null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
42990
Chapter 7
Description
ICT Mind Map on Chapter 7, created by green.george on 10/04/2013.
No tags specified
ict
ict
Mind Map by
green.george
, updated more than 1 year ago
More
Less
Created by
green.george
about 11 years ago
97
0
0
Resource summary
Chapter 7
Acts
Data Protection Act 1998 (DPA)
Data must be obtained fairly and lawfully
Data can only be held for lawful purposes
Personal data should be relevant
Data must be accurate and kept up-to-date
Not be kept for longer than necessary
Data must be processed in accordance with rights of subject (request and view)
Appropriate security measures. (CANT BE TRANSFERRED)
Computer Misuse Act 1990 (CMA)
Punishment
1 - 6 months Large fine
2 - 5 year Large fine
3 - 5 year Large fine
3a - 5 year unlimited fine
Crime
1 - Unauthorised access
2 - Unauthorised access with intent for crime
3 - Unauthorised modification (edit/delete)
3a - Making/Suppliying/Obtaining virus or worms
Copyright, Designs and Patents Act (CDPA)
rewards to creators
Protect them from theft/copy
Licenses
Single user
Multi user
Site
Regulation of Investigatory Powers Act 2000 (RIPA)
Organisations can intercept communication
Prevent and detect crimes
Breach of trust/privacy (especially in businesses)
Electronic Communications Act 2000 (ECA)
Cryptography service providers
Allows e-signatures
Can be hacked
Freedom of Information Act 2005 (FIA)
Public authority transparency
Anyone can request info.
Increased accountability
A body does not have to confirm or deny the existence of information
Networks
P2P - all connected devices have equal status
No need for expensive server equipment
Each person managers their own system
Set up with wizards
Security and anti-virus responsibility of user
Data can be stored on any computer
Each computer performing multiple tasks
Client Server - Powerful controlling computer manages peripherals and security
Back up, security and anti-virus are centralised
Network processing is central
Shared data stored centrally
Server and network OS cost money
Network site manager
Too much reliance on mainframe
Health & Safety
Safety
Trailing wires
Fire
Electric shock
Unstable tables/chairs
Food/Drink
Health
RSI
Carpal tunnel
Eye strain
Back pain
Fatigue
Stress
ICT and society
Communications
E-mail
Telephone
Internet
Systems
Fast
Remote
We demand too much
Organisations
Commerce
Medicine
Education
Security
Physical e.g. biometrics locks
Encryption - cypher key
Firewall - incoming/outgoing conections
Auditing - logs find patters
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
Types and Components of Computer Systems
Jess Peason
Input Devices
Jess Peason
Output Devices
Jess Peason
Networks
Will8324
General ICT Quiz
leahshaw
ICT Revison Flash Cards
Arun Johal
FLAT FILE VS RELATIONAL DATABASE
rosiejones
Online World - Learning Aim A
andysedge
Business Aims and ICT Strategies
scrt
User Interfaces
Skeletor
General ICT Quiz
Jade Fantom
Browse Library