Please enable JavaScript.
Coggle requires JavaScript to display documents.
Computing Related Legislation - Coggle Diagram
Computing Related Legislation
Computer MIsuse Act 1990
The computer misuse acts makes hacking a crime, specifically:
Unauthorised access to computer materials
Unauthorised access with intent to commit or facilitate a crime
Unauthorised modification of computer material
Making, supplying or obtaining anything which can be used in computer misuse offences
Crimes include:
Spreading a virus
Attmepting to log in without authoristation
Using someone else's login
reading,chaning or deleting data
Obtaining or creating a packet sniffer
Data Protection Act 1998
Sets Laws for the protection of personal data (the people are living, identifiable). This includes paper records and computerised ones
On death, the data protection act is no longer relevant.
The storage and processing of personal details must
Be fair and lawful
Relevant and not excessive
Accurate and up to date
Only kept as long as needed
Only be used for the stated purpose
Be kept securely as suitable for the data
Handled in line with peoples' rights
People can access the information that is stored about them
Not be transferred to countries without suitable protection laws
Exceptions
National Security
Data about terrorists
Crime and Taxation
Police surveillance
Domestic Purposes
Address books
Breaches of the data protection act are reported to information commissioner who investigate into the breaches and will fine them if they find them in violation.
Copyright, Designs and Patents Act 1988
Protects creators of books, music, video and software from having their work illegally copied and applies to all types of copying
Steps to prevent illegal copying of software
A unique key is required before the software is installed
Software could require the CD to be present in the drive
A dongle is required to run the application
Algorithms cannot be copyrighted
Applies to ideas and intellectual property
Very difficult to prove copyright
Regulation of Investigatory Powers Act 2000
Gives powers to the government to investigate personal data
Requires ISPs to assist in surveillance secretly
Enables mass surveillance of communications in transit and monitoring of internet activities
Enables certain public bodies to demand that someone hand over keys to protected information
Prevents the existence of interception warrants and any data collected with them from being revealed
Privacy and security and the data is a common long answer question