Acts For Computers


Published on

Published in: Health & Medicine, Business
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Acts For Computers

  1. 1. Copyright, Designs and Patents act of 1988
  2. 2. What do YOU think it covers?
  3. 3. What does the copyright, designs and patents act of 1988 actually cover? <ul><li>Literary   Song lyrics, manuscripts, manuals…or anything written </li></ul><ul><li>Dramatic   Plays, dance, etc. </li></ul><ul><li>Musical   Recordings and score. </li></ul><ul><li>Artistic   Photography, painting, architecture, technical drawings/diagrams, maps, logos, etc. </li></ul><ul><li>Typographical arrangement of published editions Magazines, periodicals, etc. </li></ul><ul><li>Sound recordings May be recordings of works, e.g. musical and literary. </li></ul><ul><li>Films   Broadcasts and cable programmes. </li></ul>
  4. 4. Main ideas of copyright, designs and patents act… <ul><li>Literacy work is under this act for 70 years, </li></ul><ul><li>Sound Recordings and broadcasts 50 years </li></ul><ul><li>Films are only protected for 70 years, after that they are allowed to be copied and used in any way. </li></ul><ul><li>Typographical work is copyrighted for 25 years. </li></ul>
  5. 5. Computers Misuse act
  6. 6. Computer misuse act’s 3 main offences… <ul><li>Unauthorised access to computer material (that is, a program or data). </li></ul><ul><li>Unauthorised access to a computer system with intent to commit or facilitate the commission of a serious crime. </li></ul><ul><li>Unauthorised modification of computer material. </li></ul>
  7. 7. Health and safety regulations Display Screen Equipment
  8. 8. There are 4 main points
  9. 9. Risk assessments <ul><li>Employers must carry out a risk assessment of workstations used by employees in order to reduce any identified risks. </li></ul>
  10. 10. Rest from screens <ul><li>Employers must ensure that employees take regular and adequate breaks from looking at their screens. </li></ul>
  11. 11. Regular Eye examinations <ul><li>Employers must ensure that employees are aware of their entitlement to yearly eye tests </li></ul><ul><li>the eye test must be carried out by a qualified optician. </li></ul><ul><li>And the employer would be advised to keep a written record of who receives free eye tests. </li></ul>
  12. 12. Health and safety training <ul><li>Employers must provide their computer users with adequate health and safety training for any workstation they work at.. </li></ul>
  13. 13. Main problems encountered in the workstations <ul><li>Tiredness caused by badly designed or adjusted workstations. </li></ul><ul><li>2. Repetitive strain injury (RSI) and carpal tunnel syndrome. </li></ul><ul><li>3. Eye strain leading to headaches, fatigue and sore eyes. </li></ul>
  14. 14. Solutions to encountered problems <ul><li>There should be blinds put in place to reduce the amount of glare in the workplace </li></ul><ul><li>Of course the employee is entitled to a 5 minute break every 30 minutes </li></ul><ul><li>Wires and cables should be kept far away from employee`s , or else they may fall and hurt themselves </li></ul>
  15. 15. Data Protection Act 1998 <ul><li>1 . Be obtained and processed fairly and lawfully (that the subject of the data has </li></ul><ul><li>consented to its collection and use.) </li></ul><ul><li>2. Be held only for specified purposes. </li></ul><ul><li>3. Be adequate, relevant but not excessive. </li></ul><ul><li>4. Be accurate and kept up to date. </li></ul><ul><li>5. Be held for no longer than necessary. </li></ul><ul><li>6. Be accessible to data subjects. </li></ul><ul><li>7. Be subject to the appropriate security measures. </li></ul><ul><li>8. Not be transferred outside the European Economic Area. Regulation of Investigatory Powers Act 2000 </li></ul>
  16. 16. Regulation of Investigatory Powers Act 2000 <ul><li>The Regulation of Investigatory Powers Act allows the government to access a person's electronic communications. </li></ul><ul><li>Enables the government to demand that an Internet service provider provides access to a customer's communications in secret; </li></ul><ul><li>Enables mass surveillance of communications in transit; </li></ul><ul><li>Enables the government to demand Internet Service Providers fit equipment to facilitate surveillance; </li></ul><ul><li>Enables the government to demand that someone hands over keys to protected information; </li></ul><ul><li>Allows the government to monitor people's internet activities; </li></ul><ul><li>Prevents the existence of interception warrants and any data collected with them from being revealed in court </li></ul>