it legislation

8
Information Communication Technology An Introduction to Legislation in the UK Stonemasonry Department 2012

Upload: doogstone

Post on 18-Nov-2014

1.613 views

Category:

Education


2 download

DESCRIPTION

A very basic introduction to legislation in Information Communication Technology designed for learners with little or no knowledge of IT.

TRANSCRIPT

Page 1: It legislation

Information Communication TechnologyAn Introduction to Legislation in the UK

Stonemasonry Department 2012

Page 2: It legislation

Legislation

Now that you understand what ICT can be used for, and how you interact with it through hardware devices and software

applications it is important to know about the legislation which covers the use of ICT in the United Kingdom.

In this presentation you will learn about:

The Computer Misuse Act 1990

The Data Protection Act

Copyright Law

Page 3: It legislation

Computer Misuse Act 1990This act makes it illegal to do any of the following:

Access computer material without permission, eg looking at someone else's files.

Access computer material without permission with intent to commit further criminal offences, eg hacking into the bank's computer and wanting to increase the amount in your account.

Alter computer data without permission, eg writing a virus to destroy someone else's data, or actually changing the money in an account.

Information taken directly from http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/1dataandcomputermisuserev2.shtml

Page 4: It legislation

Is Hacking Illegal?

The short answer to this question is NO! Hacking is not illegal provided you are doing it for legitimate purposes. Computer hackers are split into three distinct groups; black hat, grey hat

and white hat.

ILLEGAL LEGALILLEGAL (but not criminal)

Page 5: It legislation

Is Hacking Illegal?

Black hat hackers target the websites/data of organisations or people without permission and with the intent of causing harm, stealing files or profiting as a direct result of gaining access to a system.

Grey hat hackers also gain access to systems without the permission of the owner but once in, they either inform the owner of how to improve security or fix any flaws themselves.

White hat hackers gain access to systems with the permission of the owner. They carry out penetration testing “pen tests” to make sure that systems are secure.

Page 6: It legislation

The Data Protection Act (1998)

The DPA 1998 was passed by Parliament to control the way information is handled and to give legal rights to people who have information stored about them.

Some data and information stored on a computer is personal and needs to be kept confidential. People want to keep their pay, bank details, and medical records private and away from the view of just anybody. If someone who is not entitled to see these details can obtain access without permission it is unauthorised access. The Data Protection Act sets up rules to prevent this happening.

Information taken directly from http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/1dataandcomputermisuserev2.shtml

Page 7: It legislation

Copyright Law

This provides protection to the owners of the copyright and covers the copying of written, musical, or film works using computers. FAST is the industry body which is against software theft.

There have been cases where laws such as Copyright have been used to crack down on file sharing websites or individuals who store and illegally distribute copyrighted material, eg music. There is a massive problem with many people around the world obtaining copyrighted material illegally.

Information taken directly from http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/1dataandcomputermisuserev2.shtml

Page 8: It legislation

Developed by The Stonemasonry DepartmentCity of Glasgow College

2012