computing legal considerations

HideShow resource information
  • Created by: angus f.v
  • Created on: 21-06-14 02:01
Weee
Waste Electrical and Electronic Equipment regulations. E-waste products must be disposed of properly at recycling sites.
1 of 8
Computer Misuse Act
Makes it illegal to gain unauthorised access to computer systems and modify the data stored in them. This means it is illegal to hack or to knowingly + maliciously create or distribute a virus.
2 of 8
Copyright, Designs and Patents Act
Makes it illegal to cop, distribute or use copyrighted material without the permission of the copyright holder.
3 of 8
Data Protection Act
Deals with the holding storage + use of personal information by organisation + businesses.
4 of 8
RIPA (Regulation of Investigatory Powers Act)
under this act you must: 1. hand over encryption keys must be handed over to the police when requested and 2. employers can monitor employees computers at work.
5 of 8
Freedom of Information Act
You have the right to see how public money is spent by public organisations.
6 of 8
Communications Act
1. It is illegal to electronically transmit threatening, abusive, indecent or grossly offensive material. 2. It is illegal to use a wifi network without the owner's permission.
7 of 8
Data Protection Act
deals with the storage and use of personal information by organisations. Data subject-The person about whom the data is held. Data User-The people in the company who are using the data. Data controller-The person how holds the data and is responsible
8 of 8

Other cards in this set

Card 2

Front

Makes it illegal to gain unauthorised access to computer systems and modify the data stored in them. This means it is illegal to hack or to knowingly + maliciously create or distribute a virus.

Back

Computer Misuse Act

Card 3

Front

Makes it illegal to cop, distribute or use copyrighted material without the permission of the copyright holder.

Back

Preview of the back of card 3

Card 4

Front

Deals with the holding storage + use of personal information by organisation + businesses.

Back

Preview of the back of card 4

Card 5

Front

under this act you must: 1. hand over encryption keys must be handed over to the police when requested and 2. employers can monitor employees computers at work.

Back

Preview of the back of card 5
View more cards

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all Legal considerations resources »