• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computer Legislation.

Extracts from this document...

Introduction

Computer Legislation The information on this document is for the purpose of different computer legislations Below are some Act uses for computer legislations. > Data Protection Act 1998 > Computer Misuse Act 1990 > Computer Fraud and Abuse Act 1986 > Child Online Protection Act 1998 > The Copyright, Designs and Patents Act 1988 > Computers Crimes Act 1988 > Official Secrets Acts 1911-1989 > Criminal Law > Anti-Cybercrime Act of 2002 > The Computer Security Act of 1987 Data Protection Act 1998 - UK & USA The Data Protection Act of 1998 applies to personal data that is available on the computers or in some structured manual files. The type of data that the Act refers to is data that is being collected, adapted, organised, altered, recorded, used, disclosed, combined, destroyed, or data that is simply being held. The Act establishes eight mandatory procedures that organisations which process data must follow. Data is required to be: * Lawfully and fairly processed * Processed for limited purposes * Adequate, relevant and not excessive * Accurate, and kept up-to-data where necessary * Not kept for longer than necessary * Processed in accordance with individuals' rights * Kept secure * Not transferred to non-European Economic Area Countries without adequate protection As part of complying with the principles, controllers must: * meet one of six conditions in order to ...read more.

Middle

* A fine or imprisonment for not more than five years, or both, in the case of an offence under (section 3) * A fine or imprisonment for not more than ten years, or both, in the case of an offence under (section 4) Child Online Protection Act 1998 The word Child from this title means an individual at the age of 13 and under the age of 13. This act is implementing rules provide important new protections for kids who surf the net. The Act puts parents back in charge of their children's personal information online. It gives them the tools to control who collects personal information from their kids, how that information is used, and whether it is shared with third parties. The Rule applies to operators of commercial Web sites and online services directed to children under the age of 13, and general audience sites that know that they are collecting personal information from a child. As shown below the sites must: * provide parents notice of their information practices; * obtain verifiable parental consent before collecting a child's personal information, with certain limited exceptions; * give parents a choice as to whether their child's information will be disclosed to third parties; * provide parents access to their child's personal information and allow them to review it and/or have it deleted; * give parents ...read more.

Conclusion

place links to Bulletin Boards which are likely to publish defamatory materials, place links to sites which display pornographic materials and not place links to Bulletin Boards which are likely to contain discriminatory statements. Anti-Cybercrime Act of 2002 The Anti-Cybercrime Act of 2002 seeks to punish crimes in which the computer is used as the tool. Some of the relevant provisions deal with: * punishable acts and corresponding penalties; * provision on corporate liabilities, conspiracy and accomplice; * attempted Cybercrime; * reaction of the Cybercrime Investigation and Coordinating Council; * preservation and disclosure of computer data and traffic record; and * international cooperation and jurisdiction Anyone convicted of an offence under this act can expect a fine of unlimited amount plus a prison sentence ranging up to a maximum of 2 years The Computer Security Act of 1987 The Computer Security Act of 1987, is a Public Law, requires each Federal agency to identify all Federal computer systems that contain sensitive information and implement security plans to protect these systems. The Computer Security Act defines the term "sensitive information" as any unclassified information, which could adversely affect the: * national interest, * conduct of Federal programs, or * privacy to which individuals are entitled under the Privacy Act of 1974. Agencies are required to protect this information against loss, misuse, disclosure or modification. Task 3 Monish Bosquet ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    * Hacking - unauthorized people gaining access to computer networks * Data Misuse and unauthorized transfer or copying - file sharing * Copying and distributing software, music and film - Including copying CD's on your computer and sharing them on the internet * Email and chat room abuses - Impersonation

  2. The Data Protection Act 1998 - questions and answers

    What rights do individuals have? Individuals are given various rights by the 1998 Act in respect of personal data held about them by others. These are: the right to have access to the information (this is known as subject access); the right to prevent processing likely to cause damage or distress; the right to prevent

  1. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    Sites usually have an agreement when signing up which you agree to if you sign up to them. These agreements are made essential due to the Data Protection Act. It lets the user see what exactly the site can do with his information and usually keeps Mr Ajaib from knowing what risks he gets into by giving his information out.

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    There are a few improvements that can be made to the specific law. The main improvement which I personally think is the act should state the protection type needed for all the different data types that can be stored. Some of these data may be highly crucial, which may need

  1. ICT LEGISLATIONS

    They were raided on 10th April 1985 and, in the world's first hacking-related jury trial, were charged with forgery (there being no anti-hacking laws in the UK at that time). Found guilty on various specimen charges, Schifreen was fined �750 and Gold �600, with �1,000 costs each.

  2. Data Protection Act

    Meeting a Schedule 2 and Schedule 3 condition will not, on its own, guarantee that processing is fair and lawful. The general requirement that data be processed fairly and lawfully must be satisfied in addition to meeting the conditions. Meeting a Schedule 2 and Schedule 3 condition will not, on its own, guarantee that processing is fair and lawful.

  1. Is the UK copyright act of 1988 still an adequate means of protecting intellectual ...

    Such a method has already been used for email with the invention of Phil Zimmerman's Pretty Good Privacy (PGP) (7). However such a system would put the publisher in a very strong position compared to the other party, and would be open to abuse.

  2. Right of privacy under Hong Kong's current laws

    law branches namely trespass to land, nuisance, breach of contract, breach of confidence, defamation and conversion. Journalists will be deemed to be trespassers, like the one in the Gigi Leung case14, if they enter one's property or install camera or microphone on one's premise without permission or under false pretenses.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work