SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Legal Constraints
Customer Data Policy
   Formal document identifying the constraints
    or limitations in using customer information
     statements   of what should or should not be done
     examples   to make clear any statements you
      make
     References  to all the material, including any Acts
      of Parliament
Data Protection Act
of 12th July 1984 / 1998
Anyone processing personal data must comply with the
   eight enforceable principles of good practice.
1. Fairly and lawfully processed;
2. Processed for limited purposes;
3. Adequate, relevant and not excessive;
4. Accurate;
5. Not kept longer than necessary;
6. Processed in accordance with the data subject's rights;
7. Secure (no unauthorised access, alteration or disclosure)
8. Not transferred to other countries without adequate
    protection.
The Information Commissioner
   The Act established the office of Information
    Commissioner, whose duties include:
     administering  a public register of Data Users with
      broad details of the data held
     investigating complaints and initiating prosecutions for
      breaches of the Act.
     publishing several documents that offer guidelines to
      data users and computer bureaux.
Registration
   All Data Users have to register, giving:
     their   name and address (or that of their company)
    a   description of the data held and its purpose
    a description of the sources from which the data is
      obtained
    a  description of the persons to whom it is intended to
      disclose data
Exemptions from the Act
   The Act does not apply to payroll, pensions and accounts data, nor to
    names and addresses held for distribution purposes.
   Registration may not be necessary when the data are for
    personal, family, household or recreational use.
   Subjects do not have a right to access data if the sole aim of
    collecting it is for statistical or research purposes, or where it is simply
    for backup.
   Data can be disclosed to the data subject’s agent (e.g. lawyer or
    accountant), to persons working for the data user, and in response to
    urgent need to prevent injury or damage to health.
    Additionally, there are exemptions for special categories, including
    data held:
         - in connection with national security;
         - for prevention of crime;
         - for the collection of tax or duty.
Software Copyright Laws
   Computer software is now covered by the
    Copyright Designs and Patents Act of
    1988, which covers a wide range of
    intellectual property such as music, literature
    and software.
Copyright, Designs & Patents Act
1988
   Provisions of the Act make it illegal to:
     copy   software
     run pirated software
     transmit software over a telecommunications
      line, thereby creating a copy
The Computer Misuse Act of
1990
   In the early 1980s in the UK, hacking
    was not illegal. Some universities
    stipulated that hacking, especially
    where damage was done to data
    files, was a disciplinary offence, but
    there was no legislative framework
    within which a criminal prosecution
    could be brought.
Computer Misuse Act of 1990
   The Computer Misuse Act of 1990 defined three
    specific criminal offences to deal with the
    problems of hacking, viruses and other
    nuisances.
     unauthorised  access to computer programs or data
     unauthorised access with a further criminal intent
     unauthorised modification of computer material
           (i.e. programs or data)
Computer Crime & The Law
 Cracking (or Hacking)
 Viruses
 Trojans
 Logic Bombs
How A Virus Works
1.   ORIGINATION - A programmer writes a program - the
     virus - to cause mischief or destruction. The virus is
     capable of reproducing itself
2.   TRANSMISSION - Often, the virus is attached to a
     normal program. It then copies itself to other software
     on the hard disk
3.   REPRODUCTION - When another drive is inserted into
     the computer’s disk drive, the virus copies itself on to
     the drive
4.   INFECTION - Depending on what the original
     programmer wrote in the virus program, a virus may
     display messages, use up all the computer’s
     memory, destroy data files or cause serious system
     errors
Health Hazards
   Stress

   RSI

   Eyestrain

   ELF radiation

   Backache
Display Screen Regulations 1992
    Employers are required to
      Perform  an analysis of workstations in order to
       evaluate the safety and health conditions to which
       they give rise
      Provide training to employees in the use of
       workstation components
      Ensure     employees take regular breaks or changes in
       activity
      Provide  regular eye tests for workstation users and
       pay for glasses
Computers, Health And The Law

   Employees have a responsibility to
     Use workstations and equipment correctly, in
      accordance with training provided by employers
     Bring problems to the attention of their employer
      immediately and co-operate in the correction of these
      problems
Computers, Health and the law
   Manufacturers are required to ensure that
    their products comply with the Directive.
    For example:
     Screens must tilt and swivel
     Keyboards must be separate and moveable
     Notebook PCs are not suitable for entering large
           amounts of data
The Ergonomic Environment
    Ergonomics refers to the design and functionality of the
    environment, and encompasses the entire range of
    environmental factors. Employers must give
    consideration to:
   Lighting: office well lit, with blinds
   Furniture: chairs of adjustable height, with tilting
    backrest, swiveling on five-point base
   Work space: combination of
    chair, desk, computer, accessories, lighting, heating and
    ventilation all contribute to overall well-being
   Noise: e.g. noisy printers relocated
   Hardware: screen must tilt and swivel and be flicker-free, the
    keyboard separately attached
   Software: should facilitate task, be easy to use and
    adaptable to user’s experience
DRM
 Music & Films
 Technology to restrict where, how
  often, on what you can use it
Proprietary Software
 Sold under licence – not ownership
 Unable to modify
 Restricted rights to sell-on
Open Source Movement
 Have access to the source code – can
  therefore modify it
 Redistribute the code or executable
 Usually free to obtain
The Rights of Data Subjects
    Apart from the right to complain to the Information
    Commissioner, data subjects also have a range of
    rights which they may exercise in the civil courts.
    These are:
   Right to compensation for unauthorised disclosure of
    data (arising from principle no. 3);
   Right to compensation for inaccurate data (arising out
    of principle no. 5);
   Right of access to data and to apply for rectification or
    erasure where data are inaccurate (arising out of
    principle no. 7);
   Right to compensation for unauthorised access, loss or
    destruction of data (arising out of principle no. 8).
Relevant Legislation
Data Protection
   Data Protection Act 1998
   Freedom of Information Act 2000 (FOIA)


Usage of IT Systems
   Computer Misuse Act 1990
   Terrorism Act 2000
   Privacy and Electronic Communications Regulations
    2003

Weitere ähnliche Inhalte

Was ist angesagt?

Policy and procedure of hospitals
Policy and procedure of hospitalsPolicy and procedure of hospitals
Policy and procedure of hospitalsMohammed Alabdali
 
Smart city project's Information Security challenges
Smart city project's Information Security challenges              Smart city project's Information Security challenges
Smart city project's Information Security challenges Behak Kangarloo
 
Information and network security 4 osi architecture
Information and network security  4 osi architectureInformation and network security  4 osi architecture
Information and network security 4 osi architectureVaibhav Khanna
 
Information and network security 3 security challenges
Information and network security 3 security challengesInformation and network security 3 security challenges
Information and network security 3 security challengesVaibhav Khanna
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security conceptsG Prachi
 
Information and network security 1 introduction
Information and network security 1 introductionInformation and network security 1 introduction
Information and network security 1 introductionVaibhav Khanna
 
Information and network security 6 security attacks
Information and network security 6 security attacksInformation and network security 6 security attacks
Information and network security 6 security attacksVaibhav Khanna
 
concept , types and components if information technology
concept , types and components if information technology concept , types and components if information technology
concept , types and components if information technology saifur rahman
 
Information and network security 5 security attacks mechanisms and services
Information and network security 5 security attacks mechanisms and servicesInformation and network security 5 security attacks mechanisms and services
Information and network security 5 security attacks mechanisms and servicesVaibhav Khanna
 
Privacy, Security and Ethics in Educational Technology
Privacy, Security and Ethics in Educational TechnologyPrivacy, Security and Ethics in Educational Technology
Privacy, Security and Ethics in Educational TechnologyRica Young
 
Information and network security 7 security services
Information and network security 7 security servicesInformation and network security 7 security services
Information and network security 7 security servicesVaibhav Khanna
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02anjalee990
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issuesHaseeb Ahmed Awan
 
Information and network security 9 model for network security
Information and network security 9 model for network securityInformation and network security 9 model for network security
Information and network security 9 model for network securityVaibhav Khanna
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challengesCRM
 

Was ist angesagt? (20)

Policy and procedure of hospitals
Policy and procedure of hospitalsPolicy and procedure of hospitals
Policy and procedure of hospitals
 
Smart city project's Information Security challenges
Smart city project's Information Security challenges              Smart city project's Information Security challenges
Smart city project's Information Security challenges
 
Information and network security 4 osi architecture
Information and network security  4 osi architectureInformation and network security  4 osi architecture
Information and network security 4 osi architecture
 
Information and network security 3 security challenges
Information and network security 3 security challengesInformation and network security 3 security challenges
Information and network security 3 security challenges
 
Lec1 ict
Lec1 ictLec1 ict
Lec1 ict
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Information and network security 1 introduction
Information and network security 1 introductionInformation and network security 1 introduction
Information and network security 1 introduction
 
Security
SecuritySecurity
Security
 
Information and network security 6 security attacks
Information and network security 6 security attacksInformation and network security 6 security attacks
Information and network security 6 security attacks
 
concept , types and components if information technology
concept , types and components if information technology concept , types and components if information technology
concept , types and components if information technology
 
Information and network security 5 security attacks mechanisms and services
Information and network security 5 security attacks mechanisms and servicesInformation and network security 5 security attacks mechanisms and services
Information and network security 5 security attacks mechanisms and services
 
Threats
ThreatsThreats
Threats
 
Privacy, Security and Ethics in Educational Technology
Privacy, Security and Ethics in Educational TechnologyPrivacy, Security and Ethics in Educational Technology
Privacy, Security and Ethics in Educational Technology
 
Information and network security 7 security services
Information and network security 7 security servicesInformation and network security 7 security services
Information and network security 7 security services
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
 
Pricavy issues
Pricavy issuesPricavy issues
Pricavy issues
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issues
 
Information and network security 9 model for network security
Information and network security 9 model for network securityInformation and network security 9 model for network security
Information and network security 9 model for network security
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challenges
 

Andere mochten auch

Legal, Ethical and Contractual constraints in the Media Industry
Legal, Ethical and Contractual constraints in the Media IndustryLegal, Ethical and Contractual constraints in the Media Industry
Legal, Ethical and Contractual constraints in the Media IndustryMattwattsmedia
 
BTEC National in ICT: Unit 3 - Introduction in Access
BTEC National in ICT: Unit 3 - Introduction in AccessBTEC National in ICT: Unit 3 - Introduction in Access
BTEC National in ICT: Unit 3 - Introduction in Accessmrcox
 
BTEC National in ICT: Unit 3 - MIS Features and Functions
BTEC National in ICT: Unit 3 - MIS Features and FunctionsBTEC National in ICT: Unit 3 - MIS Features and Functions
BTEC National in ICT: Unit 3 - MIS Features and Functionsmrcox
 
BTEC National in ICT: Unit 3 - Functional Areas of Xpect
BTEC National in ICT: Unit 3 - Functional Areas of XpectBTEC National in ICT: Unit 3 - Functional Areas of Xpect
BTEC National in ICT: Unit 3 - Functional Areas of Xpectmrcox
 
Unit 3 gathering information and data
Unit 3   gathering information and dataUnit 3   gathering information and data
Unit 3 gathering information and datamrcox
 
Regulatory framework of telecommunication
Regulatory framework of telecommunicationRegulatory framework of telecommunication
Regulatory framework of telecommunicationKarun Mahajan
 
PPT on Consumer Rights by Poojali
PPT on Consumer Rights by PoojaliPPT on Consumer Rights by Poojali
PPT on Consumer Rights by PoojaliPoojaliKrishna999
 
Consumer Contracts Regulations 2013 - a Guidance Note by Brian Miller Solicitor
Consumer Contracts Regulations 2013 - a Guidance Note by Brian Miller SolicitorConsumer Contracts Regulations 2013 - a Guidance Note by Brian Miller Solicitor
Consumer Contracts Regulations 2013 - a Guidance Note by Brian Miller SolicitorBrian Miller, Solicitor
 
Cultural factors effecting ict
Cultural factors effecting ictCultural factors effecting ict
Cultural factors effecting ictAdam Heatherington
 
BTEC National in ICT: Unit 3 - More on DFDs
BTEC National in ICT: Unit 3 - More on DFDsBTEC National in ICT: Unit 3 - More on DFDs
BTEC National in ICT: Unit 3 - More on DFDsmrcox
 
UNIT 2 P6 part 2
UNIT 2 P6 part 2UNIT 2 P6 part 2
UNIT 2 P6 part 2OriginalGSM
 
BTEC National in ICT: Unit 3 - Data vs Information
BTEC National in ICT: Unit 3 - Data vs InformationBTEC National in ICT: Unit 3 - Data vs Information
BTEC National in ICT: Unit 3 - Data vs Informationmrcox
 
Corporate-Espionage
Corporate-EspionageCorporate-Espionage
Corporate-EspionageSam
 
Limitations of marketing research
Limitations of marketing researchLimitations of marketing research
Limitations of marketing researchHari C
 

Andere mochten auch (20)

Legal, Ethical and Contractual constraints in the Media Industry
Legal, Ethical and Contractual constraints in the Media IndustryLegal, Ethical and Contractual constraints in the Media Industry
Legal, Ethical and Contractual constraints in the Media Industry
 
BTEC National in ICT: Unit 3 - Introduction in Access
BTEC National in ICT: Unit 3 - Introduction in AccessBTEC National in ICT: Unit 3 - Introduction in Access
BTEC National in ICT: Unit 3 - Introduction in Access
 
BTEC National in ICT: Unit 3 - MIS Features and Functions
BTEC National in ICT: Unit 3 - MIS Features and FunctionsBTEC National in ICT: Unit 3 - MIS Features and Functions
BTEC National in ICT: Unit 3 - MIS Features and Functions
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
Computer Misuse Act
Computer Misuse ActComputer Misuse Act
Computer Misuse Act
 
LO1
LO1LO1
LO1
 
Business growth consultant
Business growth consultantBusiness growth consultant
Business growth consultant
 
BTEC National in ICT: Unit 3 - Functional Areas of Xpect
BTEC National in ICT: Unit 3 - Functional Areas of XpectBTEC National in ICT: Unit 3 - Functional Areas of Xpect
BTEC National in ICT: Unit 3 - Functional Areas of Xpect
 
Unit 3 gathering information and data
Unit 3   gathering information and dataUnit 3   gathering information and data
Unit 3 gathering information and data
 
Regulatory framework of telecommunication
Regulatory framework of telecommunicationRegulatory framework of telecommunication
Regulatory framework of telecommunication
 
PPT on Consumer Rights by Poojali
PPT on Consumer Rights by PoojaliPPT on Consumer Rights by Poojali
PPT on Consumer Rights by Poojali
 
Consumer Contracts Regulations 2013 - a Guidance Note by Brian Miller Solicitor
Consumer Contracts Regulations 2013 - a Guidance Note by Brian Miller SolicitorConsumer Contracts Regulations 2013 - a Guidance Note by Brian Miller Solicitor
Consumer Contracts Regulations 2013 - a Guidance Note by Brian Miller Solicitor
 
Cultural factors effecting ict
Cultural factors effecting ictCultural factors effecting ict
Cultural factors effecting ict
 
BTEC National in ICT: Unit 3 - More on DFDs
BTEC National in ICT: Unit 3 - More on DFDsBTEC National in ICT: Unit 3 - More on DFDs
BTEC National in ICT: Unit 3 - More on DFDs
 
UNIT 2 P6 part 2
UNIT 2 P6 part 2UNIT 2 P6 part 2
UNIT 2 P6 part 2
 
BTEC National in ICT: Unit 3 - Data vs Information
BTEC National in ICT: Unit 3 - Data vs InformationBTEC National in ICT: Unit 3 - Data vs Information
BTEC National in ICT: Unit 3 - Data vs Information
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
 
Corporate-Espionage
Corporate-EspionageCorporate-Espionage
Corporate-Espionage
 
Limitations of marketing research
Limitations of marketing researchLimitations of marketing research
Limitations of marketing research
 
PPT on "Labour Laws in India"
PPT on "Labour Laws in India"PPT on "Labour Laws in India"
PPT on "Labour Laws in India"
 

Ähnlich wie BTEC National in ICT: Unit 3 - Legal Constraints

How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe onlineHadilAlHaj
 
Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemssaltashict
 
Business And The Law
Business And The LawBusiness And The Law
Business And The LawRobbieA
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Dr. Khaled Bakro
 
2 Understand what is meant by professional practice
2 Understand what is meant by professional practice2 Understand what is meant by professional practice
2 Understand what is meant by professional practiceMark Anthony Kavanagh
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerceDamo Ward
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11mrmwood
 
Computer Legislation2 T2
Computer Legislation2  T2Computer Legislation2  T2
Computer Legislation2 T2lees_ush
 
Super billing computer ethics, privacy and security
Super billing computer ethics, privacy and securitySuper billing computer ethics, privacy and security
Super billing computer ethics, privacy and securitysuperb11b
 
Chapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and SafeguardsChapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and Safeguardslobnaqassem2
 
3.6 legislation and regulations
3.6 legislation and regulations3.6 legislation and regulations
3.6 legislation and regulationsmrmwood
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industryjamiehaworth1
 
BS CS5 Lecture 5.pptx
BS CS5 Lecture 5.pptxBS CS5 Lecture 5.pptx
BS CS5 Lecture 5.pptxwhoiam36
 
Legal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptxLegal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptxKRITARTHBANSAL1
 
Bring your own device guidance
Bring your own device guidanceBring your own device guidance
Bring your own device guidanceGary Chambers
 
10. law invest & ethics
10. law invest & ethics10. law invest & ethics
10. law invest & ethics7wounders
 

Ähnlich wie BTEC National in ICT: Unit 3 - Legal Constraints (20)

How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systems
 
Business And The Law
Business And The LawBusiness And The Law
Business And The Law
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
 
needforsecurity
needforsecurityneedforsecurity
needforsecurity
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
 
2 Understand what is meant by professional practice
2 Understand what is meant by professional practice2 Understand what is meant by professional practice
2 Understand what is meant by professional practice
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerce
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11
 
Computer Legislation2 T2
Computer Legislation2  T2Computer Legislation2  T2
Computer Legislation2 T2
 
Issues related to ict
Issues related to ictIssues related to ict
Issues related to ict
 
Super billing computer ethics, privacy and security
Super billing computer ethics, privacy and securitySuper billing computer ethics, privacy and security
Super billing computer ethics, privacy and security
 
Chapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and SafeguardsChapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and Safeguards
 
3.6 legislation and regulations
3.6 legislation and regulations3.6 legislation and regulations
3.6 legislation and regulations
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industry
 
BS CS5 Lecture 5.pptx
BS CS5 Lecture 5.pptxBS CS5 Lecture 5.pptx
BS CS5 Lecture 5.pptx
 
Legal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptxLegal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptx
 
Bring your own device guidance
Bring your own device guidanceBring your own device guidance
Bring your own device guidance
 
10. law invest & ethics
10. law invest & ethics10. law invest & ethics
10. law invest & ethics
 

Kürzlich hochgeladen

4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEaurabinda banchhor
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxJanEmmanBrigoli
 

Kürzlich hochgeladen (20)

4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSE
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptx
 

BTEC National in ICT: Unit 3 - Legal Constraints

  • 2. Customer Data Policy  Formal document identifying the constraints or limitations in using customer information  statements of what should or should not be done  examples to make clear any statements you make  References to all the material, including any Acts of Parliament
  • 3. Data Protection Act of 12th July 1984 / 1998 Anyone processing personal data must comply with the eight enforceable principles of good practice. 1. Fairly and lawfully processed; 2. Processed for limited purposes; 3. Adequate, relevant and not excessive; 4. Accurate; 5. Not kept longer than necessary; 6. Processed in accordance with the data subject's rights; 7. Secure (no unauthorised access, alteration or disclosure) 8. Not transferred to other countries without adequate protection.
  • 4. The Information Commissioner  The Act established the office of Information Commissioner, whose duties include:  administering a public register of Data Users with broad details of the data held  investigating complaints and initiating prosecutions for breaches of the Act.  publishing several documents that offer guidelines to data users and computer bureaux.
  • 5. Registration  All Data Users have to register, giving:  their name and address (or that of their company) a description of the data held and its purpose a description of the sources from which the data is obtained a description of the persons to whom it is intended to disclose data
  • 6. Exemptions from the Act  The Act does not apply to payroll, pensions and accounts data, nor to names and addresses held for distribution purposes.  Registration may not be necessary when the data are for personal, family, household or recreational use.  Subjects do not have a right to access data if the sole aim of collecting it is for statistical or research purposes, or where it is simply for backup.  Data can be disclosed to the data subject’s agent (e.g. lawyer or accountant), to persons working for the data user, and in response to urgent need to prevent injury or damage to health.  Additionally, there are exemptions for special categories, including data held: - in connection with national security; - for prevention of crime; - for the collection of tax or duty.
  • 7. Software Copyright Laws  Computer software is now covered by the Copyright Designs and Patents Act of 1988, which covers a wide range of intellectual property such as music, literature and software.
  • 8. Copyright, Designs & Patents Act 1988  Provisions of the Act make it illegal to:  copy software  run pirated software  transmit software over a telecommunications line, thereby creating a copy
  • 9. The Computer Misuse Act of 1990  In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially where damage was done to data files, was a disciplinary offence, but there was no legislative framework within which a criminal prosecution could be brought.
  • 10. Computer Misuse Act of 1990  The Computer Misuse Act of 1990 defined three specific criminal offences to deal with the problems of hacking, viruses and other nuisances.  unauthorised access to computer programs or data  unauthorised access with a further criminal intent  unauthorised modification of computer material (i.e. programs or data)
  • 11. Computer Crime & The Law  Cracking (or Hacking)  Viruses  Trojans  Logic Bombs
  • 12. How A Virus Works 1. ORIGINATION - A programmer writes a program - the virus - to cause mischief or destruction. The virus is capable of reproducing itself 2. TRANSMISSION - Often, the virus is attached to a normal program. It then copies itself to other software on the hard disk 3. REPRODUCTION - When another drive is inserted into the computer’s disk drive, the virus copies itself on to the drive 4. INFECTION - Depending on what the original programmer wrote in the virus program, a virus may display messages, use up all the computer’s memory, destroy data files or cause serious system errors
  • 13. Health Hazards  Stress  RSI  Eyestrain  ELF radiation  Backache
  • 14. Display Screen Regulations 1992  Employers are required to  Perform an analysis of workstations in order to evaluate the safety and health conditions to which they give rise  Provide training to employees in the use of workstation components  Ensure employees take regular breaks or changes in activity  Provide regular eye tests for workstation users and pay for glasses
  • 15. Computers, Health And The Law  Employees have a responsibility to  Use workstations and equipment correctly, in accordance with training provided by employers  Bring problems to the attention of their employer immediately and co-operate in the correction of these problems
  • 16. Computers, Health and the law  Manufacturers are required to ensure that their products comply with the Directive. For example:  Screens must tilt and swivel  Keyboards must be separate and moveable  Notebook PCs are not suitable for entering large amounts of data
  • 17. The Ergonomic Environment Ergonomics refers to the design and functionality of the environment, and encompasses the entire range of environmental factors. Employers must give consideration to:  Lighting: office well lit, with blinds  Furniture: chairs of adjustable height, with tilting backrest, swiveling on five-point base  Work space: combination of chair, desk, computer, accessories, lighting, heating and ventilation all contribute to overall well-being  Noise: e.g. noisy printers relocated  Hardware: screen must tilt and swivel and be flicker-free, the keyboard separately attached  Software: should facilitate task, be easy to use and adaptable to user’s experience
  • 18. DRM  Music & Films  Technology to restrict where, how often, on what you can use it
  • 19. Proprietary Software  Sold under licence – not ownership  Unable to modify  Restricted rights to sell-on
  • 20. Open Source Movement  Have access to the source code – can therefore modify it  Redistribute the code or executable  Usually free to obtain
  • 21. The Rights of Data Subjects Apart from the right to complain to the Information Commissioner, data subjects also have a range of rights which they may exercise in the civil courts. These are:  Right to compensation for unauthorised disclosure of data (arising from principle no. 3);  Right to compensation for inaccurate data (arising out of principle no. 5);  Right of access to data and to apply for rectification or erasure where data are inaccurate (arising out of principle no. 7);  Right to compensation for unauthorised access, loss or destruction of data (arising out of principle no. 8).
  • 22. Relevant Legislation Data Protection  Data Protection Act 1998  Freedom of Information Act 2000 (FOIA) Usage of IT Systems  Computer Misuse Act 1990  Terrorism Act 2000  Privacy and Electronic Communications Regulations 2003