Chapter 7 Cont...

Description

ICT AS (Chapter 7 - Role and Impact of ICT) Mind Map on Chapter 7 Cont..., created by Katie Difford on 10/04/2013.
Katie Difford
Mind Map by Katie Difford, updated more than 1 year ago
Katie Difford
Created by Katie Difford about 12 years ago
42
0
1 2 3 4 5 (0)

Resource summary

Chapter 7 Cont...
  1. Data Protection Act (1998)
    1. 6 Main Rights
      1. Subject access
        1. Prevent processing likely to cause damage or distress
          1. Prevent processing for direct marketing
            1. Relating to automated decision making
              1. Compensation is damage/distress is caused
                1. Block, erase, rectify incorrect data
                2. Protect individuals from organisations
                  1. 8 Principles
                    1. Processed fairly and lawfully
                      1. Only obtained for specified and lawful purposes
                        1. Adequate, relevant
                          1. Accurate, up-to-date
                            1. Not kept for longer than necessary
                              1. Processed in line with rights
                                1. Kept secure
                                  1. Not be transferred outside EU
                                2. Computer Misuse Act (1990)
                                  1. Unauthorized access to computer material
                                    1. Unauthorized access with intent to commit further offences
                                      1. Unauthorized acts with intent to impair operation of a computer
                                        1. Making, supplying or obtaining articles for use in computer misuse offences
                                        2. Copyright, Designs and Patents Act (1988)
                                          1. Makes it illegal to steal or create unauthorized copies of software
                                            1. Covers manuals, books, CDs and music
                                            2. Combating ICT crime
                                              1. Physical Methods
                                                1. Security guards
                                                  1. Automatic door that responds to a pass
                                                    1. Locked rooms
                                                    2. Logical Methods
                                                      1. Access rights
                                                        1. Usernames and passwords
                                                          1. Firewalls
                                                        2. Freedom of Information Act (2000)
                                                          1. Access to official documentation
                                                            1. Applies to all public authorities
                                                              1. Allows anyone to make a request for information
                                                                1. 20 working days to comply with request
                                                                2. Electronic Communications Act (2000)
                                                                  1. Cryptography service providers - this allows the government to set up a register
                                                                    1. Facilitation of electronic commerce data storage - recognizes digital signatures
                                                                    2. Regulation of Investigatory Powers Act (2000)
                                                                      1. Address concerns about the use and misuse of communication interception techniques by public and private organisations
                                                                        1. Lawful interception of telecommunications and postal and digital communications
                                                                          1. Criminal offence to monitor communications without lawful authority
                                                                          Show full summary Hide full summary

                                                                          0 comments

                                                                          There are no comments, be the first and leave one below:

                                                                          Similar

                                                                          Chapter 7
                                                                          Katie Difford
                                                                          Chapter 1
                                                                          Katie Difford
                                                                          Chapter 2
                                                                          Katie Difford
                                                                          Chapter 6
                                                                          Katie Difford
                                                                          Chapter 5
                                                                          Katie Difford
                                                                          Chapter 4
                                                                          Katie Difford
                                                                          Chapter 1 Questions
                                                                          Katie Difford
                                                                          Chapter 3
                                                                          Katie Difford
                                                                          Chapter 5
                                                                          Katie Difford
                                                                          Chapter 6
                                                                          Katie Difford