Please enable JavaScript.
Coggle requires JavaScript to display documents.
Computing Related Legislation, Regulation of Investigatory Powers Act…
-
-
-
- Unauthorised access to computer material
- Unauthorised access with intent to commit or facilitate a crime
- Unauthorised modification of computer material
- Making, supplying or obtaining anything which can be used in computer misuse offences
- Data must be processed fairly and lawfully
- Data must be adequate, relevant and not excessive.
- Data must be accurate and up to date
- Data must not be retained for longer than necessary
- Data can only be used for the purpose for which it was collected.
-
- Data must be handled in accordance with people's rights
- Data must not be transferred outside the EU without adequate protection
- Enables certain public bodies to demand that. an ISP provide access to a customers communications in secret
- Enables mass surveillance of communications in transit
- Enables certain public bodies to demand ISPs fit equipment to facilitate surveillance
- Enables certain public bodies to demand that someone hand over keys to protected information
- Allows certain public bodies to monitor people's internet activities.
- Prevents the existence of interception warrants and any data collected with them from being revealed in court.
-
- Make a copy and then sell it
- Use the software on a network, unless the licence allows it
- The user must enter a unique key before the software is installed
- Some software will only run if the CD is present in the drive
- Some applications will only run if a special piece of hardware (dongle) is plugged into a USB port on the computer