SlideShare a Scribd company logo
1 of 9
Understand what is meant by professional practice
Data protection act
The Data Protection Act 1998 (DPA) isan Act of Parliamentof the United
Kingdom of GreatBritain and Northern Ireland which definesUK law on the
processing of data on identifiable living people. It is the main piece of
legislation that governsthe protection of personaldata in the UK.
The data protection act controls how personalinformation about you or an
individual is used by –
 Businesses
 Organisations
 The government
Every one using data has strict guidelines to follow and has to ensurethat the
information is used –
 Fairly
 Lawfully
 For specific stated purposes in a limited capacity
 Kept safe and secure
 Only for as long as necessary
 Accurate
 Within the persons data protection rights
 Not transferred out side of the uk without necessary protection
Computer misuse act
The Computer Misuse Act 1990 isa law passed by the British government. It
wasintroduced to try to fightthe growing threatof hackersand hacking. The
law has three parts. In the U.K., it is now a crime to. Access a computer without
permission
Offence 1
A person is guilty of an offence if:
1. They cause a computer to perform functions with intentions to secure
or access to any programor data held in a computer
2. The access they intend to secureis unauthorized
3. They know at the time when they causethe computer to perform the
function that is the case.
The intent a person has to commit any offenceunder this section does
not need to be directed
1. Any particular programor data
2. A programor data of any particular kind
3. A programor data held in any particular computer
Any person(s) guilty of an offenceunder this section shallbe liable to a
summary conviction to imprisonmentfor a term of six months or a fine
or both.
Offence 2
2. An unauthorised access with intent to commit or bring about of
further offences.
A person is guilty of an offence under this section if he/she commits an
offence under section 1 above("the unauthorized access offence") with
intent
1. To commit an offence to which this section applies
2. To facilitate the commission of such an offence (whether by them self
or by any other person) and the offence they intend to commit or
facilitate is referred to below in as a further offence.
This section applies to offences
1. For which the sentence is fixed by law
2. For which a person of twenty one years of age or over (not previously
convicted) may be sentenced to imprisonmentfor a term of five years.
Itis immaterial for the purposes of this section whether or not a further
offence is going to be committed on the same occasion as the
unauthorised access offenceor on any future occasion.
A person guilty of an offenceunder this section shall be liable to
1. A summary conviction, to imprisonmentfor a term not exceeding six
months
2. on conviction to imprisonmentfor a term not exceeding five years, or
to a fine, or both.
Offence 3
3. Unauthorised modification of computer material.
A person is guilty of an offence if
1. he/she does any act which causes the unauthorized modification of
the contents of any computer
2. At the time when he does the act he has the requisite intent and the
requisite knowledge.
For the purposes of above, the intent to cause a modification of the
contents of any computer and by so doing:
1. impairs the operation of any computer
2. prevents or hinders access to programs or data held in any computer
3. To impair the operations of any such program or the reliability of any
such data
The intent need doesn’tneed to be directed at
1. Any particular computer
2. Any programor data or a program of any particular kind
3. Any particular modification
The computer misuseact was designed to protect users from wilfully made
attacks and theft of personalinformation (if you think, today what type of
information you haveavailable on mostcomputers/smartphones, so for an
example imagine identity theft)
Personnelinformation such as –
 Email addresses
 Home addresses
 Family members
 Bank accountinformation including financial access
 Pin numbers and passwords
 Photographs
Any of this information gained illegally through a computer would constitute as
computer misuseand outsideof defined guidelines of the data protection act.
Those annoy calls you get aboutPPI claims from various companies have
probably gained your information through another party without your consent
which may well be outside of the guide lines stated for your data protection.
Quality management and systems
 Description - Quality control(QC) is a procedureor set of procedures
intended to ensurethat a productor serviceadheres to a defined set of
quality criteria or meets the requirements of the client or customer
 A quality management system (QMS) is a collection of business
processes focused on achieving quality policy and quality objectives to
meet customer requirements. Itis expressed as the organised structure,
policies, procedures, processes and resourcesneeded to implement
quality management.
Think of a new apple iPhone, the process it takes to make it and test it, this
would include whatthey want it to do such as -
 Battery life
 Storagecapacity
 Compatibility with other apple devices such as speakers (etc.)
 Blue tooth pairing
 Sending and receiving messages/phonecalls
 Camera definitions and pixels
 Accessibility
 User friendly capability
 Languagemodes
These could be listed off as quality controlmeasures but hey would have to be
managed and havestandardised testing in order for them to be effective with
in the systems thatthey operate on.
Now that is one productand would have to come with guidelines for use (how
it operates what you can and can`tdo with it) and a manufactures warranty
(like a car) so if in the event it does stop working or functioning they way It
should it can be replaced or fixed after find out the underlying problem as to
easily useby the products target.
Management systemstandards provide models to follow when setting up and
operating a management system. Like all standards, they are the resultof trial
and error and is therefore able to offer and benefit management experience
and good practice. These standards can be applied to any organisation, largeor
small, whatever the productor serviceand regardless of the sector.
The benefits of an effective management system include:
•more efficient useof resources
•improved risk management
•increased customer satisfaction as services and products consistently deliver
what they promise.
Think of buying a car, you want it to turn over when you turn the ignition and
drive away, seats steering wheel and all that was promised in the car when you
bought it you wantto work this would be wherequality management makes
sureit does what it needs to. This is also applied in systems development trial
and error making it work better than it previously did before being put to use.
Identifying professional bodiesfor IT UK
 British Computer Society (BCS)
 Institution of Engineering and Technology (IET)
 UK ITAssociation (UKITA)
 UKITA represents ITSMEs throughoutthe UK and is part of the wider
network in Europe.
 Association of Computer Professionals - the Association of Computer
Professionals (ACP) is an independent, professionalexamining body, set
up in 1984, its Council Members working in both the education and
commercial sectors of the computer industry.
 British Computer Society/Chartered Institutefor IT - The British
Computer Society, formed in 1957, is a registered charity which was
incorporated by RoyalCharter in 1984. Itaims to promote the study of
communication and computing technology, and to advance
understanding and education of the ICTin modern society.
 ISACA - As an independent, non-profit, globalassociation, ISACA
engages in the development, adoption and use of globally accepted,
industry-leading knowledgeand practices for information systems.
Members and benefits
ITP is an example of a company that offers benefits to the below listed
members, benefits are offered to corporateand individual members such a
students and apprentices.
Benefits for corporatemembership include-
 Providing leadership and guidance
 All PR and media related opportunities
 Invitations to apprentice schemes
 Easier access to telecoms markets in Europe
 Help with professionalregistration for employees
 Promotion of products through advertising
 Event management at strategic and important locations allowing
opportunities to invite key people
 Invitations to senior level meetings allowing you to network with like-
minded people in a social environment
 The opportunity to attend key seminars and address key topics
ITP members work for over 200 differentorganisation across the
industry and across the UK, Europe and worldwide. The ITP has
members from the following organisations.
3 IExpE PTC
3M
Informa Telecoms &
Media
Radiant Networks
Accenture
Institution of Civil
Engineering Surveyors
Red Bee Media
ADC Krone Intellect Red.es
Adva Optical Networking Interface Components SAS UK
Alcatel-Lucent
Interoute
Communications Ltd
Saudi Data
Alternative Networks Limited Investec Schmid Telecom
Amino Communication Invomo Scottish Enterprise
Amobee Iona
Securities & Investment
Institute
AOL UK ITV plc Share Witness
Apprenticeship Ambassadors
Network
JDSU UK Ltd
Siemens Enterprise
Communications
AT&T JMW Worldwide UK ltd Siemens Networks Ltd
ATL Telecom Ltd Jones Lang LaSalle
Singapore
Telecommunications Ltd
Avaya Communications Juniper Networks SIRE Technology
Azzurri Technology Ltd King's College London Sky
BAE Systems
Kingston
Communications
Sony
Bangla Trac Communications
Ltd
KPMG
Spanish Association of
Telecommunication
Engineers
BBC Lattelecom Ltd Stuffed Animals Media
BDO International Lavoisier SAS Success Networks
Broadband Stakeholder
Group
Lehman Sun Micro
Broadband Wireless
Association
Logica T-Mobile
BSkyB
London School of
Economics
TalkTalk Group
BT Group - Design, Global
Seervices, Retail, Wholesale
Lucent Technologies Tandberg
Cable & Wireless
Mainzer Singakademie
e.V.
Tata Consultancy Services
Capgemini Manchester University tdl advies
Carphone Warehouse
Services Ltd.
MCI Tech Mahindra
Cegos
Medical Research
Council
Telcordia International
CES Telecom Ltd Medlock Group Telecoms Markets
Ciena Mentor Europe Telefonica 02 Europe Plc
Cisco Systems
Mentoring and
Befriending Foundation
Telekom Austria
Cochrane Associates Merrill Lynch Telenor Nordic
Colt Telecom Group plc Ministry of Defense Telent
Comms Business MLL Telecom TeliaSonera
Compuware Mobile Express Limited Tellabs
Comtec
Modular Networks
Solutions
Telstra
Detica Motorola
The Network Operations
Centre
Deutsche Telekom AG NEC The Royal School of Signals
Disney News International Thomson
e-skills UK NHS Thus
ECI Telecom
Nokia Siemens
Networks UK Limited
Timico
EDS Nomura International Plc Tiscali UK Ltd
Eircom Nortel Toshiba
Engineering Council Nova Incepta Total Telecom
Enterprise and Regulatory
Reform
NTL:Telewest TP/S
Enterprise plc O2 UK Trackdale
Ericsson Ofcom TS Technology Services
Ernst & Young Opal Telecom University College London
ETC Open University University of Antwerp
FDF Openwave Systems University of Bath
Fibernet Oracle University of Patras
FirstCapital Orange
University of Southern
California
Flag Telecom OTE SA University of Valladolid
France Telecom
Otto Harrassowitz
GmbH & Co. KG
Valuestream Consulting Ltd
Fujitsu Telecommunications
Europe
Ovum Vanco Direct
Gamma Telecom P&T Luxembourg Verizon
Ghent University - IBBT Parsons Viatel
Global Crossing (UK)
Telecommunications Ltd
Patni Virgin Media
Global Telecoms Business PFJ Vocel
Google
Pirelli Telecom Cables &
Systems UK
Vodafone Group
Grant Thornton International Plantronics Vonage
Greenwoods
Communications
pod3.tv Ltd VQ Centre
Grosvenor Group
Polish
Telecommunication
Engineers
VTL UK Ltd
Hellenic Telecommunications Porta Systems Ltd Warid Telecommunication
Hewlett Packard Prenax Ltd Warwickshire College
Hongkong Telecom Presswire
Welsh Assembly
Government
Hutchinson Europe Procera Networks Westell
Hutchison 3 Provide Consulting Wrekin
IBA International Proxim
IET PS Wines

More Related Content

What's hot

Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemssaltashict
 
La1 Computer Crimes
La1 Computer CrimesLa1 Computer Crimes
La1 Computer CrimesCma Mohd
 
Societal impacts PART 1
Societal impacts PART 1Societal impacts PART 1
Societal impacts PART 1AVISHITYAGI
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekarPravinGhosekar
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesTushar B Kute
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRP6997
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital ageatuljaybhaye
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2Vikas Saw
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security lawsNasir Bhutta
 
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...Prof. (Dr.) Tabrez Ahmad
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIAAnish Rai
 
VTU - MIS Module 8 - Security and Ethical Challenges
VTU - MIS Module 8 -  Security and Ethical ChallengesVTU - MIS Module 8 -  Security and Ethical Challenges
VTU - MIS Module 8 - Security and Ethical ChallengesPriya Diana Mercy
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theftAmber Gupta
 
GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network InfrastructureMuhammad Zeeshan
 

What's hot (20)

Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systems
 
La1 Computer Crimes
La1 Computer CrimesLa1 Computer Crimes
La1 Computer Crimes
 
ICT Cybe laws
ICT Cybe lawsICT Cybe laws
ICT Cybe laws
 
Societal impacts PART 1
Societal impacts PART 1Societal impacts PART 1
Societal impacts PART 1
 
New CIO Challenges
New CIO ChallengesNew CIO Challenges
New CIO Challenges
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekar
 
IT Policy
IT PolicyIT Policy
IT Policy
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical Challenges
 
Ethics and information security 2
Ethics and information security 2Ethics and information security 2
Ethics and information security 2
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
VTU - MIS Module 8 - Security and Ethical Challenges
VTU - MIS Module 8 -  Security and Ethical ChallengesVTU - MIS Module 8 -  Security and Ethical Challenges
VTU - MIS Module 8 - Security and Ethical Challenges
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theft
 
GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network Infrastructure
 
Ethics in-information-security
Ethics in-information-securityEthics in-information-security
Ethics in-information-security
 

Similar to 2 Understand what is meant by professional practice

Automatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy StandardsAutomatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy Standardsautomatskicorporation
 
The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowSymantec
 
EU GDPR: What You Really Need to Know
EU GDPR: What You Really Need to Know EU GDPR: What You Really Need to Know
EU GDPR: What You Really Need to Know Sarah Crabb
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggadabotor7
 
BTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal ConstraintsBTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal Constraintsmrcox
 
Five strategies for gdpr compliance
Five strategies for gdpr complianceFive strategies for gdpr compliance
Five strategies for gdpr compliancePeter Goldbrunner
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)scobycakau
 
Compliance for Real-Time communications-June2016
Compliance for Real-Time communications-June2016Compliance for Real-Time communications-June2016
Compliance for Real-Time communications-June2016Mohan C. de SILVA
 
Compliance in Unified Communications & Collaboration- The Financial Sector (1)
Compliance in Unified Communications & Collaboration- The Financial Sector (1)Compliance in Unified Communications & Collaboration- The Financial Sector (1)
Compliance in Unified Communications & Collaboration- The Financial Sector (1)Steve Hood
 
Compliance in Unified Communications & Collaboration- The Financial Sector (1)
Compliance in Unified Communications & Collaboration- The Financial Sector (1)Compliance in Unified Communications & Collaboration- The Financial Sector (1)
Compliance in Unified Communications & Collaboration- The Financial Sector (1)Steven Pearson
 
Compliance in Unified Communications & Collaboration- The Financial Sector (1)
Compliance in Unified Communications & Collaboration- The Financial Sector (1)Compliance in Unified Communications & Collaboration- The Financial Sector (1)
Compliance in Unified Communications & Collaboration- The Financial Sector (1)Alan Coleman
 
What will be the Impact of GDPR Compliance in EU & UK?
What will be the Impact of GDPR Compliance in EU & UK?What will be the Impact of GDPR Compliance in EU & UK?
What will be the Impact of GDPR Compliance in EU & UK?Cigniti Technologies Ltd
 
Security Management | System Administration
Security Management | System AdministrationSecurity Management | System Administration
Security Management | System AdministrationLisa Dowdell, MSISTM
 
Generic_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresGeneric_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresSamuel Loomis
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Lumension
 
Compliance policies and procedures followed in data centers
Compliance policies and procedures followed in data centersCompliance policies and procedures followed in data centers
Compliance policies and procedures followed in data centersLivin Jose
 
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 EuroCloud
 

Similar to 2 Understand what is meant by professional practice (20)

Automatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy StandardsAutomatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy Standards
 
The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t know
 
EU GDPR: What You Really Need to Know
EU GDPR: What You Really Need to Know EU GDPR: What You Really Need to Know
EU GDPR: What You Really Need to Know
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
BTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal ConstraintsBTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal Constraints
 
Five strategies for gdpr compliance
Five strategies for gdpr complianceFive strategies for gdpr compliance
Five strategies for gdpr compliance
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)
 
Compliance for Real-Time communications-June2016
Compliance for Real-Time communications-June2016Compliance for Real-Time communications-June2016
Compliance for Real-Time communications-June2016
 
Compliance in Unified Communications & Collaboration- The Financial Sector (1)
Compliance in Unified Communications & Collaboration- The Financial Sector (1)Compliance in Unified Communications & Collaboration- The Financial Sector (1)
Compliance in Unified Communications & Collaboration- The Financial Sector (1)
 
Compliance in Unified Communications & Collaboration- The Financial Sector (1)
Compliance in Unified Communications & Collaboration- The Financial Sector (1)Compliance in Unified Communications & Collaboration- The Financial Sector (1)
Compliance in Unified Communications & Collaboration- The Financial Sector (1)
 
Compliance in Unified Communications & Collaboration- The Financial Sector (1)
Compliance in Unified Communications & Collaboration- The Financial Sector (1)Compliance in Unified Communications & Collaboration- The Financial Sector (1)
Compliance in Unified Communications & Collaboration- The Financial Sector (1)
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Topic 7
Topic 7Topic 7
Topic 7
 
What will be the Impact of GDPR Compliance in EU & UK?
What will be the Impact of GDPR Compliance in EU & UK?What will be the Impact of GDPR Compliance in EU & UK?
What will be the Impact of GDPR Compliance in EU & UK?
 
Security Management | System Administration
Security Management | System AdministrationSecurity Management | System Administration
Security Management | System Administration
 
Generic_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresGeneric_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_Procedures
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?
 
Compliance policies and procedures followed in data centers
Compliance policies and procedures followed in data centersCompliance policies and procedures followed in data centers
Compliance policies and procedures followed in data centers
 
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
 

2 Understand what is meant by professional practice

  • 1. Understand what is meant by professional practice Data protection act The Data Protection Act 1998 (DPA) isan Act of Parliamentof the United Kingdom of GreatBritain and Northern Ireland which definesUK law on the processing of data on identifiable living people. It is the main piece of legislation that governsthe protection of personaldata in the UK. The data protection act controls how personalinformation about you or an individual is used by –  Businesses  Organisations  The government Every one using data has strict guidelines to follow and has to ensurethat the information is used –  Fairly  Lawfully  For specific stated purposes in a limited capacity  Kept safe and secure  Only for as long as necessary  Accurate  Within the persons data protection rights  Not transferred out side of the uk without necessary protection Computer misuse act The Computer Misuse Act 1990 isa law passed by the British government. It wasintroduced to try to fightthe growing threatof hackersand hacking. The law has three parts. In the U.K., it is now a crime to. Access a computer without permission
  • 2. Offence 1 A person is guilty of an offence if: 1. They cause a computer to perform functions with intentions to secure or access to any programor data held in a computer 2. The access they intend to secureis unauthorized 3. They know at the time when they causethe computer to perform the function that is the case. The intent a person has to commit any offenceunder this section does not need to be directed 1. Any particular programor data 2. A programor data of any particular kind 3. A programor data held in any particular computer Any person(s) guilty of an offenceunder this section shallbe liable to a summary conviction to imprisonmentfor a term of six months or a fine or both. Offence 2 2. An unauthorised access with intent to commit or bring about of further offences. A person is guilty of an offence under this section if he/she commits an offence under section 1 above("the unauthorized access offence") with intent 1. To commit an offence to which this section applies 2. To facilitate the commission of such an offence (whether by them self or by any other person) and the offence they intend to commit or facilitate is referred to below in as a further offence. This section applies to offences 1. For which the sentence is fixed by law 2. For which a person of twenty one years of age or over (not previously convicted) may be sentenced to imprisonmentfor a term of five years.
  • 3. Itis immaterial for the purposes of this section whether or not a further offence is going to be committed on the same occasion as the unauthorised access offenceor on any future occasion. A person guilty of an offenceunder this section shall be liable to 1. A summary conviction, to imprisonmentfor a term not exceeding six months 2. on conviction to imprisonmentfor a term not exceeding five years, or to a fine, or both. Offence 3 3. Unauthorised modification of computer material. A person is guilty of an offence if 1. he/she does any act which causes the unauthorized modification of the contents of any computer 2. At the time when he does the act he has the requisite intent and the requisite knowledge. For the purposes of above, the intent to cause a modification of the contents of any computer and by so doing: 1. impairs the operation of any computer 2. prevents or hinders access to programs or data held in any computer 3. To impair the operations of any such program or the reliability of any such data The intent need doesn’tneed to be directed at 1. Any particular computer 2. Any programor data or a program of any particular kind 3. Any particular modification The computer misuseact was designed to protect users from wilfully made attacks and theft of personalinformation (if you think, today what type of information you haveavailable on mostcomputers/smartphones, so for an example imagine identity theft)
  • 4. Personnelinformation such as –  Email addresses  Home addresses  Family members  Bank accountinformation including financial access  Pin numbers and passwords  Photographs Any of this information gained illegally through a computer would constitute as computer misuseand outsideof defined guidelines of the data protection act. Those annoy calls you get aboutPPI claims from various companies have probably gained your information through another party without your consent which may well be outside of the guide lines stated for your data protection. Quality management and systems  Description - Quality control(QC) is a procedureor set of procedures intended to ensurethat a productor serviceadheres to a defined set of quality criteria or meets the requirements of the client or customer  A quality management system (QMS) is a collection of business processes focused on achieving quality policy and quality objectives to meet customer requirements. Itis expressed as the organised structure, policies, procedures, processes and resourcesneeded to implement quality management. Think of a new apple iPhone, the process it takes to make it and test it, this would include whatthey want it to do such as -  Battery life  Storagecapacity  Compatibility with other apple devices such as speakers (etc.)  Blue tooth pairing  Sending and receiving messages/phonecalls  Camera definitions and pixels  Accessibility  User friendly capability  Languagemodes
  • 5. These could be listed off as quality controlmeasures but hey would have to be managed and havestandardised testing in order for them to be effective with in the systems thatthey operate on. Now that is one productand would have to come with guidelines for use (how it operates what you can and can`tdo with it) and a manufactures warranty (like a car) so if in the event it does stop working or functioning they way It should it can be replaced or fixed after find out the underlying problem as to easily useby the products target. Management systemstandards provide models to follow when setting up and operating a management system. Like all standards, they are the resultof trial and error and is therefore able to offer and benefit management experience and good practice. These standards can be applied to any organisation, largeor small, whatever the productor serviceand regardless of the sector. The benefits of an effective management system include: •more efficient useof resources •improved risk management •increased customer satisfaction as services and products consistently deliver what they promise. Think of buying a car, you want it to turn over when you turn the ignition and drive away, seats steering wheel and all that was promised in the car when you bought it you wantto work this would be wherequality management makes sureit does what it needs to. This is also applied in systems development trial and error making it work better than it previously did before being put to use. Identifying professional bodiesfor IT UK  British Computer Society (BCS)  Institution of Engineering and Technology (IET)  UK ITAssociation (UKITA)  UKITA represents ITSMEs throughoutthe UK and is part of the wider network in Europe.
  • 6.  Association of Computer Professionals - the Association of Computer Professionals (ACP) is an independent, professionalexamining body, set up in 1984, its Council Members working in both the education and commercial sectors of the computer industry.  British Computer Society/Chartered Institutefor IT - The British Computer Society, formed in 1957, is a registered charity which was incorporated by RoyalCharter in 1984. Itaims to promote the study of communication and computing technology, and to advance understanding and education of the ICTin modern society.  ISACA - As an independent, non-profit, globalassociation, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledgeand practices for information systems. Members and benefits ITP is an example of a company that offers benefits to the below listed members, benefits are offered to corporateand individual members such a students and apprentices. Benefits for corporatemembership include-  Providing leadership and guidance  All PR and media related opportunities  Invitations to apprentice schemes  Easier access to telecoms markets in Europe  Help with professionalregistration for employees  Promotion of products through advertising  Event management at strategic and important locations allowing opportunities to invite key people  Invitations to senior level meetings allowing you to network with like- minded people in a social environment  The opportunity to attend key seminars and address key topics
  • 7. ITP members work for over 200 differentorganisation across the industry and across the UK, Europe and worldwide. The ITP has members from the following organisations. 3 IExpE PTC 3M Informa Telecoms & Media Radiant Networks Accenture Institution of Civil Engineering Surveyors Red Bee Media ADC Krone Intellect Red.es Adva Optical Networking Interface Components SAS UK Alcatel-Lucent Interoute Communications Ltd Saudi Data Alternative Networks Limited Investec Schmid Telecom Amino Communication Invomo Scottish Enterprise Amobee Iona Securities & Investment Institute AOL UK ITV plc Share Witness Apprenticeship Ambassadors Network JDSU UK Ltd Siemens Enterprise Communications AT&T JMW Worldwide UK ltd Siemens Networks Ltd ATL Telecom Ltd Jones Lang LaSalle Singapore Telecommunications Ltd Avaya Communications Juniper Networks SIRE Technology Azzurri Technology Ltd King's College London Sky BAE Systems Kingston Communications Sony Bangla Trac Communications Ltd KPMG Spanish Association of Telecommunication Engineers BBC Lattelecom Ltd Stuffed Animals Media BDO International Lavoisier SAS Success Networks Broadband Stakeholder Group Lehman Sun Micro Broadband Wireless Association Logica T-Mobile BSkyB London School of Economics TalkTalk Group BT Group - Design, Global Seervices, Retail, Wholesale Lucent Technologies Tandberg Cable & Wireless Mainzer Singakademie e.V. Tata Consultancy Services Capgemini Manchester University tdl advies
  • 8. Carphone Warehouse Services Ltd. MCI Tech Mahindra Cegos Medical Research Council Telcordia International CES Telecom Ltd Medlock Group Telecoms Markets Ciena Mentor Europe Telefonica 02 Europe Plc Cisco Systems Mentoring and Befriending Foundation Telekom Austria Cochrane Associates Merrill Lynch Telenor Nordic Colt Telecom Group plc Ministry of Defense Telent Comms Business MLL Telecom TeliaSonera Compuware Mobile Express Limited Tellabs Comtec Modular Networks Solutions Telstra Detica Motorola The Network Operations Centre Deutsche Telekom AG NEC The Royal School of Signals Disney News International Thomson e-skills UK NHS Thus ECI Telecom Nokia Siemens Networks UK Limited Timico EDS Nomura International Plc Tiscali UK Ltd Eircom Nortel Toshiba Engineering Council Nova Incepta Total Telecom Enterprise and Regulatory Reform NTL:Telewest TP/S Enterprise plc O2 UK Trackdale Ericsson Ofcom TS Technology Services Ernst & Young Opal Telecom University College London ETC Open University University of Antwerp FDF Openwave Systems University of Bath Fibernet Oracle University of Patras FirstCapital Orange University of Southern California Flag Telecom OTE SA University of Valladolid France Telecom Otto Harrassowitz GmbH & Co. KG Valuestream Consulting Ltd Fujitsu Telecommunications Europe Ovum Vanco Direct Gamma Telecom P&T Luxembourg Verizon Ghent University - IBBT Parsons Viatel Global Crossing (UK) Telecommunications Ltd Patni Virgin Media Global Telecoms Business PFJ Vocel
  • 9. Google Pirelli Telecom Cables & Systems UK Vodafone Group Grant Thornton International Plantronics Vonage Greenwoods Communications pod3.tv Ltd VQ Centre Grosvenor Group Polish Telecommunication Engineers VTL UK Ltd Hellenic Telecommunications Porta Systems Ltd Warid Telecommunication Hewlett Packard Prenax Ltd Warwickshire College Hongkong Telecom Presswire Welsh Assembly Government Hutchinson Europe Procera Networks Westell Hutchison 3 Provide Consulting Wrekin IBA International Proxim IET PS Wines