Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Computer Legislation2 T2


Published on

  • Be the first to comment

  • Be the first to like this

Computer Legislation2 T2

  1. 1. Computer Legislation
  2. 2. Computer Legislation <ul><li>With many of our private and confidential records being stored on computer databases, laws and regulations had to be brought in to govern the access and storage. </li></ul><ul><li>All our medical records / credit history and bank details are stored on databases. </li></ul>
  3. 3. Data Protection Act 1984,1988 &1998 <ul><li>This law has change over the years to move with technology. </li></ul><ul><li>The law was introduced to protect the privacy of people whose information is stored on the computers. </li></ul><ul><li>Companies which store information are governed by guidelines that limits access to your information. </li></ul><ul><li>Businesses have to make sure they adhere to the laws. </li></ul>
  4. 4. 8 Principles of the Data Protection Act <ul><li>You can not store personal data un-less the data subject has given permission. </li></ul><ul><li>Data can only be used for the purpose it was given. </li></ul><ul><li>Only data relevant to that activity may be asked and stored. </li></ul><ul><li>Regular updates must be undertaken </li></ul><ul><li>Data must only be stored as long as necessary. </li></ul><ul><li>The data stored must not infringe on the data subjects rights. </li></ul><ul><li>Data must be kept in a secure location and can not be copied. </li></ul><ul><li>Personal data can not be transferred to companies outside of the EU. </li></ul>
  5. 5. Exemption to the 8 Principles <ul><li>If the data is used for a personal use it doesn’t need to adhere to the guidelines. </li></ul><ul><li>If the data is used in Pay role. </li></ul><ul><li>Data held for national security. </li></ul><ul><li>If the data subject has given their permission to go on a mailing list. </li></ul>
  6. 6. As Data Subjects <ul><li>We have the right to see what has been written about us. </li></ul><ul><li>We can request any information which is inaccurate to be destroyed. </li></ul><ul><li>These rights do not include police records. </li></ul>
  7. 7. Copyright, Design and Patent Act 1988 <ul><li>This law helps to protect inventors and designers. </li></ul><ul><li>The law makes its legal to copy a protected file or picture without the copyrights owner’s permission. </li></ul><ul><li>Punishment could be a fine or jail sentence. Examples of breaking this law is: </li></ul><ul><li>Downloading music </li></ul><ul><li>Using pirate software without a licence </li></ul><ul><li>Re – using pictures and logos </li></ul>
  8. 8. Computer Misuse Act 1990 <ul><li>With the on going threat of people hacking into our home computers gaining access to our home files. This law was brought in to make it a criminal offence. </li></ul><ul><li>People have written viruses that are sent through emails – My doom and worm viruses cost companies thousands of pounds. </li></ul><ul><li>If found deliberately planting computer viruses into systems you can face a 5 year jail sentence. </li></ul>
  9. 9. Summary of Computer Legislation. <ul><li>Data Protection </li></ul><ul><li>Copyright, Design and Patent Act 1988 </li></ul><ul><li>Computer Misuse Act 1990 </li></ul>