law - bh
TRANSCRIPT
-
8/13/2019 Law - BH
1/12
-
8/13/2019 Law - BH
2/12
Knowledge and Understanding
SECTION 6 - The Effects of Using ITa) describe what is meant by software copyright;
b) describe what is meant by hacking;
c) describe what a computer virusis;
d) explain the measures that must be taken in order to protect against hacking and
viruses;.
e) describe the effects of information technology on patterns of employment, including
areas of work where there is increased unemployment;f) describe the effects of microprocessor-controlled devices in the home, including theireffects on leisure time, social interaction and the need to leave the home;
g) describe the capabilities and limitations of IT;
h) discuss issues relating to information found on the Internet, including unreliability,
undesirability and the security of data transfer;
i) describe the potential health problems related to the prolonged use of ICT
equipment, for example repetitive strain injury (RSI), back problems, eye problems and
some simple strategies for preventing these problems;
j) describe a range of safety issuesrelated to using computers and measures for preventing
accidents
-
8/13/2019 Law - BH
3/12
CopyrightCopyrightis the name given to the protection of the rights
of the person(s) responsible for creating such things as text, apiece of music, a painting or a computer program.
The Copyright, Designs and Patents
Act, 1989- a criminal offence to be
caught copying or stealing software.The Act also makes it an offence to:
copy or distribute software without
permission
run copyright software that has beenbought on two or more computers at the
same timeunless the software agreement
(licence) allows it
The Federation Against Software Theft (FAST)
-
8/13/2019 Law - BH
4/12
Copyright
The copying of software(and its packaging) to tryto make it look like a genuine product.
www.fast.org.uk
The use of softwareon more computers in a network
than the number of computers for which there are
software licenses.
Downloading copyrightsoftware from the Internet.
Because software can be downloaded from certain sites
does not mean that it is free or legal for you to download.
The copying and selling of recordable CD-ROMsthat
contain pirated software.
The main types of piracy are:
-
8/13/2019 Law - BH
5/12
HackingHackersare people who gain access to computer
systems without permissionand who then maydetrimentally interfere with the programs and data.
Computer Misuse Act, 1990
to gain unauthorized accessto computer material.
Deliberately plant computer virusesthat damage program files anddata.
Hackinto a computer with the intention of seeing or alteringinformation.
Use a computer to commit crimes(frauds):e.g. to create a fictitiousworker and get money paid into this non-existent person's bank account.
Use your employer's computer to carry out unauthorized work.
People found guilty under the Computer Misuse Act may receive a large
fine or a prison sentence.
-
8/13/2019 Law - BH
6/12
Hacking
-
8/13/2019 Law - BH
7/12
Viruses 1 A program that infects computer filesand makes them do
something unexpected or damaging.The virus is inserted into acomputer file, and when the file is loaded, other files becomeinfected.
In 1986, one known computer virus. Today, up to fifteen new virusesevery day.
A hoax virus- an e-mail that is intended to scare people about a
non-existent virus threat and make them delete files. Some viruses can destroy a computer's hard disk.In 1999, Melissa
virus resulted in many of the world's largest companies having to shutdown their e-mail systems
In the year 2000, millions of people opened an attachment to an e-mail
headed 'I love you' and thus infected their computers and spread thisvirus.
-
8/13/2019 Law - BH
8/12
Viruses 2
Those that infect program files.The virus code is attachedto program files and when the program is loaded, the virus is
also loaded.
Macro viruses.These are written in a macro language with an
application such as Microsoft Word. The macro virus is executed
when the document is opened. Over half of the known viruses are
macro viruses spread by e-mail attachments.
Those that infect system/boot files- a small program that tells thecomputer how to load the rest of the operating system. By infecting
this boot (start-up) file, the virus is loaded into memory runs
whenever the computer is on.
There are three main types of virus:
-
8/13/2019 Law - BH
9/12
Data Protection
Keeping data about YouInformation is kept about us in many places. People are always
asking us to fill out forms Purchases made
Political beliefs
Medical
details
Car and insurance
details
Exams passed
Criminalconvictions
Questionnaires
And surveys
Likes and
dislikes
Details
From e-mails
Records of
Phone calls
-
8/13/2019 Law - BH
10/12
Misuse of Computer-based
Data
Easierto make a copy without being noticed
Quickerto make a copy attach a file to a disk
and email it to yourself
Harder to spotif it has been altered
Easier to search through a computer fileto find
what you want
Networksgive a wider access to hackers
-
8/13/2019 Law - BH
11/12
Data ProtectionRules about what information can be kept about you.
Information held on one computer can easily be transferred to another. Some
companies make money out of selling personal information.
The information held on you might be wrong - entered incorrectly, out of date,
been confused with someone elses!. It could state that you had been in trouble
with the police when you hadn't, or that you owed money when you didn't.
The 1998 Data Protection Actsets out in law the rules for processing personal
information. A Data Protection Commissioneris responsible for enforcing theAct. The Act applies to paper records, as well as computer.
data subjectspeople who have data held about them .
data controllersThe organizations and people who have the data.
Many people have details on other people's computers - your school, your doctor.Can lead to many problems and dangers.
-
8/13/2019 Law - BH
12/12
Data Protection ActYou have a legal right to find out what information is held about you on computer
You can write to the person or organization which holds the information. You are
not allowed to check information held on you concerning such things as nationalsecurity, crime prevention/detection, salaries and income tax
Data Protection Act, 1998: The eight rules:
1. Fairly and lawfully processed2. Processed for limited purposes
3. Adequate, relevant and not excessive
4. Accurate
5. Not kept longer than necessary
6. Processed in line with data subjects' rights7. Secure
8. Not transferred to countries without adequate
protection