• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computer Legislation Assignment

Extracts from this document...

Introduction

Jason Agar-Hutton 20th October 2002 Computer Legislation Assignment Computer Misuse Act 1990 The Computer Misuse Act 1990 states that it is illegal to obtain unauthorised access to any computer or to modify its contents. Three criminal offences are defined in the act, namely: Unauthorised access to computer material, Unauthorised modification of computer material; and Unauthorised access with intent to commit, or facilitate commission, of further offences. Hacking A hacker is a computer enthusiast who tries to break into a secure computer system. The process of doing this is called 'hacking'. However, a big misunderstanding in the world is that most 'hackers' usually work for big companies, such as IBM, Microsoft and Apple, or even governmental organizations such as the Pentagon or the FBI to improve computer security. People who break into secure systems with intent of doing harm to its owners, users or any other third party group are known as 'crackers'. These individuals often partake in petty computer-related crimes, such as vandalism or tagging. However, sometimes crackers may be skilled enough to shut down network servers, implant viruses into computer networks or even change financial, governmental and security databases such as bank accounts. ...read more.

Middle

* Transferring disks between machines is always dangerous, so this should be avoided whenever possible. * Many companies have a single computer connected to the Internet for downloading the latest releases of software, printer drivers, etc. rather than using a file server, which is crucial to the operation of a business. * Keep daily backups of all your data. Data Protection Act 1998 In 1984, the huge increase of computers being used to store personal data led to the government initiating the Data Protection Act. Another reason why the law was introduced was that most of the other EC members had laws regarding data protection, and it was considered necessary for the United Kingdom to create a similar act to allow free passage of personal data from one member state to another, which was essential for conducting business. This law was then updated in 1998 which basically included laws concerning data being processed over the Internet. The main purpose of the Act is to prevent the misuse of personal data and give rights to the individuals whom the information relates. If information stored about them is incorrect, then the data subjects may be able to claim against the data controller for reasons of distress or financial loss. ...read more.

Conclusion

* The Data Controller - The individual in a company/organisation who is given the responsibility of controlling the way in which personal data is processed. * The Commissioner - The Commissioner is the person who is responsible for: 1.) Enforcing the Act. 2.) Promoting good practice by the people who are responsible for the processing of personal data, 3.) Making the general public aware of their rights under the Act. Software Piracy Software piracy is the illegal copying of computer software. It is reckoned that piracy costs the software industry �3,000 million every year. In 1989, the government decided that software piracy was a threat to society, and so they created a new Act, named The Copyright, Design and Patents Act. The Copyright, Design and Patents Act 1989 The Copyright, Design and Patents Act 1989 makes it a criminal offence to copy or steal software. Under the Act it is an offence to copy or distribute software, or any manuals that come with it, without permission or license from the copyright owner. It is also an offence to run purchased software covered by copyright on two or more machines at the same time, unless the license specifically allows it. The Act also makes it illegal for an organisation to encourage, allow, compel, or pressure its employees to make or distribute copies of illegal software by the organisation. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    The Computer Misuse Act (1990) These acts are taken very seriously in Croydon Community as without these laws the most libraries and internet cafes would have computers which don't even work as people would misuse it by for example trying to put viruses on it or hack into the administrator account and delete the file.

  2. Data Protection Act

    Schedule 4 of the Act provides for circumstances in which the Eighth Principle does not apply to a transfer. Personal data shall not be transferred to a country or territory outside the European economic area, unless that the country or territory ensures as adequate level protection for the rights and

  1. The Data Protection Act 1998 - questions and answers

    These include exemptions relating to national security, crime and taxation and health education and social work. New exemptions are introduced relating to confidential references given by the data controller and confidentiality of personal data processed for the purposes of management forecasts or planning.

  2. Privacy and Data Protection: IT Law

    The agency has sought additional powers to pursue cross-border fraud, much of which involves privacy-invasive telemarketing or Spam.43 The FTC's actions under federal "unfair and deceptive" practices law essentially have created a "common law" of privacy in the country. Thus, when the agency brings suit against a company for certain privacy-invasive practices, it can have industry-wide effect.

  1. 3E-The legislation that protects individuals and groups from the misuse of ICT

    Obrien's because his personal information/data is stored by the organisation he works at, which is the Lammas secondary school and is an area where this specific law is enforced. The data protection law protects Mr. Obrien's because it ensures that his personal details is safely secured and restricted for the

  2. The legislation that protects individuals and groups from the misuse of ICT

    guidelines and copy the piece of work anyway, without gaining the prior permission of he owner, personally I follow this pattern, it takes time to notify and ask or prior permission, it is much easier to simply take the piece incorporate it where necessary add credits at the bottom of

  1. Legal Aspects of Using Information Technology

    Health and Safety (Visual Display Screen Equipment) Regulations 1992 The health and safety regulations have an effect on employed workers, who regularly use Visual Display Units (VDU), for a significant part of their normal work. These regulations were introduced to prevent repetitive strain injury (RSI), fatigue and eye problems in the use of technological equipment.

  2. Computer Legislation.

    A person can be place guilty of an offence if the person that causes a computer to perform any function with intent to secure access to any program or data held in any computer, the access the person intends to secure is unauthorised; and knows at the time when he

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work