First 258 words of the document:
Data Protection Act (1998) Allows individuals access to information stored on them.
Designed to regulate and Eight principles organisations must follow.
safeguard data held by Rights of individuals including access and correction.
organisations about an individual.
Computer Misuse Act (1990) Protect data held by companies from hackers.
Act that makes illegal the Three crimes: unauthorised access, unauthorised access
unauthorised access to and with modifications, unauthorised access to intent to
modification of computer commit crime.
materials. Problem: proving an individual is committing the crime.
Copyright, Designs and Patents Act Illegal to create/steal music, books, CDs etc.
(1988) Permission must be given.
Makes it illegal to steal or create People who create these software should be recognised.
unauthorised copies of software Problem: complex licensing rules which are difficult to follow.
and to reproduce manuals. ICT equipment makes copying easy.
Regulation of Investigatory Act (2000) Allowed the interception of communications.
Relates to the monitoring of Interpretation of `lawful authority.'
communications- telephone calls Some things can be monitored and recorded, other just
and emails. monitored.
Electronic Communications Act (2000) Register of cryptography providers.
Designed to facilitate Digital signatures admissible in law.
e-commerce and recognise digital
signatures and setting up a
register of cryptography service
Freedom of Information Act (2000) Information held by public authorities is accessible.
Right to ask any public body for all Problem: ethical.
the information they have on any