AS IT INFO 2 - Acts

Description

IT Mind Map on AS IT INFO 2 - Acts, created by Jarth on 09/05/2013.
Jarth
Mind Map by Jarth, updated more than 1 year ago
Jarth
Created by Jarth almost 11 years ago
55
1

Resource summary

AS IT INFO 2 - Acts
  1. Copyright, Designs & Patents Act
    1. Established 1988
      1. 'Makes it illegal to copy or distribute software without permission or a licence'
        1. Covers music, literature and software
        2. Data Protection Act
          1. Purposes
            1. Requires People who use Personal Data to be Honest and Upfront about its use.
              1. Gives Individuals Certain Statutory Rights
              2. Created in 1984, revised in 1998
                1. Provides legal rights for computer users
                2. Freedom of Information Act
                  1. Concerns itself with information needed by the public authority
                    1. Includes:
                      1. How public authorities carry out their duties
                        1. How public authorities make their decisions
                          1. How public authorities spend public money
                          2. Exemptions:
                            1. Where information could jeopardise the prevention/ detection of a crime
                              1. Where the cost of collecting information exceeds a reasonable limit
                              2. Made in 2000
                              3. Computer Misuse Act
                                1. Introduced 1990
                                  1. Examples of crimes
                                    1. Unauthorised access to computer programs or data
                                      1. Up to a six month penalty and/or a fine
                                        1. Guessing someone's password then looking at the system to see what data it contains
                                        2. Unauthorised access with further criminal intent
                                          1. Up to a five year penalty and/ or a fine
                                            1. Guessing passwords to bank accounts and using that to access sensitive data without the subject's permission with the intention of committing fraud
                                            2. Unauthorised modification of computer material
                                              1. Carries up to five years offence penalty and/or a fine
                                                1. Deliberately deleting files, introducing viruses or modifying programs intending to cause damage
                                            3. Regulation of Investigatory Powers Act
                                              1. An offence to access or intercept a message sent through either public or private telecommunications
                                                1. Established 2000
                                                  1. Data interception only allowed in certain situations, for example, when a message must be intercepted to help solve a crime
                                                  Show full summary Hide full summary

                                                  Similar

                                                  Project Communications Management
                                                  farzanajeffri
                                                  Common Technology Terms
                                                  Julio Aldine Branch-HCPL
                                                  Network Protocols
                                                  Shannon Anderson-Rush
                                                  Abstraction
                                                  Shannon Anderson-Rush
                                                  Computing
                                                  Kwame Oteng-Adusei
                                                  HTTPS explained with Carrier Pigeons
                                                  Shannon Anderson-Rush
                                                  Introduction to the Internet
                                                  Shannon Anderson-Rush
                                                  Construcción de software
                                                  CRHISTIAN SUAREZ
                                                  Historical Development of Computer Languages
                                                  Shannon Anderson-Rush
                                                  Useful String Methods
                                                  Shannon Anderson-Rush
                                                  Web Designing & Development Full Tutorial
                                                  Nandkishor Dhekane