Chapter 7

Mind Map by , created over 5 years ago

ICT AS OCR chapter 7

Created by gavinfree over 5 years ago
ICT Revision 2014
ICT GCSE flashcards
Catherine Archer
Input and Output Devices
Jess Peason
Cell Structure
Cell Structure
John O'Driscoll
Types and Components of Computer Systems
Jess Peason
GCSE ICT Revision
Andrea Leyden
Input Devices
Jess Peason
OCR gcse computer science
Jodie Awthinre
Chapter 7
1 Data Protection Act 1998
1.1 DPA Principles
1.1.1 Processed fairly and lawfully Data subjects must be informed if data is being collected about them and their permission sought Data subjects must be aware of the purpose for which and collected data will be used
1.1.2 Used only for the purposes stated in the registry entry Data users can only use the data for those purposes The registration process with the ICO requires identification of the classes of data held and the purposes for which they are to be used
1.1.3 Adequate, relevant and not excessive There must be enough information to meet the needs of the organisation and individual An organisation must only keep relevant data and no more
1.1.4 Accurate and must be kept up to date An organisation is responsible for ensuring data is entered accurately Validation and verification can be used to help reduce data entry errors The organisation must review data regularly to ensure it is up to date and this may involve contacting data subjects to ask them to check their personal data If a data subject says data in inaccurate, then the errors must be corrected by the organisation
1.1.5 Not be held for longer than is necessary for the purpose Personal data can only be held while it is needed for its purpose
1.1.6 Be processed within the rights of the Data Subjects
1.1.7 Be kept secure and protected against unlawful access and accidental / deliberate damage Security measures must be put into place including anti-virus software, encryption, backups, authorisation and authentication Data users must be made aware of the need for security, particularly if they are carrying data on a portable device
1.1.8 Not be transferred outside of the European Union unless that country has adequate data protection legislation This has wide ranging consequences with much business being conducted internationally
1.2 The purpose of the DPA is to protect individual from organisations
1.3 Main aspects
1.3.1 Accurate
1.3.2 Secure
1.3.3 Used for specified purposes
1.3.4 Not kept for longer than necessary
1.3.5 Fairly and lawfully processed
1.4 DPA Terminology
1.4.1 Personal Data – Covers both facts and opinions about a living individual
1.4.2 Data – Anything which is part of a record about an individual e.g DOB, Name
1.4.3 Processing – Collection and storage of data which includes sorting the data into order
1.4.4 Data Subject – The person that the data is being collected from or stored about
1.4.5 Data Controller – Is responsible for ensuring the data meets the rights of the DPA
1.4.6 Data Processor – Third parties who process the data who are not necessarily part of the Data controller’s organisation
1.4.7 Recipient - This is any person who is employed to access, use or process personal data as part of their job
1.4.8 (Information) Commissioner – The person who has overall responsibility for enforcing the DPA across the UK
1.5 DPA Rights
1.5.1 Right to subject access
1.5.2 Right to rectify or remove incorrect data
1.5.3 Right to prevent processing that is likely to cause damage or distress
1.5.4 Right to compensation if damage or distress is caused
1.6 DPA Exemptions
1.6.1 Not everyone is automatically entitled to see the data which is held on them Crime Schools and examinations Taxation Health and Social Work (medical records)
2 Computer Misuse Act 1990
2.1 The purpose of the Act is to prevent the unauthorised use of computer systems and relates to both hardware and software
2.2 Computer Misuse Act Offences
2.2.1 Unauthorised access to computer material
2.2.2 Unauthorised access with intent to commit further crimes
2.2.3 Unauthorised modification of computer material
2.2.4 Making, supplying or obtaining material that could be used in computer misuse offences e.g. Viruses, Trojans
2.3 Computer Misuse Act Problems
2.3.1 Accidental Intrusion is not listed as a crime
2.3.2 There may be more than one person in the house therefore responsibility is an issue
2.3.3 The act can only be put in place once the crime has been committed
3 The Copyright, Designs and Patents Act, 1988
3.1 Act covers: stealing software, using illegally copied software and manuals, running purchased software on two or more machines at the same time without a suitable licence
4 Regulation of Investigatory Powers Act 2000
4.1 The purpose of the Act is for the organisation to lawfully intercept any misuse of communications device
4.2 Organisations may monitor and record communications
4.2.1 Prevent or detect crimes
4.2.2 Prevent public disorder from occurring
4.2.3 To ensure national security and the safety of the general public
4.2.4 To investigate or detect any abnormal or illegal use of telecommunication systems
4.2.5 Advantages The company can monitor what its employees are doing Make sure that the facilities are only being used for legitimate work Make sure company secrets are not being revealed
4.2.6 Disadvantages Monitoring can be seen as a breach of trust by employees Desire by employees to maintain their privacy
5 Electronic Communications Act (2000)
5.1 The purpose of the ECA was to make the UK the best place in the world for e-commerce
5.2 Advantages
5.2.1 Contracts that are signed over the Internet have the same legality as those signed by hand
5.2.2 Increases the security with which individuals can engage in e-commerce
5.2.3 Contracts entered into have legal backing
5.3 Disadvantages
5.3.1 Many people aren’t aware of digital signatures therefore it will take time for it to be accepted
5.3.2 Since transactions are important to people it will take a lot of time for it to be introduced
5.3.3 People feel insecure due to the security of digital signatures
6 Freedom of Information Act (2000)
6.1 The purpose of this act is being able to find out information on any topic from any public authority (government, hospitals, and schools)
6.2 People can write a letter to the public authority requesting the information they want, it takes 20 working days for them to respond to your request.
6.3 Advantages
6.3.1 Information which was not accessible to the general public is now available
6.3.2 People feel more confident that they know things aren’t being hidden
6.4 Disdvantages
6.4.1 There is no certainty that you will receive the information you ask for
6.4.2 The public authority have the right to deny any existence of the information
6.4.3 There is a large cost to respond and find the information
7 Methods for combating ICT crime and protecting ICT systems
7.1 Physical Security (Security guards)
7.2 Biometric Security (Fingerprints)
7.3 Location of Equipment
7.4 Firewalls (Prevents unauthorised computers connecting to your network)
7.5 Backup (Making a copy of the data)
7.6 Encryption (Coding the data)
7.7 Software Patches / Updates (Removes any flaws in the software)
7.8 Anti-virus / anti-spyware (Prevents viruses and spyware infecting machine)
7.9 Access rights (Access is only granted to certain users)
8 Networking
8.1 Linking together two or more computers to be able to share files through a server
8.2 Advantages
8.2.1 The sharing of peripherals (printers)
8.2.2 Data can be shared
8.2.3 Backup and virus checking from a central location
8.3 Disadvantages
8.3.1 Viruses can spread faster on a network
8.3.2 Lack of privacy
8.3.3 Initial cost of network
8.4 Local Area Network (LAN) – When computers are fairly close to one another
8.5 Wide Area Network (WAN) – When several different LAN’s are linked together it is spread over a wide area
8.6 A protocol is a set of rules which define:
8.6.1 How to establish communication between the machines
8.6.2 The format of any data which is to be exchanged between the machines

Media attachments