2. ITC Legislation
There is 4 types of ITC legislation:
Data Protection Act
The Data Protection Act 1998 (DPA) is an Act of Parliament of the United
Kingdom of Great Britain and Northern Ireland which defines UK law on
the processing of data on identifiable living people. It is the main piece of
legislation that governs the protection of personal data in the UK.
3. Computer Misuse Act
This was introduced to regulate personal data. This helps to provide protection
against the abuse of personal information.
Copyright & Patents Act
The Copyright, Designs and Patents Act 1988, is the current UK copyright law. It
gives the creators of literary, dramatic, musical and artistic works the right to
control the ways in which their material may be used.
4. Health and Safety Act
The Health and Safety at Work Act 1974 is the primary piece of legislation
covering occupational health and safety in Great Britain. The Health and
Safety Executive, with local authorities (and other enforcing authorities) is
responsible for enforcing the Act and a number of other Acts and
Statutory Instruments relevant to the working environment.
5. The risk of Using the Internet
Risk from viruses
• Some computer viruses are programmed to harm your computer by damaging
programs, deleting files, or reformatting the hard drive. Others simply replicate
themselves or flood a network with traffic, making it impossible to perform any
internet activity. Even less harmful computer viruses can significantly disrupt your
system’s performance, sapping computer memory and causing frequent computer
crashes.
• Use up to date anti-virus
The label "antivirus" was originally given to programs that identified and removed a
particular type of malware called a virus. Today, however, antivirus programs are useful
for preventing infections caused by many types of malware.
6. Risks from hackers
Hacker is a term used by some to mean "a clever programmer" and by
others, especially those in popular media, to mean "someone who tries to
break into computer systems.“
People are scouring the internet for news and information about their
favourite actors, actresses, and other high profile names. Hackers and
spammers use this phenomenon to their advantage, creating malicious
websites and selling allegedly legitimate ringtones and screensavers, even
wallpapers that contain malicious software hidden within them.
7. Fraud and Theft
Internet fraud is the use of Internet services or software with Internet access to
defraud victims or to otherwise take advantage of them; for example, by stealing
personal information, which can even lead to identity thief. A very common form of
Internet fraud is the distribution of rogue security software . Internet services can
be used to present fraudulent solicitations to prospective victims, to conduct
fraudulent transactions, or to transmit the proceeds of fraud to financial institutions
or to others connected with the scheme.
To avoid that you shouldn’t download music illegal, and do not open email
attachments from an unknown, suspicious, or untrustworthy source. If you're not
familiar with the sender, do not open, download, or execute any files or email
attachments.
8. Risk of Injury if you spend long hours on the
computer.
The use of visual display units (VDU) and other display screen equipment (DSE) has
been related to various symptoms to do with sight and working posture. These
symptoms are often perceived as fatigue of some kind. Applying simple ergonomic
principles to the layout of your work area and how you study can readily prevent
them.
Try to position the monitor to minimize glare and reflections on the screen. Suitable
lighting is important: remember that glare can occur either directly or by reflection
from the screen. Glare from windows can usually be eliminated by curtains or blinds, or
by facing the screen in a different direction. It might be a good idea to make
adjustments from time to time during the day, as light changes. You should have
general lighting, by artificial or natural light or both, that illuminates the whole room
adequately.