SlideShare una empresa de Scribd logo
1 de 39
Business and the Law The Data Protection Act (1998) The Computer Misuse Act (1990) The Copyright, Designs and Patents Act (1998)
The Data Protection Act (1998) ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Data Protection Act (1998) ,[object Object],[object Object]
The Data Protection Act (1998) ,[object Object],[object Object],[object Object]
The Data Protection Act (1998) ,[object Object],[object Object],[object Object]
The Data Protection Act (1998) ,[object Object],[object Object],[object Object]
The Data Protection Act (1998) ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Data Protection Act (1998) ,[object Object],[object Object],[object Object]
The Data Protection Act  (1998) ,[object Object],[object Object],[object Object]
POINTS OF LAW  ,[object Object],[object Object],[object Object],[object Object]
The Data Protection Act (1998) ,[object Object],[object Object],[object Object],[object Object]
The Data Protection Act (1998) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Data Protection Act (1998) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Computer Misuse Act (1990) ,[object Object]
Computer Misuse Act (1990) ,[object Object],[object Object],[object Object]
Computer Misuse Act (1990) ,[object Object],[object Object]
Computer Misuse Act (1990) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Computer Misuse Act (1990) ,[object Object],[object Object],[object Object],[object Object]
Computer Misuse Act (1990) ,[object Object],[object Object],[object Object]
Computer Misuse Act (1990) ,[object Object],[object Object],[object Object],[object Object]
Computer Misuse Act (1990) ,[object Object],[object Object],[object Object]
Computer Misuse Act (1990) ,[object Object],[object Object]
Computer Misuse Act (1990) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Computer Misuse Act (1990) ,[object Object]
[object Object],[object Object],[object Object],[object Object]
Copyright, Designs and Patent Act ( 1988) ,[object Object]
Copyright, Designs and Patent Act ( 1988) ,[object Object]
Copyright, Designs and Patent Act ( 1988) ,[object Object],[object Object]
Copyright, Designs and Patent Act ( 1988) ,[object Object],[object Object]
Copyright, Designs and Patent Act ( 1988) ,[object Object],[object Object]
Copyright, Designs and Patent Act ( 1988) ,[object Object]
Copyright, Designs and Patent Act ( 1988) ,[object Object],[object Object]
Freedom of Information Act (2002 Scotland)   ,[object Object],[object Object],[object Object],[object Object]
Which bodies are covered by the legislation ? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What information is covered by the FOI Act? ,[object Object],[object Object],[object Object]
How  do  I apply for information under the Act? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Other points ,[object Object],[object Object],[object Object],[object Object]
PROBLEMS FOR ORGANISATIONS ,[object Object],[object Object],[object Object],[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)
Lance Michalson
 
10. law invest & ethics
10. law invest & ethics10. law invest & ethics
10. law invest & ethics
7wounders
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerce
Damo Ward
 
Computer And The Law
Computer And The LawComputer And The Law
Computer And The Law
SaimaRafiq
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...
David Cunningham
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11
mrmwood
 

La actualidad más candente (20)

Computer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lankaComputer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lanka
 
Computer Misuse Act
Computer Misuse ActComputer Misuse Act
Computer Misuse Act
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
10 Things You Need To Know About Privacy
10 Things You Need To Know About Privacy10 Things You Need To Know About Privacy
10 Things You Need To Know About Privacy
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
EFFECTIVENESS OF THE EXISTING LEGAL FRAMEWORK GOVERNING CYBER-CRIMES IN SRI L...
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)
 
Cyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information AgeCyber Crimes: The Transformation of Crime in the Information Age
Cyber Crimes: The Transformation of Crime in the Information Age
 
10. law invest & ethics
10. law invest & ethics10. law invest & ethics
10. law invest & ethics
 
International convention on cyber crime
International convention on cyber crimeInternational convention on cyber crime
International convention on cyber crime
 
Cybercrime Prevention Act
Cybercrime Prevention ActCybercrime Prevention Act
Cybercrime Prevention Act
 
Existing Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber CrimesExisting Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber Crimes
 
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS  TO ENHANCE THE EFFECTIV...
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerce
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
 
Computer And The Law
Computer And The LawComputer And The Law
Computer And The Law
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 

Similar a Business And The Law

Computer Legislation2 T2
Computer Legislation2  T2Computer Legislation2  T2
Computer Legislation2 T2
lees_ush
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industry
jamiehaworth1
 
Chapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptxChapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptx
sheryl90
 
Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systems
saltashict
 
Forensic Science Informatics Computers & The Law Powerpoint
Forensic Science Informatics   Computers & The Law   PowerpointForensic Science Informatics   Computers & The Law   Powerpoint
Forensic Science Informatics Computers & The Law Powerpoint
Steve Bishop
 
Chapter2
Chapter2Chapter2
Chapter2
Pibi Lu
 

Similar a Business And The Law (20)

Computer Legislation2 T2
Computer Legislation2  T2Computer Legislation2  T2
Computer Legislation2 T2
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industry
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
Chapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptxChapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptx
 
Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systems
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
BTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal ConstraintsBTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal Constraints
 
Forensic Science Informatics Computers & The Law Powerpoint
Forensic Science Informatics   Computers & The Law   PowerpointForensic Science Informatics   Computers & The Law   Powerpoint
Forensic Science Informatics Computers & The Law Powerpoint
 
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...Yar Chaikovsky ABA Section of Intellectual Property Law  Division VII — Infor...
Yar Chaikovsky ABA Section of Intellectual Property Law Division VII — Infor...
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
Chapter2
Chapter2Chapter2
Chapter2
 
The CFAA and Aarons Law
The CFAA and Aarons LawThe CFAA and Aarons Law
The CFAA and Aarons Law
 
Intellectual Property Law In Internet
Intellectual Property Law In InternetIntellectual Property Law In Internet
Intellectual Property Law In Internet
 
cle ppt.pptx
cle ppt.pptxcle ppt.pptx
cle ppt.pptx
 
Cie 2 cyber law
Cie 2  cyber lawCie 2  cyber law
Cie 2 cyber law
 
It security & crimes
It security & crimesIt security & crimes
It security & crimes
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Chap 4 (1)
Chap 4 (1)Chap 4 (1)
Chap 4 (1)
 

Más de RobbieA

Communikanine Presentation
Communikanine PresentationCommunikanine Presentation
Communikanine Presentation
RobbieA
 
Communikanine Presentation
Communikanine PresentationCommunikanine Presentation
Communikanine Presentation
RobbieA
 
Communikanine Presentation
Communikanine PresentationCommunikanine Presentation
Communikanine Presentation
RobbieA
 
St Ninians School Challenge 2009 Brief
St Ninians School Challenge 2009 BriefSt Ninians School Challenge 2009 Brief
St Ninians School Challenge 2009 Brief
RobbieA
 
Financial Accounts
Financial AccountsFinancial Accounts
Financial Accounts
RobbieA
 
Introduction to Financial Management
Introduction to Financial ManagementIntroduction to Financial Management
Introduction to Financial Management
RobbieA
 
HRM Legislation Slides
HRM Legislation SlidesHRM Legislation Slides
HRM Legislation Slides
RobbieA
 
HRM - Employee Relations Slides
HRM - Employee Relations SlidesHRM - Employee Relations Slides
HRM - Employee Relations Slides
RobbieA
 
Human Resource Management
Human Resource ManagementHuman Resource Management
Human Resource Management
RobbieA
 
Intermediate 2 Admin Command Words
Intermediate 2 Admin Command WordsIntermediate 2 Admin Command Words
Intermediate 2 Admin Command Words
RobbieA
 
S3 Business Management Glossary
S3 Business Management GlossaryS3 Business Management Glossary
S3 Business Management Glossary
RobbieA
 
Distribution And Delivery
Distribution And DeliveryDistribution And Delivery
Distribution And Delivery
RobbieA
 
Payment Systems
Payment SystemsPayment Systems
Payment Systems
RobbieA
 
Presentation Practice
Presentation PracticePresentation Practice
Presentation Practice
RobbieA
 
Quality Slides
Quality SlidesQuality Slides
Quality Slides
RobbieA
 
Merry Christmas from S2 Administration
Merry Christmas from S2 AdministrationMerry Christmas from S2 Administration
Merry Christmas from S2 Administration
RobbieA
 
Merry Christmas from S2 Admin
Merry Christmas from S2 AdminMerry Christmas from S2 Admin
Merry Christmas from S2 Admin
RobbieA
 
Quality Slides
Quality SlidesQuality Slides
Quality Slides
RobbieA
 
Methods of Production
Methods of ProductionMethods of Production
Methods of Production
RobbieA
 

Más de RobbieA (20)

Communikanine Presentation
Communikanine PresentationCommunikanine Presentation
Communikanine Presentation
 
Communikanine Presentation
Communikanine PresentationCommunikanine Presentation
Communikanine Presentation
 
Communikanine Presentation
Communikanine PresentationCommunikanine Presentation
Communikanine Presentation
 
Communikanine Presentation
Communikanine PresentationCommunikanine Presentation
Communikanine Presentation
 
St Ninians School Challenge 2009 Brief
St Ninians School Challenge 2009 BriefSt Ninians School Challenge 2009 Brief
St Ninians School Challenge 2009 Brief
 
Financial Accounts
Financial AccountsFinancial Accounts
Financial Accounts
 
Introduction to Financial Management
Introduction to Financial ManagementIntroduction to Financial Management
Introduction to Financial Management
 
HRM Legislation Slides
HRM Legislation SlidesHRM Legislation Slides
HRM Legislation Slides
 
HRM - Employee Relations Slides
HRM - Employee Relations SlidesHRM - Employee Relations Slides
HRM - Employee Relations Slides
 
Human Resource Management
Human Resource ManagementHuman Resource Management
Human Resource Management
 
Intermediate 2 Admin Command Words
Intermediate 2 Admin Command WordsIntermediate 2 Admin Command Words
Intermediate 2 Admin Command Words
 
S3 Business Management Glossary
S3 Business Management GlossaryS3 Business Management Glossary
S3 Business Management Glossary
 
Distribution And Delivery
Distribution And DeliveryDistribution And Delivery
Distribution And Delivery
 
Payment Systems
Payment SystemsPayment Systems
Payment Systems
 
Presentation Practice
Presentation PracticePresentation Practice
Presentation Practice
 
Quality Slides
Quality SlidesQuality Slides
Quality Slides
 
Merry Christmas from S2 Administration
Merry Christmas from S2 AdministrationMerry Christmas from S2 Administration
Merry Christmas from S2 Administration
 
Merry Christmas from S2 Admin
Merry Christmas from S2 AdminMerry Christmas from S2 Admin
Merry Christmas from S2 Admin
 
Quality Slides
Quality SlidesQuality Slides
Quality Slides
 
Methods of Production
Methods of ProductionMethods of Production
Methods of Production
 

Último

Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in PakistanChallenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
vineshkumarsajnani12
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
Nauman Safdar
 

Último (20)

Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in PakistanChallenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
 
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTSJAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
 
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxQSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book nowGUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 

Business And The Law

  • 1. Business and the Law The Data Protection Act (1998) The Computer Misuse Act (1990) The Copyright, Designs and Patents Act (1998)
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.