Legislations.

    Cards (8)

    • Data Protection Act 1988
      Controls the storage of data's about individuals. Makes a data controller responsible for the accurate and security of data kept by and organisation .

      Provisions
      • Data processed fairly and lawfully
      • Data shouldn't be kept longer than essential
      • Data should be accurate and up to date
      • Data should only be used for the purpose in which collected for
      • Data isn't transferred out the EU without the right protection and security mesures.
      • Data isn't transferred out the EU without the right protection and security measures.
      • Ensure only relevant data are kept about people
    • Computer misuse Act 1990
      Designed to prevent unauthorised access (hacking)
      Recognisable offence;
      • Unauthorised access to material
      • Intent to commit/ Facilitate crime
      • Unauthorised access to modification of material
      • Supplying and obtaining anything in computer misuse Act offence
    • Copyright design and patent act 1988
      Protects creators book, music , audio from being used by making it illegal to copy or commercially distribute software without buying or getting appropriate software copyright.
      Illegal actions ;
      • Passing a copy to friend or family
      • Making a self copy and selling copy
      • Using the software on network without licence
      Prevention method;

      • Unique key that comes with buying the software , and before download
      • A CD in drive
      • A dongle plugged into a USB
      An algorithm cannot be protected .
    • Regulation of investigatory power Act (2000)
      Regulates power of public body to carry out Investigation and interception of communication , introduced to the account of technology growth, internet and strong encryption.

      Act enables;
      • Enables certain bodies to demand that LSP provides access to customer communciation in secret
      • Enables mass surveillance of communication in transit
      • Enables certain body demands LSP fit equipment to facilitate surveillance
      • Enables certain body hands over to protected information
      • Prevents existence of interception warrant and data collected revealed in court
    • Measures of Data Protection act 1988 for privacy
      • Customer has the right to see the data and to ask for it to be corrected if wrong
      • Data must be lawfully collected
      • Data can only be accessed by/changed by authorised people so that malicious alterations are not made
      • Authorised people must be notified to the DPR so that they are accountable
      • Data collected should not be excessive so that irrelevant data is not stored
      • Data should be accurate and up to date so that customers are not held responsible for goods they have not bought
      • Data should not be kept longer than necessary so that customers can leave an organisation
      • Data should be protected by adequate security measures so that people with malicious intent cannot gain access
      • Data should not be transferred out of the EU so that data remains subject to DPA
    • Computer changing the way people work, and impact on wellbeing (8 marks)
      • Computers have reduced the monotony of some jobs, work more challenging and rewarding.
      • Allow collaboration across the world
      • Bring in idea of strong IT skills, workers pressured to keep up with skills
      • Allowed flexible working such as working from home, may lead to people being isolated leading to depression
    • Computers being more portable ( 8 marks)
      • People are becoming more reliant on portable computer system
      • Instant access to data -Accessible anywhere
      • Signal orientation - problem for people with no technology knowledge
      • Social interaction apps make contacts more plentiful -No difficulty in contacting individuals or groups of individuals
      • Lead to cyber bullying
      • Loss of traditional means of communication .
    • Data protection steps
      • Passwords to gain access to system 
      • Passwords to access files 
      • Encryption of data 
      • Firewalls to restrict access to systems 
      • Physical measures to restrict access 
      • Proxy server to restrict users allowed access to individual machines on network from internet
      • Intrusion detection system to warn when uninvited access is attempted
      • Social engineering - keep people informed about benefit of safe passwords