Pages in this set

Page 1

Preview of page 1
Unit 15: Legislation
Computer Misuse Act
The Computer Misuse Act 1990 states that it is illegal to obtain
unauthorised access to any computer or to modify its contents.
There are three offences, which are defined in this Act.
1) Unauthorised access to computer material
2) Unauthorised access with intent to…

Page 2

Preview of page 2
b) Hacking into a computer to find out Colonel Sanders' secret recipe for Kentucky Fried Chicken
(unauthorised access) and selling the recipe on to a rival company to make money (committing a
further offence).

3) Unauthorised modification of computer material.
What does unauthorised modification of computer material mean?
a) Hacking…

Page 3

Preview of page 3
The must also inform the Data Protection Commissioner (this is the person who enforces the
Act). One of the other things they must do is to follow the rules and regulations laid down by the
Act. Failure to follow the procedures could cause problems for the company they are employed…

Page 4

Preview of page 4
Economic Area, unless that country or territory has taken adequate precautions to protect the
rights and freedom of the information in relation to the processing of personal data.


In Summary: It Must Be...
1. Processed fairly and lawfully
2. Obtained for specified and lawful purposes
3. Adequate, relevant and not…

Page 5

Preview of page 5
Does everyone have to register if they keep any data for personal use?
No, not everyone has to register their use of personal data, so if you hold your address book,
birthday list or Christmas card list on your home computer you do not need to worry.

There are exemptions…

Comments

No comments have yet been made

Similar Business & Communication Systems resources:

See all Business & Communication Systems resources »See all resources »