ICT - Data Protection and Copyright
- Created by: lou9119
- Created on: 02-05-16 18:56
View mindmap
- Data Protection and Copyright
- Copyright Law
- To copy work you need permission an you may have to pay a fee.
- 1988
- Software Privacy
- The stealing or copying of work without permission of the copyright holder.
- Site licences can be bought to legally copy to a certain amount of times.
- The stealing or copying of work without permission of the copyright holder.
- Data Protection Act 1998
- Data is held about all of us on many systems. We have certain rights under this Act. Any organisations that holds data about us have certain obligations.
- Were are the subjects of this data and we have the rights to:
- have access to the data
- have any mistakes corrected
- receive compensation if misuse of this data causes stress
- Organisations that hold this data are known as users, they have the obligations to:
- keep the data secure
- only use the data for the purpose it was collected for
- not keep data for longer than necessary
- Accidental damage to files
- Back-ups should be kept to ensure that the data isn't lost. They should:
- store it somewhere different
- made fresh at different intervals
- named carefully to now which is the most recent copy
- Back-ups should be kept to ensure that the data isn't lost. They should:
- Viruses
- -The definition of this is a computer program which can copy itself from one computer to another, attach to an email and spread and cause damage to files.
- Anti-virus software can be installed and checks can be done but you should also take precautions such as:
- No unchecked memory sticks
- Don't open emails from anyone you don't know
- Don't open unknown attachments
- Don't download things that are unknown
- Virus-checks
- Hacking
- Data can be encrypted to prevent anyone else understanding it.
- A firewall can be used to prevent hackers from accessing the system.
- Protection from Hackers
- Hacking
- Data can be encrypted to prevent anyone else understanding it.
- A firewall can be used to prevent hackers from accessing the system.
- Each user needs a username and password.
- Passwords should be changed regularly.
- No obvious passwords.
- Tell no one your password details.
- Log off properly.
- Hacking
- Copyright Law
Comments
No comments have yet been made