2. Data protection act 1998
The Data Protection Act controls how your personal information is used by
organisations, businesses or the government.
There is stronger legal protection for more sensitive information, such as:
ethnic background
political opinions
religious beliefs
health
sexual health
criminal records
3. Everyone responsible for using data has to follow rules called ‘data protection
principles’. They must make sure the information is:
used fairly
used for limited, specifically stated purposes
kept for no longer than is absolutely necessary
handled according to people’s data protection rights
kept safe and secure
4. Computer misuse act
Unauthorised access to a computer
Unauthorised access to the internet
Unauthorised access with intent to commit or facilitate a crime
Email and chat room abuses
Hacking
5. Copyright act
Copying and distributing copyrighted software, music and film
When you buy software, for example, copyright law forbids you from:
giving a copy to a friend
making a copy and then selling it
using the software on a network (unless the licence allows it)
renting the software without the permission of the copyright holder
6. Healthy and safety act
To secure the health, safety and welfare of persons at work.
To protect persons other than persons at work against risks to health or safety
arising out of or in connection with the activities of persons at work.
To control the keeping and use of explosive or highly flammable or otherwise
dangerous substances, and generally preventing the unlawful acquisition,
possession and use of such substances.
7. The risks of using the internet
Viruses
computer viruses infect your programs and files, change the way your computer
operates or stop it from working altogether.
The precautions you can take
Use up to date anti virus
Keep your operating system up to date
Don’t open an email attachment unless you are expecting it
8. Risks of Hackers
Get your usernames and passwords
Steal your money and open credit card and bank accounts in your name
Request new account Pins or additional credit cards
Make purchases
Use and abuse your Social Security number
Sell your information to other parties who will use it for illicit or illegal purposes
The precautions you can take
Be aware of public wifi
Look after your passwords
9. Fraud and Theft
Fraud has the intention of hiding the criminal act of stealing, while theft does not.
Thieves know they can’t hide the act so they don’t make much effort to hide it,
while the person who is doing fraud makes an extra effort to hide the act.
The precautions you can take
Check your bank statements
Use a strong password
Don’t give away your pin code
Try not to keep financial information on your laptop
10. Risk of injury if you spend long hours on
the computer
Eye strain.
Obesity
Muscle and joint problems
Back and neck pain
Headaches