null
US
Iniciar Sesión
Regístrate Gratis
Registro
Hemos detectado que no tienes habilitado Javascript en tu navegador. La naturaleza dinámica de nuestro sitio requiere que Javascript esté habilitado para un funcionamiento adecuado. Por favor lee nuestros
términos y condiciones
para más información.
Siguiente
Copiar y Editar
¡Debes iniciar sesión para completar esta acción!
Regístrate gratis
42711
Chapter 7 Cont...
Descripción
(Chapter 7 - Role and Impact of ICT) ICT AS Mapa Mental sobre Chapter 7 Cont..., creado por Katie Difford el 10/04/2013.
Sin etiquetas
chapter 7 - role and impact of ict
ict as
ict as
chapter 7 - role and impact of ict
Mapa Mental por
Katie Difford
, actualizado hace más de 1 año
Más
Menos
Creado por
Katie Difford
hace casi 13 años
44
0
0
Resumen del Recurso
Chapter 7 Cont...
Data Protection Act (1998)
6 Main Rights
Subject access
Prevent processing likely to cause damage or distress
Prevent processing for direct marketing
Relating to automated decision making
Compensation is damage/distress is caused
Block, erase, rectify incorrect data
Protect individuals from organisations
8 Principles
Processed fairly and lawfully
Only obtained for specified and lawful purposes
Adequate, relevant
Accurate, up-to-date
Not kept for longer than necessary
Processed in line with rights
Kept secure
Not be transferred outside EU
Computer Misuse Act (1990)
Unauthorized access to computer material
Unauthorized access with intent to commit further offences
Unauthorized acts with intent to impair operation of a computer
Making, supplying or obtaining articles for use in computer misuse offences
Copyright, Designs and Patents Act (1988)
Makes it illegal to steal or create unauthorized copies of software
Covers manuals, books, CDs and music
Combating ICT crime
Physical Methods
Security guards
Automatic door that responds to a pass
Locked rooms
Logical Methods
Access rights
Usernames and passwords
Firewalls
Freedom of Information Act (2000)
Access to official documentation
Applies to all public authorities
Allows anyone to make a request for information
20 working days to comply with request
Electronic Communications Act (2000)
Cryptography service providers - this allows the government to set up a register
Facilitation of electronic commerce data storage - recognizes digital signatures
Regulation of Investigatory Powers Act (2000)
Address concerns about the use and misuse of communication interception techniques by public and private organisations
Lawful interception of telecommunications and postal and digital communications
Criminal offence to monitor communications without lawful authority
Mostrar resumen completo
Ocultar resumen completo
¿Quieres crear tus propios
Mapas Mentales
gratis
con GoConqr?
Más información
.
Similar
Chapter 7
Katie Difford
Chapter 7
Katie Difford
Chapter 1
Katie Difford
Chapter 2
Katie Difford
Chapter 6
Katie Difford
Chapter 5
Katie Difford
Chapter 4
Katie Difford
Chapter 1 Questions
Katie Difford
Chapter 3
Katie Difford
Chapter 5
Katie Difford
Chapter 6
Katie Difford
Explorar la Librería