Chapter 7 - Acts

Description

ICT Mind Map on Chapter 7 - Acts, created by smita089 on 11/04/2013.
smita089
Mind Map by smita089, updated more than 1 year ago
smita089
Created by smita089 about 11 years ago
98
0

Resource summary

Chapter 7 - Acts
  1. Data Protection Act (1998)
    1. Terminology
      1. Personal data - any data which relates to a living, identifiable individual.
        1. Data - anything that is held which can be said to be part of a record. This covers both manual and computer data.
          1. Processing - Obtaining, recording or holding the information or data. It also covers any operation performed on the information or data.
          2. People Involved
            1. Data subject - the living identifiable human being about whom the data is being held.
              1. Data controller - responsible for making sure that all the provisions of the Data Protection Act are being complied with.
                1. Data processor - any person (other than an employee of the Data controller) who processes the data on behalf of the data controller.
                  1. Recipient - individuals who are given the data in order to do some form of processing on it.
                    1. Third party - this is the person who receives the data for processing.
                      1. Information commissioner - responsible for ensuring that the Data Protection Act is being adhered to, by giving advice and investigating complaints.
                      2. Rights
                        1. Right to subject access.
                          1. Right to prevent processing likely to cause damage or distress.
                            1. Right to prevent processing for the purposes of direct marketing.
                              1. Rights in relation to automated decision making.
                                1. Right to compensation if damage and distress is suffered by the Act being contravened.
                                  1. Right to rectify, block or erase incorrect data.
                                  2. Excepetions
                                    1. National security.
                                      1. Crime and taxation.
                                        1. Health, education and social work.
                                          1. Domestic purposes.
                                          2. Provisions
                                            1. Personal data shall be processed fairly and lawfully.
                                              1. Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible.
                                                1. Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed.
                                                  1. Personal data shall be accurate and, where necessary, kept up to date.
                                                2. Computer Misuse Act (1990)
                                                  1. Provisions
                                                    1. Unauthorised access to computer material.
                                                      1. Unauthorised access to with intent to commit or facilitate the commission of further offences.
                                                        1. Unauthorised acts with intent to impair, or with recklessness as to impairing, operation of a computer.
                                                          1. Making, supplying or obtaining articles for use in computer misuse offences (known as Section 3A).
                                                          2. Evaluation
                                                            1. Advantages
                                                              1. Until the CMA, theft of electricity was the only ICT crime to be charged with.
                                                                1. Legal grounding if a company’s security has been compromised.
                                                                2. Disadvantages
                                                                  1. There has to be intentions to commit a crime.
                                                                    1. Hard to find out who is responsible.
                                                                      1. Only enforced once the crime has been committed.
                                                                        1. Friends/colleagues are technically breaking the law by signing onto your account.
                                                                    2. Copyright, Designs and Patents Act (1988)
                                                                      1. Makes it illegal to steal or create unauthorised copies of software.
                                                                        1. Covers manuals, books, CDs and music.
                                                                          1. Evaluation
                                                                            1. Advantages
                                                                              1. Those who create it keep it as their own.
                                                                                1. Monetary rewards.
                                                                                2. Disadvantages
                                                                                  1. When you buy software you’ve only bought a license to use it.
                                                                                    1. Some software have a maximum amount of users.
                                                                                      1. People often do not understand the licenses.
                                                                                        1. Illegally downloading hinders future development.
                                                                                    2. Regulation of Investigatory Powers Act (2000)
                                                                                      1. Provisions
                                                                                        1. Address concerns about the user and misuse of communication interception techniques used by organisations.
                                                                                          1. Alows lawful interception of postal, telecommunications and digital communications.
                                                                                            1. Criminal offence to monitor communications without lawful authority.
                                                                                            2. Organisations may monitor and record communications...
                                                                                              1. To establish the existence of facts to ascertain compliance with regulatory or self-regulatory practices or procedures.
                                                                                                1. In the interests of national security.
                                                                                                  1. To prevent or detect crime.
                                                                                                    1. To investigate or detect unauthorised use of telecommunications systems.
                                                                                                      1. To secure, or as an inherent part of, effective system operation.
                                                                                                      2. Organisations may monitor by not record...
                                                                                                        1. Received communications to determine whether they are business or personal communications.
                                                                                                          1. Communications made to anonymous telephone help lines. Public interceptions can also be made with lawful authority.
                                                                                                          2. Evaluation
                                                                                                            1. Advantages
                                                                                                              1. Monitor what employees are doing.
                                                                                                                1. Ensure facilities are being used correctly.
                                                                                                                2. Disadvantages
                                                                                                                  1. Breach of trust.
                                                                                                                    1. Breach of privacy.
                                                                                                                3. The Electronic Communications Act (2000)
                                                                                                                  1. Provisions
                                                                                                                    1. Cryptography service provided - allows the government to set up a register of approved cryptography services.
                                                                                                                      1. Facilitation of electronic commerce data storage - this recognises digital signatures which are now admissible in law.
                                                                                                                        1. Designed to facilitate e-commerce and recognise digital signatures and setting up a register of cryptography service providers.
                                                                                                                        2. Evaluation
                                                                                                                          1. Advantages
                                                                                                                            1. Contracts signed online have same legality of those signed by hand.
                                                                                                                              1. Increased security of e-commerce.
                                                                                                                                1. Legal backing.
                                                                                                                                2. Disadvantages
                                                                                                                                  1. Will take a long time for some bodies to accept online signatures.
                                                                                                                                    1. Security risk.
                                                                                                                                3. Freedom of Information Act (2000)
                                                                                                                                  1. Provisions
                                                                                                                                    1. Deals with access to official information that is being able to find out information on any topic from any public authority.
                                                                                                                                      1. Includes government, health services, schools and police.
                                                                                                                                        1. Anyone can make a request – no restrictions on age.
                                                                                                                                          1. 20 works days to comply with your request.
                                                                                                                                          2. Evaluation
                                                                                                                                            1. Advantages
                                                                                                                                              1. Accessibility.
                                                                                                                                                1. Information is available for those who request it.
                                                                                                                                                2. Disadvantages
                                                                                                                                                  1. Some information may be withheld to protect various interests.
                                                                                                                                                    1. Public authority does not have to conform or deny the existence of the information you request.
                                                                                                                                                Show full summary Hide full summary

                                                                                                                                                Similar

                                                                                                                                                Types and Components of Computer Systems
                                                                                                                                                Jess Peason
                                                                                                                                                Input Devices
                                                                                                                                                Jess Peason
                                                                                                                                                Output Devices
                                                                                                                                                Jess Peason
                                                                                                                                                Networks
                                                                                                                                                Will8324
                                                                                                                                                General ICT Quiz
                                                                                                                                                leahshaw
                                                                                                                                                ICT Revison Flash Cards
                                                                                                                                                Arun Johal
                                                                                                                                                FLAT FILE VS RELATIONAL DATABASE
                                                                                                                                                rosiejones
                                                                                                                                                Online World - Learning Aim A
                                                                                                                                                andysedge
                                                                                                                                                Business Aims and ICT Strategies
                                                                                                                                                scrt
                                                                                                                                                User Interfaces
                                                                                                                                                Skeletor
                                                                                                                                                General ICT Quiz
                                                                                                                                                Jade Fantom