null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
42711
Chapter 7 Cont...
Description
ICT AS (Chapter 7 - Role and Impact of ICT) Mind Map on Chapter 7 Cont..., created by Katie Difford on 10/04/2013.
No tags specified
chapter 7 - role and impact of ict
ict as
ict as
chapter 7 - role and impact of ict
Mind Map by
Katie Difford
, updated more than 1 year ago
More
Less
Created by
Katie Difford
over 12 years ago
44
0
0
Resource summary
Chapter 7 Cont...
Data Protection Act (1998)
6 Main Rights
Subject access
Prevent processing likely to cause damage or distress
Prevent processing for direct marketing
Relating to automated decision making
Compensation is damage/distress is caused
Block, erase, rectify incorrect data
Protect individuals from organisations
8 Principles
Processed fairly and lawfully
Only obtained for specified and lawful purposes
Adequate, relevant
Accurate, up-to-date
Not kept for longer than necessary
Processed in line with rights
Kept secure
Not be transferred outside EU
Computer Misuse Act (1990)
Unauthorized access to computer material
Unauthorized access with intent to commit further offences
Unauthorized acts with intent to impair operation of a computer
Making, supplying or obtaining articles for use in computer misuse offences
Copyright, Designs and Patents Act (1988)
Makes it illegal to steal or create unauthorized copies of software
Covers manuals, books, CDs and music
Combating ICT crime
Physical Methods
Security guards
Automatic door that responds to a pass
Locked rooms
Logical Methods
Access rights
Usernames and passwords
Firewalls
Freedom of Information Act (2000)
Access to official documentation
Applies to all public authorities
Allows anyone to make a request for information
20 working days to comply with request
Electronic Communications Act (2000)
Cryptography service providers - this allows the government to set up a register
Facilitation of electronic commerce data storage - recognizes digital signatures
Regulation of Investigatory Powers Act (2000)
Address concerns about the use and misuse of communication interception techniques by public and private organisations
Lawful interception of telecommunications and postal and digital communications
Criminal offence to monitor communications without lawful authority
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
Chapter 7
Katie Difford
Chapter 7
Katie Difford
Chapter 1
Katie Difford
Chapter 2
Katie Difford
Chapter 6
Katie Difford
Chapter 5
Katie Difford
Chapter 4
Katie Difford
Chapter 1 Questions
Katie Difford
Chapter 3
Katie Difford
Chapter 5
Katie Difford
Chapter 6
Katie Difford
Browse Library