SlideShare una empresa de Scribd logo
1 de 8
Information Communication Technology
An Introduction to Legislation in the UK




                             Stonemasonry Department 2012
Legislation
Now that you understand what ICT can be used for, and how
you interact with it through hardware devices and software
 applications it is important to know about the legislation
    which covers the use of ICT in the United Kingdom.

         In this presentation you will learn about:

              The Computer Misuse Act 1990
                 The Data Protection Act
                      Copyright Law
Computer Misuse Act 1990
 This act makes it illegal to do any of the following:

 Access computer material without permission, eg looking
 at someone else's files.

 Access computer material without permission with intent
 to commit further criminal offences, eg hacking into the
 bank's computer and wanting to increase the amount in
 your account.

 Alter computer data without permission, eg writing a virus
 to destroy someone else's data, or actually changing the
 money in an account.
Information taken directly from http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/1dataandcomputermisuserev2.shtml
Is Hacking Illegal?
The short answer to this question is NO! Hacking is not illegal
provided you are doing it for legitimate purposes. Computer
hackers are split into three distinct groups; black hat, grey hat
                         and white hat.




     ILLEGAL                ILLEGAL               LEGAL
                            (but not criminal)
Is Hacking Illegal?
 Black hat hackers target the websites/data of
 organisations or people without permission and with the
 intent of causing harm, stealing files or profiting as a
 direct result of gaining access to a system.

 Grey hat hackers also gain access to systems without the
 permission of the owner but once in, they either inform
 the owner of how to improve security or fix any flaws
 themselves.

 White hat hackers gain access to systems with the
 permission of the owner. They carry out penetration
 testing “pen tests” to make sure that systems are secure.
The Data Protection Act (1998)

 The DPA 1998 was passed by Parliament to control the
 way information is handled and to give legal rights to
 people who have information stored about them.

 Some data and information stored on a computer is
 personal and needs to be kept confidential. People want to
 keep their pay, bank details, and medical records private
 and away from the view of just anybody. If someone who is
 not entitled to see these details can obtain access without
 permission it is unauthorised access. The Data Protection
 Act sets up rules to prevent this happening.

Information taken directly from http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/1dataandcomputermisuserev2.shtml
Copyright Law

 This provides protection to the owners of the copyright
 and covers the copying of written, musical, or film works
 using computers. FAST is the industry body which is against
 software theft.

 There have been cases where laws such as Copyright have
 been used to crack down on file sharing websites or
 individuals who store and illegally distribute copyrighted
 material, eg music. There is a massive problem with many
 people around the world obtaining copyrighted material
 illegally.

Information taken directly from http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/1dataandcomputermisuserev2.shtml
Developed by The Stonemasonry Department
          City of Glasgow College
                    2012

Más contenido relacionado

La actualidad más candente

introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crimeAbhinav Tyagi
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Information communication technology
Information communication technologyInformation communication technology
Information communication technologyBeing Aabis
 
Cyber threats
Cyber threatsCyber threats
Cyber threatskelsports
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation AniketPandit18
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data SecurityWilmerHale
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - EnglishData Security
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics sunanditaAnand
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and historygururaj lulkarni
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceTushar Rajput
 

La actualidad más candente (20)

Computer crime
 Computer crime Computer crime
Computer crime
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Information communication technology
Information communication technologyInformation communication technology
Information communication technology
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Communication security
Communication securityCommunication security
Communication security
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and history
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of Cyberspace
 
Online ethics
Online ethicsOnline ethics
Online ethics
 

Destacado

Presentation constructing an information panel
Presentation   constructing an information panelPresentation   constructing an information panel
Presentation constructing an information paneldoogstone
 
Snecked rubble step by step angled
Snecked rubble step by step angledSnecked rubble step by step angled
Snecked rubble step by step angleddoogstone
 
Presentation template making equipment
Presentation   template making equipmentPresentation   template making equipment
Presentation template making equipmentdoogstone
 
Student induction 2013-14
Student induction 2013-14Student induction 2013-14
Student induction 2013-14doogstone
 
Cutting a Return head
Cutting a Return headCutting a Return head
Cutting a Return headdoogstone
 
Checks and splays
Checks and splaysChecks and splays
Checks and splaysdoogstone
 
Presentation types of template
Presentation   types of templatePresentation   types of template
Presentation types of templatedoogstone
 
Template materials
Template materialsTemplate materials
Template materialsdoogstone
 
Hand arm vibration
Hand arm vibrationHand arm vibration
Hand arm vibrationdoogstone
 
Concrete Block Walling
Concrete Block WallingConcrete Block Walling
Concrete Block Wallingdoogstone
 
Sustainability
SustainabilitySustainability
SustainabilityDjCurrie
 
State of the omnichannel nation
State of the omnichannel nationState of the omnichannel nation
State of the omnichannel nationRasmus Houlind
 
Online assignment
Online assignmentOnline assignment
Online assignmentSano Anil
 
Lesson template of sabareesh.p.s
Lesson template of sabareesh.p.sLesson template of sabareesh.p.s
Lesson template of sabareesh.p.sSano Anil
 
Новости недвижимости Майами за август 2016
Новости недвижимости Майами за август 2016 Новости недвижимости Майами за август 2016
Новости недвижимости Майами за август 2016 The Reznik Group
 
Close to extinction/ Endangered Species in the Wild
Close to extinction/ Endangered Species in the WildClose to extinction/ Endangered Species in the Wild
Close to extinction/ Endangered Species in the WildZNHS West, DepEd
 
Hand doctor – kids game
Hand doctor – kids gameHand doctor – kids game
Hand doctor – kids gameArth I-Soft
 

Destacado (20)

Presentation constructing an information panel
Presentation   constructing an information panelPresentation   constructing an information panel
Presentation constructing an information panel
 
Snecked rubble step by step angled
Snecked rubble step by step angledSnecked rubble step by step angled
Snecked rubble step by step angled
 
Presentation template making equipment
Presentation   template making equipmentPresentation   template making equipment
Presentation template making equipment
 
Student induction 2013-14
Student induction 2013-14Student induction 2013-14
Student induction 2013-14
 
Chisels
ChiselsChisels
Chisels
 
Cutting a Return head
Cutting a Return headCutting a Return head
Cutting a Return head
 
Silica dust
Silica dustSilica dust
Silica dust
 
Checks and splays
Checks and splaysChecks and splays
Checks and splays
 
Presentation types of template
Presentation   types of templatePresentation   types of template
Presentation types of template
 
Template materials
Template materialsTemplate materials
Template materials
 
Hand arm vibration
Hand arm vibrationHand arm vibration
Hand arm vibration
 
Concrete Block Walling
Concrete Block WallingConcrete Block Walling
Concrete Block Walling
 
Sustainability
SustainabilitySustainability
Sustainability
 
State of the omnichannel nation
State of the omnichannel nationState of the omnichannel nation
State of the omnichannel nation
 
Online assignment
Online assignmentOnline assignment
Online assignment
 
Lesson template of sabareesh.p.s
Lesson template of sabareesh.p.sLesson template of sabareesh.p.s
Lesson template of sabareesh.p.s
 
Новости недвижимости Майами за август 2016
Новости недвижимости Майами за август 2016 Новости недвижимости Майами за август 2016
Новости недвижимости Майами за август 2016
 
Close to extinction/ Endangered Species in the Wild
Close to extinction/ Endangered Species in the WildClose to extinction/ Endangered Species in the Wild
Close to extinction/ Endangered Species in the Wild
 
Meditation 4
Meditation 4Meditation 4
Meditation 4
 
Hand doctor – kids game
Hand doctor – kids gameHand doctor – kids game
Hand doctor – kids game
 

Similar a It legislation

Business And The Law
Business And The LawBusiness And The Law
Business And The LawRobbieA
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal lawZaheer Irshad
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industryjamiehaworth1
 
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law sohaildanish
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe onlineHadilAlHaj
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptxSSPTRGCELL
 
Cybercrime
CybercrimeCybercrime
Cybercrimepromit
 
Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemssaltashict
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human rightAgustina
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT actDivesh Mewara
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)Asish Verma
 

Similar a It legislation (20)

Business And The Law
Business And The LawBusiness And The Law
Business And The Law
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industry
 
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Cie 2 cyber law
Cie 2  cyber lawCie 2  cyber law
Cie 2 cyber law
 
Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systems
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human right
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)
 
SHAILENDRA.ppt
SHAILENDRA.pptSHAILENDRA.ppt
SHAILENDRA.ppt
 
ppt cyber law 1.pptx
ppt cyber law 1.pptxppt cyber law 1.pptx
ppt cyber law 1.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
IT-Presentation.pptx
IT-Presentation.pptxIT-Presentation.pptx
IT-Presentation.pptx
 

Más de doogstone

Risk assessment
Risk assessmentRisk assessment
Risk assessmentdoogstone
 
Health and safety signage
Health and safety signageHealth and safety signage
Health and safety signagedoogstone
 
Construction electrical safety
Construction electrical safetyConstruction electrical safety
Construction electrical safetydoogstone
 
Presentation constructing a pentagon
Presentation   constructing a pentagonPresentation   constructing a pentagon
Presentation constructing a pentagondoogstone
 
Presentation constructing a heptagon
Presentation   constructing a heptagonPresentation   constructing a heptagon
Presentation constructing a heptagondoogstone
 
Introduction to masonry walling
Introduction to masonry wallingIntroduction to masonry walling
Introduction to masonry wallingdoogstone
 
Surfacefinishes12
Surfacefinishes12Surfacefinishes12
Surfacefinishes12doogstone
 
Snecked rubble step by step
Snecked rubble step by stepSnecked rubble step by step
Snecked rubble step by stepdoogstone
 
Half brick walling calculations
Half brick walling calculationsHalf brick walling calculations
Half brick walling calculationsdoogstone
 
Cutting a cavetto mould
Cutting a cavetto mouldCutting a cavetto mould
Cutting a cavetto moulddoogstone
 
Cutting an ovolo mould
Cutting an ovolo mouldCutting an ovolo mould
Cutting an ovolo moulddoogstone
 
Rock formation
Rock formationRock formation
Rock formationdoogstone
 
Manual handling
Manual handlingManual handling
Manual handlingdoogstone
 
IT guide to data storage and protection
IT guide to data storage and protectionIT guide to data storage and protection
IT guide to data storage and protectiondoogstone
 
IT hardware and software
IT hardware and softwareIT hardware and software
IT hardware and softwaredoogstone
 
Perimeters basic
Perimeters basicPerimeters basic
Perimeters basicdoogstone
 

Más de doogstone (20)

Risk assessment
Risk assessmentRisk assessment
Risk assessment
 
Health and safety signage
Health and safety signageHealth and safety signage
Health and safety signage
 
Construction electrical safety
Construction electrical safetyConstruction electrical safety
Construction electrical safety
 
Riddor
RiddorRiddor
Riddor
 
Presentation constructing a pentagon
Presentation   constructing a pentagonPresentation   constructing a pentagon
Presentation constructing a pentagon
 
Presentation constructing a heptagon
Presentation   constructing a heptagonPresentation   constructing a heptagon
Presentation constructing a heptagon
 
Introduction to masonry walling
Introduction to masonry wallingIntroduction to masonry walling
Introduction to masonry walling
 
Surfacefinishes12
Surfacefinishes12Surfacefinishes12
Surfacefinishes12
 
Snecked rubble step by step
Snecked rubble step by stepSnecked rubble step by step
Snecked rubble step by step
 
Half brick walling calculations
Half brick walling calculationsHalf brick walling calculations
Half brick walling calculations
 
Cutting a cavetto mould
Cutting a cavetto mouldCutting a cavetto mould
Cutting a cavetto mould
 
Cutting an ovolo mould
Cutting an ovolo mouldCutting an ovolo mould
Cutting an ovolo mould
 
Rock formation
Rock formationRock formation
Rock formation
 
Manual handling
Manual handlingManual handling
Manual handling
 
Chisels
ChiselsChisels
Chisels
 
IT guide to data storage and protection
IT guide to data storage and protectionIT guide to data storage and protection
IT guide to data storage and protection
 
IT hardware and software
IT hardware and softwareIT hardware and software
IT hardware and software
 
Percentages
PercentagesPercentages
Percentages
 
Ratios
RatiosRatios
Ratios
 
Perimeters basic
Perimeters basicPerimeters basic
Perimeters basic
 

Último

SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 

Último (20)

SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 

It legislation

  • 1. Information Communication Technology An Introduction to Legislation in the UK Stonemasonry Department 2012
  • 2. Legislation Now that you understand what ICT can be used for, and how you interact with it through hardware devices and software applications it is important to know about the legislation which covers the use of ICT in the United Kingdom. In this presentation you will learn about: The Computer Misuse Act 1990 The Data Protection Act Copyright Law
  • 3. Computer Misuse Act 1990 This act makes it illegal to do any of the following: Access computer material without permission, eg looking at someone else's files. Access computer material without permission with intent to commit further criminal offences, eg hacking into the bank's computer and wanting to increase the amount in your account. Alter computer data without permission, eg writing a virus to destroy someone else's data, or actually changing the money in an account. Information taken directly from http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/1dataandcomputermisuserev2.shtml
  • 4. Is Hacking Illegal? The short answer to this question is NO! Hacking is not illegal provided you are doing it for legitimate purposes. Computer hackers are split into three distinct groups; black hat, grey hat and white hat. ILLEGAL ILLEGAL LEGAL (but not criminal)
  • 5. Is Hacking Illegal? Black hat hackers target the websites/data of organisations or people without permission and with the intent of causing harm, stealing files or profiting as a direct result of gaining access to a system. Grey hat hackers also gain access to systems without the permission of the owner but once in, they either inform the owner of how to improve security or fix any flaws themselves. White hat hackers gain access to systems with the permission of the owner. They carry out penetration testing “pen tests” to make sure that systems are secure.
  • 6. The Data Protection Act (1998) The DPA 1998 was passed by Parliament to control the way information is handled and to give legal rights to people who have information stored about them. Some data and information stored on a computer is personal and needs to be kept confidential. People want to keep their pay, bank details, and medical records private and away from the view of just anybody. If someone who is not entitled to see these details can obtain access without permission it is unauthorised access. The Data Protection Act sets up rules to prevent this happening. Information taken directly from http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/1dataandcomputermisuserev2.shtml
  • 7. Copyright Law This provides protection to the owners of the copyright and covers the copying of written, musical, or film works using computers. FAST is the industry body which is against software theft. There have been cases where laws such as Copyright have been used to crack down on file sharing websites or individuals who store and illegally distribute copyrighted material, eg music. There is a massive problem with many people around the world obtaining copyrighted material illegally. Information taken directly from http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/1dataandcomputermisuserev2.shtml
  • 8. Developed by The Stonemasonry Department City of Glasgow College 2012