• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computer Legislation.

Extracts from this document...


Computer Legislation The information on this document is for the purpose of different computer legislations Below are some Act uses for computer legislations. > Data Protection Act 1998 > Computer Misuse Act 1990 > Computer Fraud and Abuse Act 1986 > Child Online Protection Act 1998 > The Copyright, Designs and Patents Act 1988 > Computers Crimes Act 1988 > Official Secrets Acts 1911-1989 > Criminal Law > Anti-Cybercrime Act of 2002 > The Computer Security Act of 1987 Data Protection Act 1998 - UK & USA The Data Protection Act of 1998 applies to personal data that is available on the computers or in some structured manual files. The type of data that the Act refers to is data that is being collected, adapted, organised, altered, recorded, used, disclosed, combined, destroyed, or data that is simply being held. The Act establishes eight mandatory procedures that organisations which process data must follow. Data is required to be: * Lawfully and fairly processed * Processed for limited purposes * Adequate, relevant and not excessive * Accurate, and kept up-to-data where necessary * Not kept for longer than necessary * Processed in accordance with individuals' rights * Kept secure * Not transferred to non-European Economic Area Countries without adequate protection As part of complying with the principles, controllers must: * meet one of six conditions in order to ...read more.


* A fine or imprisonment for not more than five years, or both, in the case of an offence under (section 3) * A fine or imprisonment for not more than ten years, or both, in the case of an offence under (section 4) Child Online Protection Act 1998 The word Child from this title means an individual at the age of 13 and under the age of 13. This act is implementing rules provide important new protections for kids who surf the net. The Act puts parents back in charge of their children's personal information online. It gives them the tools to control who collects personal information from their kids, how that information is used, and whether it is shared with third parties. The Rule applies to operators of commercial Web sites and online services directed to children under the age of 13, and general audience sites that know that they are collecting personal information from a child. As shown below the sites must: * provide parents notice of their information practices; * obtain verifiable parental consent before collecting a child's personal information, with certain limited exceptions; * give parents a choice as to whether their child's information will be disclosed to third parties; * provide parents access to their child's personal information and allow them to review it and/or have it deleted; * give parents ...read more.


place links to Bulletin Boards which are likely to publish defamatory materials, place links to sites which display pornographic materials and not place links to Bulletin Boards which are likely to contain discriminatory statements. Anti-Cybercrime Act of 2002 The Anti-Cybercrime Act of 2002 seeks to punish crimes in which the computer is used as the tool. Some of the relevant provisions deal with: * punishable acts and corresponding penalties; * provision on corporate liabilities, conspiracy and accomplice; * attempted Cybercrime; * reaction of the Cybercrime Investigation and Coordinating Council; * preservation and disclosure of computer data and traffic record; and * international cooperation and jurisdiction Anyone convicted of an offence under this act can expect a fine of unlimited amount plus a prison sentence ranging up to a maximum of 2 years The Computer Security Act of 1987 The Computer Security Act of 1987, is a Public Law, requires each Federal agency to identify all Federal computer systems that contain sensitive information and implement security plans to protect these systems. The Computer Security Act defines the term "sensitive information" as any unclassified information, which could adversely affect the: * national interest, * conduct of Federal programs, or * privacy to which individuals are entitled under the Privacy Act of 1974. Agencies are required to protect this information against loss, misuse, disclosure or modification. Task 3 Monish Bosquet ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    * Hacking - unauthorized people gaining access to computer networks * Data Misuse and unauthorized transfer or copying - file sharing * Copying and distributing software, music and film - Including copying CD's on your computer and sharing them on the internet * Email and chat room abuses - Impersonation

  2. Data Protection Act

    purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes" Personal data for any purpose should be used or disclosed in any manner incompatible with that purpose. For example, data is held for the purpose of safeguarding national security for prevention of crime and taxation purposes.

  1. The Data Protection Act 1998 - questions and answers

    What rights do individuals have? Individuals are given various rights by the 1998 Act in respect of personal data held about them by others. These are: the right to have access to the information (this is known as subject access); the right to prevent processing likely to cause damage or distress; the right to prevent

  2. The legislation that protects individuals and groups from the misuse of ICT

    The health and safety at work act has been around for a long time, well over 100 years. It allows the workforce to be protected whilst at work preventing them from being put at any risk or faced with a dangerous situation.

  1. 3E-The legislation that protects individuals and groups from the misuse of ICT

    Overall, the advantages outweigh the disadvantages because the law keeps the necessary data which needs storage by any organisation secure in some way. This is extremely important because without this specific law, the information which I pass through to organisations can be accessed and used by anyone for many different purposes which can cause many problems for me.

  2. Privacy and Data Protection: IT Law

    Some states within the country have incorporated explicit privacy protections into their state constitutions.35 2.) A sectoral approach in the private sector: US federal and state laws A patchwork of federal laws covers some specific categories of personal information.36 The Privacy Act of 1974 protects records held by US Government agencies and requires agencies to apply basic fair information practices.

  1. Assets table - recording the copyright information on the logos and pictures I used.

    Still movie A tea leaf farmer image S N/A Image that will be used in my still movie For this image I have cropped it and then I have enlarged it so that the target audience can see clearly what it is that I want them to, also this picture


    They were raided on 10th April 1985 and, in the world's first hacking-related jury trial, were charged with forgery (there being no anti-hacking laws in the UK at that time). Found guilty on various specimen charges, Schifreen was fined �750 and Gold �600, with �1,000 costs each.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work