SlideShare a Scribd company logo
1 of 9
ICT Legislation
Kayleigh Chapple-Evans
How To Stay Safe Online
• First of all, use anti-virus on your computer.
• Secondly, do not open emails from unknown people or unknown sources.
• Thirdly, use hard-to-guess passwords and keep them private (Do not tell anyone
about your password).
• Protect computers with firewalls.
• Regularly download security protection updates “Patches”.
• Back-up your computer to a USB or discs.
• And last but not least, disconnection from the internet when it is not in use.
Data Protection Act 1998
• This is the UK’s data protection act.
• Data protection Act 1998 is under the parliament of the United Kingdom (Great
Brittan) and Northern Ireland; this is for all the people of the UK (United Kingdom0.
• The act of governs the UK (United Kingdom) government of revealing personal
information/data out for money. Brought into force in 1998.
• There is two types of personal information: one is their name, address, medical details
or banking details; secondly, racial or ethnic origin, political opinions, religion,
membership of a trade union, health, criminal activity.
• Basically, the law prevents the government or any business releasing your details to
other companies.
Computer Misuse Act 1990
• Laws under the Act of 1990:
• Data misuse and
unauthorized transfer or
coping. (E.g. Downloading
music.)
• Copyright (E.g. copying
someone else work and
claiming it as your own.)
• Email and Chat-room Abuses.
• Pornography
• Identity and financial abuses
• Viruses.
Copyright Act 1988
The Copyright Act of 1988 (Copyright, Designs, and Patens Act of 1988) is a
current UK law. This enables the creators of any literary, drama, musical, and
artistic works the right to have control on who may use their material.
The law covers: Broadcasting, public performances, copying, adapting, issuing,
renting and lending copies to the public.
In many cases, the creator will also have the right to be identified as the author
and to object to distortions of his work.
Interpretation is related to the (independent) creation rather than the idea
behind the creation. For example, your idea for a book would not itself be
protected, but the actual content of a book you write would be. In other words,
someone else is still entitled to write their own book around the same idea,
Health and Safety Act 1974
The Health and Safety Act 1974 (HASAW/ The Health and
Safety Act at Work Act of 1974), is an act under the law of
parliament; the main piece of UK health and safety
legislations.
This places a duty on all employers “to ensure, so far as is
reasonably practicable, the health, safety and welfare at
work” of all their employees.
To summarise this law: the particular law protects the
employees from risk, enabling them to sue if injured through
a fault at work.
The Risks of Using The Internet: Risks For Virus
Viruses:
There are many different ways to prevent a virus from appearing on your
computer. Theses ways are very simple:
First of all, use anti-virus on your computer. This will help find – if there is
a virus – on your computer and get rid of it.
Secondly, do not open emails from unknown people or unknown sources. The
unknown account could be sending you a virus through it, which will
corrupt your computer.
Regularly download security protection updates “Patches”. This will enable
you the best chance at fighting a virus.
Risks From Hacking
Hacking is a big issue within the UK (United Kingdom) and around the world.
However, there are ways to stop hacking.
One:
Regularly use hard-to-guess passwords and keep them private (Do not tell anyone
about your password). This will help stop hackers from hacking into your account
or into your computer.
Don’t go on unknown websites, they could take corrupt files and easily allow
hackers to access your computer.
Staying Safe Online and Data Protection

More Related Content

What's hot

Privacy, human rights and Location Based Services
Privacy, human rights and Location Based ServicesPrivacy, human rights and Location Based Services
Privacy, human rights and Location Based Servicesblogzilla
 
Kerja kursus ting.4 (ict)
Kerja kursus ting.4 (ict)Kerja kursus ting.4 (ict)
Kerja kursus ting.4 (ict)Nor Shamsiah
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
Apt510 legal issues
Apt510 legal issuesApt510 legal issues
Apt510 legal issuesBreonnPooler
 
Legislation in the creative media industry
Legislation in the creative media industryLegislation in the creative media industry
Legislation in the creative media industryk_ishii_
 
Digital law
Digital lawDigital law
Digital lawAlieyn_
 
Digital law
Digital lawDigital law
Digital lawzrh48
 
Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpointDLRUDO01
 
Em505 report(pecha kucha video)
Em505 report(pecha kucha video)Em505 report(pecha kucha video)
Em505 report(pecha kucha video)Eunice Alamag
 
Legal and privacy implications of IoT
Legal and privacy implications of IoTLegal and privacy implications of IoT
Legal and privacy implications of IoTAndres Guadamuz
 
Privacy and Freedom of Expression
Privacy and Freedom of ExpressionPrivacy and Freedom of Expression
Privacy and Freedom of ExpressionMark Jhon Oxillo
 
Mandatory data breach notification for Australia
Mandatory data breach notification for AustraliaMandatory data breach notification for Australia
Mandatory data breach notification for AustraliaPatrick Dwyer
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1MohsinMughal28
 

What's hot (20)

Ppt
PptPpt
Ppt
 
copyright Infringement
copyright Infringementcopyright Infringement
copyright Infringement
 
Privacy, human rights and Location Based Services
Privacy, human rights and Location Based ServicesPrivacy, human rights and Location Based Services
Privacy, human rights and Location Based Services
 
Kerja kursus ting.4 (ict)
Kerja kursus ting.4 (ict)Kerja kursus ting.4 (ict)
Kerja kursus ting.4 (ict)
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Apt510 legal issues
Apt510 legal issuesApt510 legal issues
Apt510 legal issues
 
Media legislation
Media legislationMedia legislation
Media legislation
 
Legislation in the creative media industry
Legislation in the creative media industryLegislation in the creative media industry
Legislation in the creative media industry
 
Digital law
Digital lawDigital law
Digital law
 
Digital law
Digital lawDigital law
Digital law
 
Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpoint
 
Ppt
PptPpt
Ppt
 
Em505 report(pecha kucha video)
Em505 report(pecha kucha video)Em505 report(pecha kucha video)
Em505 report(pecha kucha video)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Legal and privacy implications of IoT
Legal and privacy implications of IoTLegal and privacy implications of IoT
Legal and privacy implications of IoT
 
Privacy and Freedom of Expression
Privacy and Freedom of ExpressionPrivacy and Freedom of Expression
Privacy and Freedom of Expression
 
Mandatory data breach notification for Australia
Mandatory data breach notification for AustraliaMandatory data breach notification for Australia
Mandatory data breach notification for Australia
 
Digital law
Digital lawDigital law
Digital law
 
Web 2.0 Update
Web 2.0 UpdateWeb 2.0 Update
Web 2.0 Update
 
Cyber crime legislation part 1
Cyber crime legislation part 1Cyber crime legislation part 1
Cyber crime legislation part 1
 

Viewers also liked

Mekanika rekayas aa
Mekanika rekayas aaMekanika rekayas aa
Mekanika rekayas aastazyaldi
 
Make- Up Ideas
Make- Up IdeasMake- Up Ideas
Make- Up IdeasEGladders
 
DIETA EQUILIBRADA PARA PEQUES
DIETA EQUILIBRADA PARA PEQUESDIETA EQUILIBRADA PARA PEQUES
DIETA EQUILIBRADA PARA PEQUESafcovelo15
 
XOGANDO COAS MATES
XOGANDO COAS MATESXOGANDO COAS MATES
XOGANDO COAS MATESafcovelo15
 
Front Cover Process
Front Cover ProcessFront Cover Process
Front Cover ProcessEGladders
 
Conventions of Form
Conventions of FormConventions of Form
Conventions of FormEGladders
 
3 initial ideas
3 initial ideas3 initial ideas
3 initial ideasEGladders
 
1st Attempt Of A Storyboard
1st Attempt Of A Storyboard1st Attempt Of A Storyboard
1st Attempt Of A StoryboardEGladders
 
Creating A House Style
Creating A House StyleCreating A House Style
Creating A House StyleEGladders
 
Introduction to organ culture in plant tissue culture and root culture
Introduction to organ culture in plant tissue culture and root cultureIntroduction to organ culture in plant tissue culture and root culture
Introduction to organ culture in plant tissue culture and root cultureCollege
 
Introduction to RDT methods in genetic engineering
Introduction to RDT methods in genetic engineeringIntroduction to RDT methods in genetic engineering
Introduction to RDT methods in genetic engineeringCollege
 
Introduction to organ culture in ptc and root culture
Introduction to organ culture in ptc and root cultureIntroduction to organ culture in ptc and root culture
Introduction to organ culture in ptc and root cultureCollege
 

Viewers also liked (13)

Mekanika rekayas aa
Mekanika rekayas aaMekanika rekayas aa
Mekanika rekayas aa
 
Make- Up Ideas
Make- Up IdeasMake- Up Ideas
Make- Up Ideas
 
DIETA EQUILIBRADA PARA PEQUES
DIETA EQUILIBRADA PARA PEQUESDIETA EQUILIBRADA PARA PEQUES
DIETA EQUILIBRADA PARA PEQUES
 
XOGANDO COAS MATES
XOGANDO COAS MATESXOGANDO COAS MATES
XOGANDO COAS MATES
 
Front Cover Process
Front Cover ProcessFront Cover Process
Front Cover Process
 
Conventions of Form
Conventions of FormConventions of Form
Conventions of Form
 
Locations
LocationsLocations
Locations
 
3 initial ideas
3 initial ideas3 initial ideas
3 initial ideas
 
1st Attempt Of A Storyboard
1st Attempt Of A Storyboard1st Attempt Of A Storyboard
1st Attempt Of A Storyboard
 
Creating A House Style
Creating A House StyleCreating A House Style
Creating A House Style
 
Introduction to organ culture in plant tissue culture and root culture
Introduction to organ culture in plant tissue culture and root cultureIntroduction to organ culture in plant tissue culture and root culture
Introduction to organ culture in plant tissue culture and root culture
 
Introduction to RDT methods in genetic engineering
Introduction to RDT methods in genetic engineeringIntroduction to RDT methods in genetic engineering
Introduction to RDT methods in genetic engineering
 
Introduction to organ culture in ptc and root culture
Introduction to organ culture in ptc and root cultureIntroduction to organ culture in ptc and root culture
Introduction to organ culture in ptc and root culture
 

Similar to Staying Safe Online and Data Protection

Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal lawZaheer Irshad
 
It legislation
It legislationIt legislation
It legislationdoogstone
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe onlineHadilAlHaj
 
Digital law
Digital lawDigital law
Digital lawmakylahh
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
Business And The Law
Business And The LawBusiness And The Law
Business And The LawRobbieA
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slidesthothakhail
 
Copyright Infringement
Copyright InfringementCopyright Infringement
Copyright InfringementWCU_Becca
 
Individual and Technology
Individual and TechnologyIndividual and Technology
Individual and TechnologyMr Shipp
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT actDivesh Mewara
 
Cyber crime
Cyber crimeCyber crime
Cyber crimedixitas
 
Cyber crime correct
Cyber crime correctCyber crime correct
Cyber crime correctWaheed Rana
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe onlineShirley Diniz
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicsiallen
 
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law sohaildanish
 
Copyright infringement
Copyright infringementCopyright infringement
Copyright infringementwcudsce
 
Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemssaltashict
 

Similar to Staying Safe Online and Data Protection (20)

Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
It legislation
It legislationIt legislation
It legislation
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Digital law
Digital lawDigital law
Digital law
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Business And The Law
Business And The LawBusiness And The Law
Business And The Law
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slides
 
Copyright Infringement
Copyright InfringementCopyright Infringement
Copyright Infringement
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Individual and Technology
Individual and TechnologyIndividual and Technology
Individual and Technology
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime correct
Cyber crime correctCyber crime correct
Cyber crime correct
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law
 
Copyright infringement
Copyright infringementCopyright infringement
Copyright infringement
 
Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systems
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 

Recently uploaded

internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 

Recently uploaded (20)

internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 

Staying Safe Online and Data Protection

  • 2. How To Stay Safe Online • First of all, use anti-virus on your computer. • Secondly, do not open emails from unknown people or unknown sources. • Thirdly, use hard-to-guess passwords and keep them private (Do not tell anyone about your password). • Protect computers with firewalls. • Regularly download security protection updates “Patches”. • Back-up your computer to a USB or discs. • And last but not least, disconnection from the internet when it is not in use.
  • 3. Data Protection Act 1998 • This is the UK’s data protection act. • Data protection Act 1998 is under the parliament of the United Kingdom (Great Brittan) and Northern Ireland; this is for all the people of the UK (United Kingdom0. • The act of governs the UK (United Kingdom) government of revealing personal information/data out for money. Brought into force in 1998. • There is two types of personal information: one is their name, address, medical details or banking details; secondly, racial or ethnic origin, political opinions, religion, membership of a trade union, health, criminal activity. • Basically, the law prevents the government or any business releasing your details to other companies.
  • 4. Computer Misuse Act 1990 • Laws under the Act of 1990: • Data misuse and unauthorized transfer or coping. (E.g. Downloading music.) • Copyright (E.g. copying someone else work and claiming it as your own.) • Email and Chat-room Abuses. • Pornography • Identity and financial abuses • Viruses.
  • 5. Copyright Act 1988 The Copyright Act of 1988 (Copyright, Designs, and Patens Act of 1988) is a current UK law. This enables the creators of any literary, drama, musical, and artistic works the right to have control on who may use their material. The law covers: Broadcasting, public performances, copying, adapting, issuing, renting and lending copies to the public. In many cases, the creator will also have the right to be identified as the author and to object to distortions of his work. Interpretation is related to the (independent) creation rather than the idea behind the creation. For example, your idea for a book would not itself be protected, but the actual content of a book you write would be. In other words, someone else is still entitled to write their own book around the same idea,
  • 6. Health and Safety Act 1974 The Health and Safety Act 1974 (HASAW/ The Health and Safety Act at Work Act of 1974), is an act under the law of parliament; the main piece of UK health and safety legislations. This places a duty on all employers “to ensure, so far as is reasonably practicable, the health, safety and welfare at work” of all their employees. To summarise this law: the particular law protects the employees from risk, enabling them to sue if injured through a fault at work.
  • 7. The Risks of Using The Internet: Risks For Virus Viruses: There are many different ways to prevent a virus from appearing on your computer. Theses ways are very simple: First of all, use anti-virus on your computer. This will help find – if there is a virus – on your computer and get rid of it. Secondly, do not open emails from unknown people or unknown sources. The unknown account could be sending you a virus through it, which will corrupt your computer. Regularly download security protection updates “Patches”. This will enable you the best chance at fighting a virus.
  • 8. Risks From Hacking Hacking is a big issue within the UK (United Kingdom) and around the world. However, there are ways to stop hacking. One: Regularly use hard-to-guess passwords and keep them private (Do not tell anyone about your password). This will help stop hackers from hacking into your account or into your computer. Don’t go on unknown websites, they could take corrupt files and easily allow hackers to access your computer.