• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computer Legislation.

Extracts from this document...

Introduction

Computer Legislation The information on this document is for the purpose of different computer legislations Below are some Act uses for computer legislations. > Data Protection Act 1998 > Computer Misuse Act 1990 > Computer Fraud and Abuse Act 1986 > Child Online Protection Act 1998 > The Copyright, Designs and Patents Act 1988 > Computers Crimes Act 1988 > Official Secrets Acts 1911-1989 > Criminal Law > Anti-Cybercrime Act of 2002 > The Computer Security Act of 1987 Data Protection Act 1998 - UK & USA The Data Protection Act of 1998 applies to personal data that is available on the computers or in some structured manual files. The type of data that the Act refers to is data that is being collected, adapted, organised, altered, recorded, used, disclosed, combined, destroyed, or data that is simply being held. The Act establishes eight mandatory procedures that organisations which process data must follow. Data is required to be: * Lawfully and fairly processed * Processed for limited purposes * Adequate, relevant and not excessive * Accurate, and kept up-to-data where necessary * Not kept for longer than necessary * Processed in accordance with individuals' rights * Kept secure * Not transferred to non-European Economic Area Countries without adequate protection As part of complying with the principles, controllers must: * meet one of six conditions in order to ...read more.

Middle

* A fine or imprisonment for not more than five years, or both, in the case of an offence under (section 3) * A fine or imprisonment for not more than ten years, or both, in the case of an offence under (section 4) Child Online Protection Act 1998 The word Child from this title means an individual at the age of 13 and under the age of 13. This act is implementing rules provide important new protections for kids who surf the net. The Act puts parents back in charge of their children's personal information online. It gives them the tools to control who collects personal information from their kids, how that information is used, and whether it is shared with third parties. The Rule applies to operators of commercial Web sites and online services directed to children under the age of 13, and general audience sites that know that they are collecting personal information from a child. As shown below the sites must: * provide parents notice of their information practices; * obtain verifiable parental consent before collecting a child's personal information, with certain limited exceptions; * give parents a choice as to whether their child's information will be disclosed to third parties; * provide parents access to their child's personal information and allow them to review it and/or have it deleted; * give parents ...read more.

Conclusion

place links to Bulletin Boards which are likely to publish defamatory materials, place links to sites which display pornographic materials and not place links to Bulletin Boards which are likely to contain discriminatory statements. Anti-Cybercrime Act of 2002 The Anti-Cybercrime Act of 2002 seeks to punish crimes in which the computer is used as the tool. Some of the relevant provisions deal with: * punishable acts and corresponding penalties; * provision on corporate liabilities, conspiracy and accomplice; * attempted Cybercrime; * reaction of the Cybercrime Investigation and Coordinating Council; * preservation and disclosure of computer data and traffic record; and * international cooperation and jurisdiction Anyone convicted of an offence under this act can expect a fine of unlimited amount plus a prison sentence ranging up to a maximum of 2 years The Computer Security Act of 1987 The Computer Security Act of 1987, is a Public Law, requires each Federal agency to identify all Federal computer systems that contain sensitive information and implement security plans to protect these systems. The Computer Security Act defines the term "sensitive information" as any unclassified information, which could adversely affect the: * national interest, * conduct of Federal programs, or * privacy to which individuals are entitled under the Privacy Act of 1974. Agencies are required to protect this information against loss, misuse, disclosure or modification. Task 3 Monish Bosquet ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. The Data Protection Act 1998 - questions and answers

    What rights do individuals have? Individuals are given various rights by the 1998 Act in respect of personal data held about them by others. These are: the right to have access to the information (this is known as subject access); the right to prevent processing likely to cause damage or distress; the right to prevent

  2. Data Protection Act

    purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes" Personal data for any purpose should be used or disclosed in any manner incompatible with that purpose. For example, data is held for the purpose of safeguarding national security for prevention of crime and taxation purposes.

  1. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    The Computer Misuse Act (1990) These acts are taken very seriously in Croydon Community as without these laws the most libraries and internet cafes would have computers which don't even work as people would misuse it by for example trying to put viruses on it or hack into the administrator account and delete the file.

  2. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    Sites usually require an email, a name, data of birth and other personal data, sometimes even including an address. These aren't too harmless when breaking the Data Protection Act. For example, the most that can happen would be that Mr Ajaib's e-mail address would be given out to the sponsors

  1. 3E-The legislation that protects individuals and groups from the misuse of ICT

    school, dentist etc. The data protection act ensures that my personal information is kept safe and restricts other people from gaining access to the data. Ultimately, my data is secured and is only used according to my permission and for emergency events.

  2. The legislation that protects individuals and groups from the misuse of ICT

    also difficult to prove that the company has sold the information, investigations of this nature often take years to result in prosecutions whilst the evidence is gathered, this says to me that the Data Protection act does not give full protection to individuals or groups.

  1. Right of privacy under Hong Kong's current laws

    media or the offender, and that any media coverage that may lead to the identification of the victim in sexual abuse cases is also prohibited. Likewise, the Magistrates Ordinance (MO) protects people involved in committal proceedings from media coverage. Common Law Some aspects of privacy are provided by the common

  2. The Legislation that protects individuals and groups from the misuse of ICT.

    Personal data may only be kept for an appropriate length of time and must not be disclosed to other parties without the consent of the data owner, unless there is legislation or other overriding legitimate reason to share the information (for example, the prevention and detection of crime).

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work