SlideShare une entreprise Scribd logo
1  sur  22
Legal Constraints
Customer Data Policy
   Formal document identifying the constraints
    or limitations in using customer information
     statements   of what should or should not be done
     examples   to make clear any statements you
      make
     References  to all the material, including any Acts
      of Parliament
Data Protection Act
of 12th July 1984 / 1998
Anyone processing personal data must comply with the
   eight enforceable principles of good practice.
1. Fairly and lawfully processed;
2. Processed for limited purposes;
3. Adequate, relevant and not excessive;
4. Accurate;
5. Not kept longer than necessary;
6. Processed in accordance with the data subject's rights;
7. Secure (no unauthorised access, alteration or disclosure)
8. Not transferred to other countries without adequate
    protection.
The Information Commissioner
   The Act established the office of Information
    Commissioner, whose duties include:
     administering  a public register of Data Users with
      broad details of the data held
     investigating complaints and initiating prosecutions for
      breaches of the Act.
     publishing several documents that offer guidelines to
      data users and computer bureaux.
Registration
   All Data Users have to register, giving:
     their   name and address (or that of their company)
    a   description of the data held and its purpose
    a description of the sources from which the data is
      obtained
    a  description of the persons to whom it is intended to
      disclose data
Exemptions from the Act
   The Act does not apply to payroll, pensions and accounts data, nor to
    names and addresses held for distribution purposes.
   Registration may not be necessary when the data are for
    personal, family, household or recreational use.
   Subjects do not have a right to access data if the sole aim of
    collecting it is for statistical or research purposes, or where it is simply
    for backup.
   Data can be disclosed to the data subject’s agent (e.g. lawyer or
    accountant), to persons working for the data user, and in response to
    urgent need to prevent injury or damage to health.
    Additionally, there are exemptions for special categories, including
    data held:
         - in connection with national security;
         - for prevention of crime;
         - for the collection of tax or duty.
Software Copyright Laws
   Computer software is now covered by the
    Copyright Designs and Patents Act of
    1988, which covers a wide range of
    intellectual property such as music, literature
    and software.
Copyright, Designs & Patents Act
1988
   Provisions of the Act make it illegal to:
     copy   software
     run pirated software
     transmit software over a telecommunications
      line, thereby creating a copy
The Computer Misuse Act of
1990
   In the early 1980s in the UK, hacking
    was not illegal. Some universities
    stipulated that hacking, especially
    where damage was done to data
    files, was a disciplinary offence, but
    there was no legislative framework
    within which a criminal prosecution
    could be brought.
Computer Misuse Act of 1990
   The Computer Misuse Act of 1990 defined three
    specific criminal offences to deal with the
    problems of hacking, viruses and other
    nuisances.
     unauthorised  access to computer programs or data
     unauthorised access with a further criminal intent
     unauthorised modification of computer material
           (i.e. programs or data)
Computer Crime & The Law
 Cracking (or Hacking)
 Viruses
 Trojans
 Logic Bombs
How A Virus Works
1.   ORIGINATION - A programmer writes a program - the
     virus - to cause mischief or destruction. The virus is
     capable of reproducing itself
2.   TRANSMISSION - Often, the virus is attached to a
     normal program. It then copies itself to other software
     on the hard disk
3.   REPRODUCTION - When another drive is inserted into
     the computer’s disk drive, the virus copies itself on to
     the drive
4.   INFECTION - Depending on what the original
     programmer wrote in the virus program, a virus may
     display messages, use up all the computer’s
     memory, destroy data files or cause serious system
     errors
Health Hazards
   Stress

   RSI

   Eyestrain

   ELF radiation

   Backache
Display Screen Regulations 1992
    Employers are required to
      Perform  an analysis of workstations in order to
       evaluate the safety and health conditions to which
       they give rise
      Provide training to employees in the use of
       workstation components
      Ensure     employees take regular breaks or changes in
       activity
      Provide  regular eye tests for workstation users and
       pay for glasses
Computers, Health And The Law

   Employees have a responsibility to
     Use workstations and equipment correctly, in
      accordance with training provided by employers
     Bring problems to the attention of their employer
      immediately and co-operate in the correction of these
      problems
Computers, Health and the law
   Manufacturers are required to ensure that
    their products comply with the Directive.
    For example:
     Screens must tilt and swivel
     Keyboards must be separate and moveable
     Notebook PCs are not suitable for entering large
           amounts of data
The Ergonomic Environment
    Ergonomics refers to the design and functionality of the
    environment, and encompasses the entire range of
    environmental factors. Employers must give
    consideration to:
   Lighting: office well lit, with blinds
   Furniture: chairs of adjustable height, with tilting
    backrest, swiveling on five-point base
   Work space: combination of
    chair, desk, computer, accessories, lighting, heating and
    ventilation all contribute to overall well-being
   Noise: e.g. noisy printers relocated
   Hardware: screen must tilt and swivel and be flicker-free, the
    keyboard separately attached
   Software: should facilitate task, be easy to use and
    adaptable to user’s experience
DRM
 Music & Films
 Technology to restrict where, how
  often, on what you can use it
Proprietary Software
 Sold under licence – not ownership
 Unable to modify
 Restricted rights to sell-on
Open Source Movement
 Have access to the source code – can
  therefore modify it
 Redistribute the code or executable
 Usually free to obtain
The Rights of Data Subjects
    Apart from the right to complain to the Information
    Commissioner, data subjects also have a range of
    rights which they may exercise in the civil courts.
    These are:
   Right to compensation for unauthorised disclosure of
    data (arising from principle no. 3);
   Right to compensation for inaccurate data (arising out
    of principle no. 5);
   Right of access to data and to apply for rectification or
    erasure where data are inaccurate (arising out of
    principle no. 7);
   Right to compensation for unauthorised access, loss or
    destruction of data (arising out of principle no. 8).
Relevant Legislation
Data Protection
   Data Protection Act 1998
   Freedom of Information Act 2000 (FOIA)


Usage of IT Systems
   Computer Misuse Act 1990
   Terrorism Act 2000
   Privacy and Electronic Communications Regulations
    2003

Contenu connexe

Tendances

Policy and procedure of hospitals
Policy and procedure of hospitalsPolicy and procedure of hospitals
Policy and procedure of hospitalsMohammed Alabdali
 
Smart city project's Information Security challenges
Smart city project's Information Security challenges              Smart city project's Information Security challenges
Smart city project's Information Security challenges Behak Kangarloo
 
Information and network security 4 osi architecture
Information and network security  4 osi architectureInformation and network security  4 osi architecture
Information and network security 4 osi architectureVaibhav Khanna
 
Information and network security 3 security challenges
Information and network security 3 security challengesInformation and network security 3 security challenges
Information and network security 3 security challengesVaibhav Khanna
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security conceptsG Prachi
 
Information and network security 1 introduction
Information and network security 1 introductionInformation and network security 1 introduction
Information and network security 1 introductionVaibhav Khanna
 
Information and network security 6 security attacks
Information and network security 6 security attacksInformation and network security 6 security attacks
Information and network security 6 security attacksVaibhav Khanna
 
concept , types and components if information technology
concept , types and components if information technology concept , types and components if information technology
concept , types and components if information technology saifur rahman
 
Information and network security 5 security attacks mechanisms and services
Information and network security 5 security attacks mechanisms and servicesInformation and network security 5 security attacks mechanisms and services
Information and network security 5 security attacks mechanisms and servicesVaibhav Khanna
 
Privacy, Security and Ethics in Educational Technology
Privacy, Security and Ethics in Educational TechnologyPrivacy, Security and Ethics in Educational Technology
Privacy, Security and Ethics in Educational TechnologyRica Young
 
Information and network security 7 security services
Information and network security 7 security servicesInformation and network security 7 security services
Information and network security 7 security servicesVaibhav Khanna
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02anjalee990
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issuesHaseeb Ahmed Awan
 
Information and network security 9 model for network security
Information and network security 9 model for network securityInformation and network security 9 model for network security
Information and network security 9 model for network securityVaibhav Khanna
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challengesCRM
 

Tendances (20)

Policy and procedure of hospitals
Policy and procedure of hospitalsPolicy and procedure of hospitals
Policy and procedure of hospitals
 
Smart city project's Information Security challenges
Smart city project's Information Security challenges              Smart city project's Information Security challenges
Smart city project's Information Security challenges
 
Information and network security 4 osi architecture
Information and network security  4 osi architectureInformation and network security  4 osi architecture
Information and network security 4 osi architecture
 
Information and network security 3 security challenges
Information and network security 3 security challengesInformation and network security 3 security challenges
Information and network security 3 security challenges
 
Lec1 ict
Lec1 ictLec1 ict
Lec1 ict
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Information and network security 1 introduction
Information and network security 1 introductionInformation and network security 1 introduction
Information and network security 1 introduction
 
Security
SecuritySecurity
Security
 
Information and network security 6 security attacks
Information and network security 6 security attacksInformation and network security 6 security attacks
Information and network security 6 security attacks
 
concept , types and components if information technology
concept , types and components if information technology concept , types and components if information technology
concept , types and components if information technology
 
Information and network security 5 security attacks mechanisms and services
Information and network security 5 security attacks mechanisms and servicesInformation and network security 5 security attacks mechanisms and services
Information and network security 5 security attacks mechanisms and services
 
Threats
ThreatsThreats
Threats
 
Privacy, Security and Ethics in Educational Technology
Privacy, Security and Ethics in Educational TechnologyPrivacy, Security and Ethics in Educational Technology
Privacy, Security and Ethics in Educational Technology
 
Information and network security 7 security services
Information and network security 7 security servicesInformation and network security 7 security services
Information and network security 7 security services
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
 
Pricavy issues
Pricavy issuesPricavy issues
Pricavy issues
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issues
 
Information and network security 9 model for network security
Information and network security 9 model for network securityInformation and network security 9 model for network security
Information and network security 9 model for network security
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challenges
 

En vedette

Legal, Ethical and Contractual constraints in the Media Industry
Legal, Ethical and Contractual constraints in the Media IndustryLegal, Ethical and Contractual constraints in the Media Industry
Legal, Ethical and Contractual constraints in the Media IndustryMattwattsmedia
 
BTEC National in ICT: Unit 3 - Introduction in Access
BTEC National in ICT: Unit 3 - Introduction in AccessBTEC National in ICT: Unit 3 - Introduction in Access
BTEC National in ICT: Unit 3 - Introduction in Accessmrcox
 
BTEC National in ICT: Unit 3 - MIS Features and Functions
BTEC National in ICT: Unit 3 - MIS Features and FunctionsBTEC National in ICT: Unit 3 - MIS Features and Functions
BTEC National in ICT: Unit 3 - MIS Features and Functionsmrcox
 
BTEC National in ICT: Unit 3 - Functional Areas of Xpect
BTEC National in ICT: Unit 3 - Functional Areas of XpectBTEC National in ICT: Unit 3 - Functional Areas of Xpect
BTEC National in ICT: Unit 3 - Functional Areas of Xpectmrcox
 
Unit 3 gathering information and data
Unit 3   gathering information and dataUnit 3   gathering information and data
Unit 3 gathering information and datamrcox
 
Regulatory framework of telecommunication
Regulatory framework of telecommunicationRegulatory framework of telecommunication
Regulatory framework of telecommunicationKarun Mahajan
 
PPT on Consumer Rights by Poojali
PPT on Consumer Rights by PoojaliPPT on Consumer Rights by Poojali
PPT on Consumer Rights by PoojaliPoojaliKrishna999
 
Consumer Contracts Regulations 2013 - a Guidance Note by Brian Miller Solicitor
Consumer Contracts Regulations 2013 - a Guidance Note by Brian Miller SolicitorConsumer Contracts Regulations 2013 - a Guidance Note by Brian Miller Solicitor
Consumer Contracts Regulations 2013 - a Guidance Note by Brian Miller SolicitorBrian Miller, Solicitor
 
Cultural factors effecting ict
Cultural factors effecting ictCultural factors effecting ict
Cultural factors effecting ictAdam Heatherington
 
BTEC National in ICT: Unit 3 - More on DFDs
BTEC National in ICT: Unit 3 - More on DFDsBTEC National in ICT: Unit 3 - More on DFDs
BTEC National in ICT: Unit 3 - More on DFDsmrcox
 
UNIT 2 P6 part 2
UNIT 2 P6 part 2UNIT 2 P6 part 2
UNIT 2 P6 part 2OriginalGSM
 
BTEC National in ICT: Unit 3 - Data vs Information
BTEC National in ICT: Unit 3 - Data vs InformationBTEC National in ICT: Unit 3 - Data vs Information
BTEC National in ICT: Unit 3 - Data vs Informationmrcox
 
Corporate-Espionage
Corporate-EspionageCorporate-Espionage
Corporate-EspionageSam
 
Limitations of marketing research
Limitations of marketing researchLimitations of marketing research
Limitations of marketing researchHari C
 

En vedette (20)

Legal, Ethical and Contractual constraints in the Media Industry
Legal, Ethical and Contractual constraints in the Media IndustryLegal, Ethical and Contractual constraints in the Media Industry
Legal, Ethical and Contractual constraints in the Media Industry
 
BTEC National in ICT: Unit 3 - Introduction in Access
BTEC National in ICT: Unit 3 - Introduction in AccessBTEC National in ICT: Unit 3 - Introduction in Access
BTEC National in ICT: Unit 3 - Introduction in Access
 
BTEC National in ICT: Unit 3 - MIS Features and Functions
BTEC National in ICT: Unit 3 - MIS Features and FunctionsBTEC National in ICT: Unit 3 - MIS Features and Functions
BTEC National in ICT: Unit 3 - MIS Features and Functions
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
Computer Misuse Act
Computer Misuse ActComputer Misuse Act
Computer Misuse Act
 
LO1
LO1LO1
LO1
 
Business growth consultant
Business growth consultantBusiness growth consultant
Business growth consultant
 
BTEC National in ICT: Unit 3 - Functional Areas of Xpect
BTEC National in ICT: Unit 3 - Functional Areas of XpectBTEC National in ICT: Unit 3 - Functional Areas of Xpect
BTEC National in ICT: Unit 3 - Functional Areas of Xpect
 
Unit 3 gathering information and data
Unit 3   gathering information and dataUnit 3   gathering information and data
Unit 3 gathering information and data
 
Regulatory framework of telecommunication
Regulatory framework of telecommunicationRegulatory framework of telecommunication
Regulatory framework of telecommunication
 
PPT on Consumer Rights by Poojali
PPT on Consumer Rights by PoojaliPPT on Consumer Rights by Poojali
PPT on Consumer Rights by Poojali
 
Consumer Contracts Regulations 2013 - a Guidance Note by Brian Miller Solicitor
Consumer Contracts Regulations 2013 - a Guidance Note by Brian Miller SolicitorConsumer Contracts Regulations 2013 - a Guidance Note by Brian Miller Solicitor
Consumer Contracts Regulations 2013 - a Guidance Note by Brian Miller Solicitor
 
Cultural factors effecting ict
Cultural factors effecting ictCultural factors effecting ict
Cultural factors effecting ict
 
BTEC National in ICT: Unit 3 - More on DFDs
BTEC National in ICT: Unit 3 - More on DFDsBTEC National in ICT: Unit 3 - More on DFDs
BTEC National in ICT: Unit 3 - More on DFDs
 
UNIT 2 P6 part 2
UNIT 2 P6 part 2UNIT 2 P6 part 2
UNIT 2 P6 part 2
 
BTEC National in ICT: Unit 3 - Data vs Information
BTEC National in ICT: Unit 3 - Data vs InformationBTEC National in ICT: Unit 3 - Data vs Information
BTEC National in ICT: Unit 3 - Data vs Information
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
 
Corporate-Espionage
Corporate-EspionageCorporate-Espionage
Corporate-Espionage
 
Limitations of marketing research
Limitations of marketing researchLimitations of marketing research
Limitations of marketing research
 
PPT on "Labour Laws in India"
PPT on "Labour Laws in India"PPT on "Labour Laws in India"
PPT on "Labour Laws in India"
 

Similaire à BTEC National in ICT: Unit 3 - Legal Constraints

How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe onlineHadilAlHaj
 
Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemssaltashict
 
Business And The Law
Business And The LawBusiness And The Law
Business And The LawRobbieA
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Dr. Khaled Bakro
 
2 Understand what is meant by professional practice
2 Understand what is meant by professional practice2 Understand what is meant by professional practice
2 Understand what is meant by professional practiceMark Anthony Kavanagh
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerceDamo Ward
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11mrmwood
 
Computer Legislation2 T2
Computer Legislation2  T2Computer Legislation2  T2
Computer Legislation2 T2lees_ush
 
Super billing computer ethics, privacy and security
Super billing computer ethics, privacy and securitySuper billing computer ethics, privacy and security
Super billing computer ethics, privacy and securitysuperb11b
 
Chapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and SafeguardsChapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and Safeguardslobnaqassem2
 
3.6 legislation and regulations
3.6 legislation and regulations3.6 legislation and regulations
3.6 legislation and regulationsmrmwood
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industryjamiehaworth1
 
BS CS5 Lecture 5.pptx
BS CS5 Lecture 5.pptxBS CS5 Lecture 5.pptx
BS CS5 Lecture 5.pptxwhoiam36
 
Legal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptxLegal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptxKRITARTHBANSAL1
 
Bring your own device guidance
Bring your own device guidanceBring your own device guidance
Bring your own device guidanceGary Chambers
 
10. law invest & ethics
10. law invest & ethics10. law invest & ethics
10. law invest & ethics7wounders
 

Similaire à BTEC National in ICT: Unit 3 - Legal Constraints (20)

How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systems
 
Business And The Law
Business And The LawBusiness And The Law
Business And The Law
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
 
needforsecurity
needforsecurityneedforsecurity
needforsecurity
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
 
2 Understand what is meant by professional practice
2 Understand what is meant by professional practice2 Understand what is meant by professional practice
2 Understand what is meant by professional practice
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerce
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11
 
Computer Legislation2 T2
Computer Legislation2  T2Computer Legislation2  T2
Computer Legislation2 T2
 
Issues related to ict
Issues related to ictIssues related to ict
Issues related to ict
 
Super billing computer ethics, privacy and security
Super billing computer ethics, privacy and securitySuper billing computer ethics, privacy and security
Super billing computer ethics, privacy and security
 
Chapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and SafeguardsChapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and Safeguards
 
3.6 legislation and regulations
3.6 legislation and regulations3.6 legislation and regulations
3.6 legislation and regulations
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industry
 
BS CS5 Lecture 5.pptx
BS CS5 Lecture 5.pptxBS CS5 Lecture 5.pptx
BS CS5 Lecture 5.pptx
 
Legal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptxLegal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptx
 
Bring your own device guidance
Bring your own device guidanceBring your own device guidance
Bring your own device guidance
 
10. law invest & ethics
10. law invest & ethics10. law invest & ethics
10. law invest & ethics
 

Dernier

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 

Dernier (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 

BTEC National in ICT: Unit 3 - Legal Constraints

  • 2. Customer Data Policy  Formal document identifying the constraints or limitations in using customer information  statements of what should or should not be done  examples to make clear any statements you make  References to all the material, including any Acts of Parliament
  • 3. Data Protection Act of 12th July 1984 / 1998 Anyone processing personal data must comply with the eight enforceable principles of good practice. 1. Fairly and lawfully processed; 2. Processed for limited purposes; 3. Adequate, relevant and not excessive; 4. Accurate; 5. Not kept longer than necessary; 6. Processed in accordance with the data subject's rights; 7. Secure (no unauthorised access, alteration or disclosure) 8. Not transferred to other countries without adequate protection.
  • 4. The Information Commissioner  The Act established the office of Information Commissioner, whose duties include:  administering a public register of Data Users with broad details of the data held  investigating complaints and initiating prosecutions for breaches of the Act.  publishing several documents that offer guidelines to data users and computer bureaux.
  • 5. Registration  All Data Users have to register, giving:  their name and address (or that of their company) a description of the data held and its purpose a description of the sources from which the data is obtained a description of the persons to whom it is intended to disclose data
  • 6. Exemptions from the Act  The Act does not apply to payroll, pensions and accounts data, nor to names and addresses held for distribution purposes.  Registration may not be necessary when the data are for personal, family, household or recreational use.  Subjects do not have a right to access data if the sole aim of collecting it is for statistical or research purposes, or where it is simply for backup.  Data can be disclosed to the data subject’s agent (e.g. lawyer or accountant), to persons working for the data user, and in response to urgent need to prevent injury or damage to health.  Additionally, there are exemptions for special categories, including data held: - in connection with national security; - for prevention of crime; - for the collection of tax or duty.
  • 7. Software Copyright Laws  Computer software is now covered by the Copyright Designs and Patents Act of 1988, which covers a wide range of intellectual property such as music, literature and software.
  • 8. Copyright, Designs & Patents Act 1988  Provisions of the Act make it illegal to:  copy software  run pirated software  transmit software over a telecommunications line, thereby creating a copy
  • 9. The Computer Misuse Act of 1990  In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially where damage was done to data files, was a disciplinary offence, but there was no legislative framework within which a criminal prosecution could be brought.
  • 10. Computer Misuse Act of 1990  The Computer Misuse Act of 1990 defined three specific criminal offences to deal with the problems of hacking, viruses and other nuisances.  unauthorised access to computer programs or data  unauthorised access with a further criminal intent  unauthorised modification of computer material (i.e. programs or data)
  • 11. Computer Crime & The Law  Cracking (or Hacking)  Viruses  Trojans  Logic Bombs
  • 12. How A Virus Works 1. ORIGINATION - A programmer writes a program - the virus - to cause mischief or destruction. The virus is capable of reproducing itself 2. TRANSMISSION - Often, the virus is attached to a normal program. It then copies itself to other software on the hard disk 3. REPRODUCTION - When another drive is inserted into the computer’s disk drive, the virus copies itself on to the drive 4. INFECTION - Depending on what the original programmer wrote in the virus program, a virus may display messages, use up all the computer’s memory, destroy data files or cause serious system errors
  • 13. Health Hazards  Stress  RSI  Eyestrain  ELF radiation  Backache
  • 14. Display Screen Regulations 1992  Employers are required to  Perform an analysis of workstations in order to evaluate the safety and health conditions to which they give rise  Provide training to employees in the use of workstation components  Ensure employees take regular breaks or changes in activity  Provide regular eye tests for workstation users and pay for glasses
  • 15. Computers, Health And The Law  Employees have a responsibility to  Use workstations and equipment correctly, in accordance with training provided by employers  Bring problems to the attention of their employer immediately and co-operate in the correction of these problems
  • 16. Computers, Health and the law  Manufacturers are required to ensure that their products comply with the Directive. For example:  Screens must tilt and swivel  Keyboards must be separate and moveable  Notebook PCs are not suitable for entering large amounts of data
  • 17. The Ergonomic Environment Ergonomics refers to the design and functionality of the environment, and encompasses the entire range of environmental factors. Employers must give consideration to:  Lighting: office well lit, with blinds  Furniture: chairs of adjustable height, with tilting backrest, swiveling on five-point base  Work space: combination of chair, desk, computer, accessories, lighting, heating and ventilation all contribute to overall well-being  Noise: e.g. noisy printers relocated  Hardware: screen must tilt and swivel and be flicker-free, the keyboard separately attached  Software: should facilitate task, be easy to use and adaptable to user’s experience
  • 18. DRM  Music & Films  Technology to restrict where, how often, on what you can use it
  • 19. Proprietary Software  Sold under licence – not ownership  Unable to modify  Restricted rights to sell-on
  • 20. Open Source Movement  Have access to the source code – can therefore modify it  Redistribute the code or executable  Usually free to obtain
  • 21. The Rights of Data Subjects Apart from the right to complain to the Information Commissioner, data subjects also have a range of rights which they may exercise in the civil courts. These are:  Right to compensation for unauthorised disclosure of data (arising from principle no. 3);  Right to compensation for inaccurate data (arising out of principle no. 5);  Right of access to data and to apply for rectification or erasure where data are inaccurate (arising out of principle no. 7);  Right to compensation for unauthorised access, loss or destruction of data (arising out of principle no. 8).
  • 22. Relevant Legislation Data Protection  Data Protection Act 1998  Freedom of Information Act 2000 (FOIA) Usage of IT Systems  Computer Misuse Act 1990  Terrorism Act 2000  Privacy and Electronic Communications Regulations 2003