Legal Aspects of Using Information Technology

Authors Avatar

Unit 15: ICT in Business

E6/C3:

Legal Aspects of Using Information Technology

The widespread use of information technology has brought us a number of benefits and problems, too. As information technology has spread, so have computer crime and abuse. For example, the internet is not only used by the innocent members of the public, but also by fraudulent traders, paedophiles, software pirates, hackers and terrorists. Their activities would include: placing computer viruses, software bootlegging, credit card fraud and money laundering schemes.

Hackers

A hacker is an individual who break codes and passwords to gain unauthorised access to data held on computer systems. When hackers gain unauthorised access to computer systems, they can do a huge amount of damage. Stand-alone computers are safe because, there is no connection for the hackers to break into. However, computers which are connected to networks or modems are at more risk from hacking. The only way of protecting the computer systems from being broken into, is by changing the passwords at regular intervals.

Computer Fraud

Computer fraud is when computer operators use the computer to their own advantage. It is difficult to track down these offenders for the following possible reasons:

  • They are often clever
  • They might be young with no previous criminal records
  • When fraud is discovered in a business, it is often not publicised, because the news of fraud may damage the image and reputation of the business

An example of computer fraud involves a computer operator who found a blank payroll form. The computer operator will complete the form by making up the details of an imaginary person working in the Company. Each month, when the pay cheques are produced from the Company computer, the computer operator will slip the cheque into his pocket, without anyone noticing.

Computer Viruses

A computer virus is a small computer program, which usually sabotage files or programs. Viruses may be passed onto the computer in various ways. It may be passed onto the user’s computer through the Internet, e.g. downloading an e-mail attachment and saving it to the user’s hard disk. It may be passed onto the user’s computer through the sharing of floppy disks from one computer to another.

There are number of different viruses which are activated in various ways. Some may be activated by the internal clock and may start on a particular day, e.g. Friday 13th. Others may be activated when a series of conditions becomes true, e.g. when a certain combinations of keys are pressed on the keyboard.

The most damaging viruses were recently found in innocent e-mail attachments, and are designed in such a way that makes sure recipients will open them. This well-known practice is known as, Social Engineering. Some of the examples include:

  • “Click here to receive a picture of Brad Pitt”
  • “I love you”- this is often referred as The Love Bug
  • Christmas cards, jokes, screensavers

Laws relating to IT

There are number of laws which are designed to govern any aspects of using the information technology within organisations, such as IKEA. The most common laws that IKEA needs to consider are as follows:

  • Data Protection Act 1984
  • Computer Misuse Act 1990
  • Copyright, Design and Patent Act 1989
  • Health and Safety at Work Act 1974
  • Health and Safety (Visual Display Screen Equipment) Regulations 1992

Data Protection Act 1984

The Data Protection Act 1984 aims to help protect the privacy of individuals, by regulating and controlling the processing of the personal data. The first Act became law in 1984, but this was replaced by the 1998 Act, that also incorporates the European Commission Directive.

To fully understand the Act, businesses such as IKEA need to understand the meaning of the following definitions:

  • Data controller- this is a party that determines the purposes for and the way in which personal data are processed
  • Data processor- this is a person, other than an employee of the data controller, who process the data on behalf of the data controller
  • Data subject- this is the living person who is the subject of the personal data
  • Personal data- this is information held on any living person, which on its own or in conjunction with other information held by the data controller, identifies that individual
  • Processing- this includes obtaining, recording or holding personal data or carrying out any operation on personal data, including organising, altering, disclosing or destroying it
  • Sensitive personal data- this is a sub-category of personal data consisting of information on the data subject, relating to racial origin, ethnic origin, political opinion, religious beliefs, membership of a trade union, physical/mental health or condition, sexual life or criminal record/history
Join now!

The Data Protection Act contains eight basic principles. These eight basis principles form the backbone of the Act:

Personal data must:

  1. …be processed fairly and lawfully
  2. …be obtained for specified and lawful purposes
  3. …be adequate, relevant and not excessive for the purpose
  4. …be accurate and up-to-date
  5. …not be kept longer than necessary
  6. …be processed within the rights of data subjects
  7. …be kept secure against loss, damage and unauthorised and unlawful processing
  8. …not be transferred to countries outside the European Economic Area

Looking at the eight principles mentioned above, the first five of them ...

This is a preview of the whole essay