Ce diaporama a bien été signalé.
Nous utilisons votre profil LinkedIn et vos données d’activité pour vous proposer des publicités personnalisées et pertinentes. Vous pouvez changer vos préférences de publicités à tout moment.

Computer Legislation2 T2

883 vues

Publié le

  • Soyez le premier à commenter

  • Soyez le premier à aimer ceci

Computer Legislation2 T2

  1. 1. Computer Legislation
  2. 2. Computer Legislation <ul><li>With many of our private and confidential records being stored on computer databases, laws and regulations had to be brought in to govern the access and storage. </li></ul><ul><li>All our medical records / credit history and bank details are stored on databases. </li></ul>
  3. 3. Data Protection Act 1984,1988 &1998 <ul><li>This law has change over the years to move with technology. </li></ul><ul><li>The law was introduced to protect the privacy of people whose information is stored on the computers. </li></ul><ul><li>Companies which store information are governed by guidelines that limits access to your information. </li></ul><ul><li>Businesses have to make sure they adhere to the laws. </li></ul>
  4. 4. 8 Principles of the Data Protection Act <ul><li>You can not store personal data un-less the data subject has given permission. </li></ul><ul><li>Data can only be used for the purpose it was given. </li></ul><ul><li>Only data relevant to that activity may be asked and stored. </li></ul><ul><li>Regular updates must be undertaken </li></ul><ul><li>Data must only be stored as long as necessary. </li></ul><ul><li>The data stored must not infringe on the data subjects rights. </li></ul><ul><li>Data must be kept in a secure location and can not be copied. </li></ul><ul><li>Personal data can not be transferred to companies outside of the EU. </li></ul>
  5. 5. Exemption to the 8 Principles <ul><li>If the data is used for a personal use it doesn’t need to adhere to the guidelines. </li></ul><ul><li>If the data is used in Pay role. </li></ul><ul><li>Data held for national security. </li></ul><ul><li>If the data subject has given their permission to go on a mailing list. </li></ul>
  6. 6. As Data Subjects <ul><li>We have the right to see what has been written about us. </li></ul><ul><li>We can request any information which is inaccurate to be destroyed. </li></ul><ul><li>These rights do not include police records. </li></ul>
  7. 7. Copyright, Design and Patent Act 1988 <ul><li>This law helps to protect inventors and designers. </li></ul><ul><li>The law makes its legal to copy a protected file or picture without the copyrights owner’s permission. </li></ul><ul><li>Punishment could be a fine or jail sentence. Examples of breaking this law is: </li></ul><ul><li>Downloading music </li></ul><ul><li>Using pirate software without a licence </li></ul><ul><li>Re – using pictures and logos </li></ul>
  8. 8. Computer Misuse Act 1990 <ul><li>With the on going threat of people hacking into our home computers gaining access to our home files. This law was brought in to make it a criminal offence. </li></ul><ul><li>People have written viruses that are sent through emails – My doom and worm viruses cost companies thousands of pounds. </li></ul><ul><li>If found deliberately planting computer viruses into systems you can face a 5 year jail sentence. </li></ul>
  9. 9. Summary of Computer Legislation. <ul><li>Data Protection </li></ul><ul><li>Copyright, Design and Patent Act 1988 </li></ul><ul><li>Computer Misuse Act 1990 </li></ul>