally responsible computing
Regulation of Investigatory Powers Act
Proper title: Regulation of Investigatory Powers Act 2000 (RIPA)
What it covers:
Regulates surveillance, interception of communications
Application to computing:
Impacts network monitoring and data interception
Employers must follow rules when monitoring employees
Relevant to cybersecurity and law enforcement
Telecommunications Regulations Act 2000
Proper title: Telecommunications (Lawful Business Practice) (Interception of Communications) Regulations 2000
What it covers:
Allows limited interception of communications for business purposes
Application to computing:
Employers can monitor emails/internet use (within limits)
Requires transparency and legitimate purpose
Important for IT network administration and security