law - bh

Upload: safa-aslam

Post on 04-Jun-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/13/2019 Law - BH

    1/12

  • 8/13/2019 Law - BH

    2/12

    Knowledge and Understanding

    SECTION 6 - The Effects of Using ITa) describe what is meant by software copyright;

    b) describe what is meant by hacking;

    c) describe what a computer virusis;

    d) explain the measures that must be taken in order to protect against hacking and

    viruses;.

    e) describe the effects of information technology on patterns of employment, including

    areas of work where there is increased unemployment;f) describe the effects of microprocessor-controlled devices in the home, including theireffects on leisure time, social interaction and the need to leave the home;

    g) describe the capabilities and limitations of IT;

    h) discuss issues relating to information found on the Internet, including unreliability,

    undesirability and the security of data transfer;

    i) describe the potential health problems related to the prolonged use of ICT

    equipment, for example repetitive strain injury (RSI), back problems, eye problems and

    some simple strategies for preventing these problems;

    j) describe a range of safety issuesrelated to using computers and measures for preventing

    accidents

  • 8/13/2019 Law - BH

    3/12

    CopyrightCopyrightis the name given to the protection of the rights

    of the person(s) responsible for creating such things as text, apiece of music, a painting or a computer program.

    The Copyright, Designs and Patents

    Act, 1989- a criminal offence to be

    caught copying or stealing software.The Act also makes it an offence to:

    copy or distribute software without

    permission

    run copyright software that has beenbought on two or more computers at the

    same timeunless the software agreement

    (licence) allows it

    The Federation Against Software Theft (FAST)

  • 8/13/2019 Law - BH

    4/12

    Copyright

    The copying of software(and its packaging) to tryto make it look like a genuine product.

    www.fast.org.uk

    The use of softwareon more computers in a network

    than the number of computers for which there are

    software licenses.

    Downloading copyrightsoftware from the Internet.

    Because software can be downloaded from certain sites

    does not mean that it is free or legal for you to download.

    The copying and selling of recordable CD-ROMsthat

    contain pirated software.

    The main types of piracy are:

  • 8/13/2019 Law - BH

    5/12

    HackingHackersare people who gain access to computer

    systems without permissionand who then maydetrimentally interfere with the programs and data.

    Computer Misuse Act, 1990

    to gain unauthorized accessto computer material.

    Deliberately plant computer virusesthat damage program files anddata.

    Hackinto a computer with the intention of seeing or alteringinformation.

    Use a computer to commit crimes(frauds):e.g. to create a fictitiousworker and get money paid into this non-existent person's bank account.

    Use your employer's computer to carry out unauthorized work.

    People found guilty under the Computer Misuse Act may receive a large

    fine or a prison sentence.

  • 8/13/2019 Law - BH

    6/12

    Hacking

  • 8/13/2019 Law - BH

    7/12

    Viruses 1 A program that infects computer filesand makes them do

    something unexpected or damaging.The virus is inserted into acomputer file, and when the file is loaded, other files becomeinfected.

    In 1986, one known computer virus. Today, up to fifteen new virusesevery day.

    A hoax virus- an e-mail that is intended to scare people about a

    non-existent virus threat and make them delete files. Some viruses can destroy a computer's hard disk.In 1999, Melissa

    virus resulted in many of the world's largest companies having to shutdown their e-mail systems

    In the year 2000, millions of people opened an attachment to an e-mail

    headed 'I love you' and thus infected their computers and spread thisvirus.

  • 8/13/2019 Law - BH

    8/12

    Viruses 2

    Those that infect program files.The virus code is attachedto program files and when the program is loaded, the virus is

    also loaded.

    Macro viruses.These are written in a macro language with an

    application such as Microsoft Word. The macro virus is executed

    when the document is opened. Over half of the known viruses are

    macro viruses spread by e-mail attachments.

    Those that infect system/boot files- a small program that tells thecomputer how to load the rest of the operating system. By infecting

    this boot (start-up) file, the virus is loaded into memory runs

    whenever the computer is on.

    There are three main types of virus:

  • 8/13/2019 Law - BH

    9/12

    Data Protection

    Keeping data about YouInformation is kept about us in many places. People are always

    asking us to fill out forms Purchases made

    Political beliefs

    Medical

    details

    Car and insurance

    details

    Exams passed

    Criminalconvictions

    Questionnaires

    And surveys

    Likes and

    dislikes

    Details

    From e-mails

    Records of

    Phone calls

  • 8/13/2019 Law - BH

    10/12

    Misuse of Computer-based

    Data

    Easierto make a copy without being noticed

    Quickerto make a copy attach a file to a disk

    and email it to yourself

    Harder to spotif it has been altered

    Easier to search through a computer fileto find

    what you want

    Networksgive a wider access to hackers

  • 8/13/2019 Law - BH

    11/12

    Data ProtectionRules about what information can be kept about you.

    Information held on one computer can easily be transferred to another. Some

    companies make money out of selling personal information.

    The information held on you might be wrong - entered incorrectly, out of date,

    been confused with someone elses!. It could state that you had been in trouble

    with the police when you hadn't, or that you owed money when you didn't.

    The 1998 Data Protection Actsets out in law the rules for processing personal

    information. A Data Protection Commissioneris responsible for enforcing theAct. The Act applies to paper records, as well as computer.

    data subjectspeople who have data held about them .

    data controllersThe organizations and people who have the data.

    Many people have details on other people's computers - your school, your doctor.Can lead to many problems and dangers.

  • 8/13/2019 Law - BH

    12/12

    Data Protection ActYou have a legal right to find out what information is held about you on computer

    You can write to the person or organization which holds the information. You are

    not allowed to check information held on you concerning such things as nationalsecurity, crime prevention/detection, salaries and income tax

    Data Protection Act, 1998: The eight rules:

    1. Fairly and lawfully processed2. Processed for limited purposes

    3. Adequate, relevant and not excessive

    4. Accurate

    5. Not kept longer than necessary

    6. Processed in line with data subjects' rights7. Secure

    8. Not transferred to countries without adequate

    protection