Laws that impact IT Systems

James Cooper
Mind Map by James Cooper, updated more than 1 year ago
James Cooper
Created by James Cooper almost 3 years ago


There are different laws and acts that are in place to prevent things happening when using IT systems.

Resource summary

Laws that impact IT Systems
  1. Computer Missuse Act 1990
    1. Is an Act to make provision for securing computer material against unauthorised access or modification; and for connected purposes.
      1. Unauthorised access to computer material, punishable by 12 months imprisonment and or a fine on a level 5 standard scale (£5,000).
        1. Unauthorised access with intent to commit or facilitate commission of further offences, punishable by 12 months or maximum fine on summary conviction and or 5 years or fine on indictment
          1. Unauthorised modification of computer material, punishable by 12 months or maximum fine on summary conviction and/or 10 years or fine on indictment
        2. Copyright, Design and Patents Act 1988
          1. Gives the creators of literary, dramatic, musical and artistic works the right to control the ways in which their material may be used.
            1. Businesses can use this act so that they can brand their products and not have them products copied. This is so people can't sell the same products at the same time or claim the credit for first designing that product. This law helps with the theft of the product
              1. Normally the individual or collective who authored the work will exclusively own the rights.
            2. Health and Safety (Display Screen Equipment (DSE)) Regulations 1992
              1. As an employer, you must protect your workers from the health risks of working with display screen equipment (DSE), such as PCs, laptops, tablets and smartphones. The Health and Safety (Display Screen Equipment) Regulations 1992 apply to workers who use DSE daily, for an hour or more at a time.
              2. Data Protection Act 1998
                1. Protects personal data stored on computers or in an organised paper filing system.
                  1. The Act defined eight data protection principles to ensure that information was processed lawfully.
                    1. Personal data shall be processed fairly and lawfully and, in particular, shall not be processed
                      1. Unless
                        1. At least one of the conditions in Schedule 2 is met.
                          1. In the case of sensitive personal data, at least one of the conditions in Schedule 3 is also met.
                        2. Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes.
                          1. Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed.
                            1. Personal data shall be accurate and, where necessary, kept up to date.
                              1. Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes.
                                1. About the rights of individuals
                                  1. Like personal data shall be processed in accordance with the rights of data subjects (individuals).
                                  2. Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.
                                    1. Personal data shall not be transferred to a country or territory outside the European Economic Area unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data.
                                  3. Consumer Rights Act 2015
                                    1. Consumers can buy and businesses can sell to them with confidence. On the rare occasions when problems arise, disputes can now be sorted out more quickly and cheaply.
                                    2. Disability Discrimination Acts 1995 and 2005
                                      1. The law states that IT systems have to be accessible for people with disabilities.
                                        1. It does not state how this can be done!
                                        2. It sets out the rights of people with disabilities in relation to employment, education, access to goods & services, buying or renting property.
                                          1. There are two laws which promote equality of opportunity for people with disabilities people by banning disability discrimination and which give enforceable legal rights to people with disabilities.
                                            1. Disability Discrimination Act 1995
                                              1. Special Educational Needs & Disability (NI) Order 2005
                                            2. Equality Act 2010
                                              1. It legally protects people from discrimination in the workplace and in wider society. It replaced previous anti-discrimination laws with a single Act, making the law easier to understand and strengthening protection in some situations.
                                                1. Businesses can use it by making sure they do not descriminate ethinics or genders within their workplace and give everyone equal rights
                                                Show full summary Hide full summary


                                                Project Communications Management
                                                Common Technology Terms
                                                Julio Aldine Branch-HCPL
                                                Network Protocols
                                                Shannon Anderson-Rush
                                                Kwame Oteng-Adusei
                                                Shannon Anderson-Rush
                                                HTTPS explained with Carrier Pigeons
                                                Shannon Anderson-Rush
                                                Introduction to the Internet
                                                Shannon Anderson-Rush
                                                Useful String Methods
                                                Shannon Anderson-Rush
                                                Web Designing & Development Full Tutorial
                                                Nandkishor Dhekane
                                                Construcción de software
                                                CRHISTIAN SUAREZ
                                                LAN and WAN
                                                Nathan Roberts