Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

It legislation


Published on

A very basic introduction to legislation in Information Communication Technology designed for learners with little or no knowledge of IT.

Published in: Education, Technology
  • Be the first to comment

  • Be the first to like this

It legislation

  1. 1. Information Communication TechnologyAn Introduction to Legislation in the UK Stonemasonry Department 2012
  2. 2. LegislationNow that you understand what ICT can be used for, and howyou interact with it through hardware devices and software applications it is important to know about the legislation which covers the use of ICT in the United Kingdom. In this presentation you will learn about: The Computer Misuse Act 1990 The Data Protection Act Copyright Law
  3. 3. Computer Misuse Act 1990 This act makes it illegal to do any of the following: Access computer material without permission, eg looking at someone elses files. Access computer material without permission with intent to commit further criminal offences, eg hacking into the banks computer and wanting to increase the amount in your account. Alter computer data without permission, eg writing a virus to destroy someone elses data, or actually changing the money in an account.Information taken directly from
  4. 4. Is Hacking Illegal?The short answer to this question is NO! Hacking is not illegalprovided you are doing it for legitimate purposes. Computerhackers are split into three distinct groups; black hat, grey hat and white hat. ILLEGAL ILLEGAL LEGAL (but not criminal)
  5. 5. Is Hacking Illegal? Black hat hackers target the websites/data of organisations or people without permission and with the intent of causing harm, stealing files or profiting as a direct result of gaining access to a system. Grey hat hackers also gain access to systems without the permission of the owner but once in, they either inform the owner of how to improve security or fix any flaws themselves. White hat hackers gain access to systems with the permission of the owner. They carry out penetration testing “pen tests” to make sure that systems are secure.
  6. 6. The Data Protection Act (1998) The DPA 1998 was passed by Parliament to control the way information is handled and to give legal rights to people who have information stored about them. Some data and information stored on a computer is personal and needs to be kept confidential. People want to keep their pay, bank details, and medical records private and away from the view of just anybody. If someone who is not entitled to see these details can obtain access without permission it is unauthorised access. The Data Protection Act sets up rules to prevent this happening.Information taken directly from
  7. 7. Copyright Law This provides protection to the owners of the copyright and covers the copying of written, musical, or film works using computers. FAST is the industry body which is against software theft. There have been cases where laws such as Copyright have been used to crack down on file sharing websites or individuals who store and illegally distribute copyrighted material, eg music. There is a massive problem with many people around the world obtaining copyrighted material illegally.Information taken directly from
  8. 8. Developed by The Stonemasonry Department City of Glasgow College 2012