1/3
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
The Data Protection Act 1998
this law applies to information stored both on computers and in organised paper filing systems
covers personal data, which is any data which can be used to identify a living person
data which can be used in combination with other data to identify a living person is also classified as personal data
examples of personal data, a person’s name and address
an individual who can be identified by personal data is referred to as the data subject, with the law protecting them in eight specific ways as laid out by the Government
personal data shall be processed fairly and lawfully
personal data shall be obtained only for one or more specified and lawful purpose
personal data shall be adequate, relevant and not excessive for its purpose
personal data shall be accurate and where necessary kept up to date
personal data shall not be kept for longer than is necessary for its purpose
personal data shall be processed in accordance with the rights of data subjects under this Act
appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data
personal data shall not be transferred to a country or territory outside the European Economic Area, unless that country or territory ensures an adequate level of data protection
act also gives data subjects rights, such as the right to request a copy of the data held about them, the right to correct the data held about them and the right to prevent marketing using contact details provided by the data subject
The Computer Misuse Act 1990
concerns the malicious use of computers.
outlines three primary offences
unauthorised access to computer materials
for example, finding a teacher’s password and opening their files
unauthorised access with intent to commit further offences
for example, finding a teacher’s password and opening their files with the intention of increasing your mark on their markbook
unauthorised modification of computer material
for example, finding a teacher’s password, opening their files and increasing your mark on their markbook
the consequences of the second and third offences are generally worse than the first, with each offence being punishable with imprisonment
The Copyright, Design and Patents Act 1988
brought in to protect people’s property online
covers everything from logos to music recordings
if a work is original, copyright automatically applies and doesn’t expire until 25-70 years after the death of the creator, depending on the type of work
in 1992, the Act was extended to include computer programs as a type of literary work, meaning that copyright automatically applies to code
if an individual believes that their work has been copied, it is their responsibility to take action under the Act
The Regulation of Investigatory Powers Act 2000
referred to as RIPA
covers investigation, surveillance and interception of communication by public bodies
for example, the Secret Service can legally wire-trap online conversations in the interests of national security provided that a warrant has been issued
furthermore, the act enforces internet service providers and mobile phone companies to give up information upon request from an authorised authority and to ensure that their networks have sufficient hardware installed to facilitate surveillance
this Act is controversial as its powers extend to small agencies like local councils
some people feel that the Act is an invasion of privacy, or that it is often improperly used