ICT - Data Protection and Copyright

?
  • Created by: lou9119
  • Created on: 02-05-16 18:56
View mindmap
  • Data Protection and Copyright
    • Copyright Law
      • To copy work you need permission an you may have to pay a fee.
      • 1988
      • Software Privacy
        • The stealing or copying of work without permission of  the copyright holder.
          • Site licences can be bought to legally copy to a certain amount of times.
    • Data Protection Act 1998
      • Data is held about all of us on many systems. We have certain rights under this Act. Any organisations that holds data about us have certain obligations.
      • Were are the subjects of this data and we have the rights to:
        • have access to the data
        • have any mistakes corrected
        • receive compensation if misuse of this data causes stress
      • Organisations that hold this data are known as users, they have the obligations to:
        • keep the data secure
        • only use the data for the purpose it was collected for
        • not keep data for longer than necessary
    • Accidental damage to files
      • Back-ups should be kept to ensure that the data isn't lost. They should:
        • store it somewhere different
        • made fresh at different intervals
        • named carefully to now which is the most recent copy
    • Viruses
      • -The definition of this is a computer program which can copy itself from one computer to another, attach to an email and spread and cause damage to files.
      • Anti-virus software can be installed and checks can be done but you should also take precautions such as:
        • No unchecked memory sticks
        • Don't open emails from anyone you don't know
        • Don't open unknown attachments
        • Don't download things that are unknown
        • Virus-checks
    • Hacking
      • Data can be encrypted to prevent anyone else understanding it.
      • A firewall can be used to prevent hackers from accessing the system.
    • Protection from Hackers
      • Hacking
        • Data can be encrypted to prevent anyone else understanding it.
        • A firewall can be used to prevent hackers from accessing the system.
      • Each user needs a username and password.
      • Passwords should be changed regularly.
      • No obvious passwords.
      • Tell no one your password details.
      • Log off properly.

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Acts, Security and Legislation resources »