SlideShare una empresa de Scribd logo
1 de 9
Computer Legislation
Computer Legislation ,[object Object],[object Object]
Data Protection Act 1984,1988 &1998 ,[object Object],[object Object],[object Object],[object Object]
8 Principles of the Data Protection Act ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Exemption to the 8 Principles ,[object Object],[object Object],[object Object],[object Object]
As Data Subjects ,[object Object],[object Object],[object Object]
Copyright, Design and Patent Act 1988 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Computer Misuse Act 1990 ,[object Object],[object Object],[object Object]
Summary of Computer Legislation. ,[object Object],[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Merit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data ProtectionMerit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data Protection
meritnorthwest
 
3e - Data Protection
3e - Data Protection3e - Data Protection
3e - Data Protection
MISY
 

La actualidad más candente (20)

Merit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data ProtectionMerit Event - Understanding and Managing Data Protection
Merit Event - Understanding and Managing Data Protection
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information Security
 
Data Privacy Day Celebrated in Nepal by shreedeep rayamajhi
Data Privacy Day Celebrated in Nepal  by shreedeep rayamajhiData Privacy Day Celebrated in Nepal  by shreedeep rayamajhi
Data Privacy Day Celebrated in Nepal by shreedeep rayamajhi
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
 
2014 dpa training february nn
2014 dpa training february nn2014 dpa training february nn
2014 dpa training february nn
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
3e - Data Protection
3e - Data Protection3e - Data Protection
3e - Data Protection
 
What does GDPR laws mean for Australian businesses
What does GDPR laws mean for Australian businessesWhat does GDPR laws mean for Australian businesses
What does GDPR laws mean for Australian businesses
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
 
A quick look at gdpr
A quick look at gdprA quick look at gdpr
A quick look at gdpr
 
GDPR Privacy Policy
GDPR Privacy PolicyGDPR Privacy Policy
GDPR Privacy Policy
 
Data protection Act - Key Terms
Data protection Act -  Key TermsData protection Act -  Key Terms
Data protection Act - Key Terms
 
Regulatory Compliance under the Information Technology Act, 2000
Regulatory Compliance under the Information Technology Act, 2000Regulatory Compliance under the Information Technology Act, 2000
Regulatory Compliance under the Information Technology Act, 2000
 
Are You Prepared for the GDPR?
Are You Prepared for the GDPR?Are You Prepared for the GDPR?
Are You Prepared for the GDPR?
 
Data Protection: Transitioning to the GDPR
Data Protection: Transitioning to the GDPRData Protection: Transitioning to the GDPR
Data Protection: Transitioning to the GDPR
 
Privacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
Privacy Practice Fundamentals: Understanding Compliance Regimes and RequirementsPrivacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
Privacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
 
Data Protection and IDEA
Data Protection and IDEAData Protection and IDEA
Data Protection and IDEA
 
CBC GDPR The Physics
CBC GDPR The PhysicsCBC GDPR The Physics
CBC GDPR The Physics
 
Complete Guide to General Data Protection Regulation (GDPR)
Complete Guide to General Data Protection Regulation (GDPR)Complete Guide to General Data Protection Regulation (GDPR)
Complete Guide to General Data Protection Regulation (GDPR)
 
General data protection
General data protectionGeneral data protection
General data protection
 

Destacado (6)

'The UK Freedom of Information Act – A Practical Guide for Academic Research...
'The UK Freedom of Information Act – A Practical Guide for Academic Research...'The UK Freedom of Information Act – A Practical Guide for Academic Research...
'The UK Freedom of Information Act – A Practical Guide for Academic Research...
 
5 Graphics Units
5 Graphics Units5 Graphics Units
5 Graphics Units
 
Regulations and Legislation for E-Commerce in the UK
Regulations and Legislation for E-Commerce in the UKRegulations and Legislation for E-Commerce in the UK
Regulations and Legislation for E-Commerce in the UK
 
Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Data Protection (Download for slideshow)
Data Protection (Download for slideshow)
 
Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 

Similar a Computer Legislation2 T2

Business And The Law
Business And The LawBusiness And The Law
Business And The Law
RobbieA
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerce
Damo Ward
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11
mrmwood
 
Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systems
saltashict
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industry
jamiehaworth1
 
10. law invest & ethics
10. law invest & ethics10. law invest & ethics
10. law invest & ethics
7wounders
 
Ch 17 data protections act
Ch 17 data protections actCh 17 data protections act
Ch 17 data protections act
Khan Yousafzai
 
Chapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptxChapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptx
sheryl90
 

Similar a Computer Legislation2 T2 (20)

Business And The Law
Business And The LawBusiness And The Law
Business And The Law
 
Data theft rules and regulations things you should know (pt.1)
Data theft rules and regulations  things you should know (pt.1)Data theft rules and regulations  things you should know (pt.1)
Data theft rules and regulations things you should know (pt.1)
 
BTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal ConstraintsBTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal Constraints
 
Issues related to ict
Issues related to ictIssues related to ict
Issues related to ict
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerce
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11
 
Data protection
Data protectionData protection
Data protection
 
Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systems
 
Lo2= p3, d1
Lo2= p3, d1Lo2= p3, d1
Lo2= p3, d1
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industry
 
How to Protect Your Data
How to Protect Your DataHow to Protect Your Data
How to Protect Your Data
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
Data Security Law and Management.pdf
Data Security Law and Management.pdfData Security Law and Management.pdf
Data Security Law and Management.pdf
 
10. law invest & ethics
10. law invest & ethics10. law invest & ethics
10. law invest & ethics
 
GDPR: Are you Ready?
GDPR: Are you Ready?GDPR: Are you Ready?
GDPR: Are you Ready?
 
Ch 17 data protections act
Ch 17 data protections actCh 17 data protections act
Ch 17 data protections act
 
It legislation
It legislationIt legislation
It legislation
 
Chapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptxChapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptx
 

Más de lees_ush

4corporate Image
4corporate Image4corporate Image
4corporate Image
lees_ush
 
3logo Survey Charts
3logo Survey Charts3logo Survey Charts
3logo Survey Charts
lees_ush
 
2logo Survey
2logo Survey2logo Survey
2logo Survey
lees_ush
 
Health And Safety T2
Health And Safety  T2Health And Safety  T2
Health And Safety T2
lees_ush
 
External Market Place T1
External Market Place  T1External Market Place  T1
External Market Place T1
lees_ush
 
Different Types Of Business Part 1 T1
Different Types Of Business Part 1   T1Different Types Of Business Part 1   T1
Different Types Of Business Part 1 T1
lees_ush
 
Different Types Of Business (Ltd And Plc) Part 2 T1
Different Types Of Business (Ltd And Plc) Part 2   T1Different Types Of Business (Ltd And Plc) Part 2   T1
Different Types Of Business (Ltd And Plc) Part 2 T1
lees_ush
 
Consumer Legislation1 T2
Consumer Legislation1  T2Consumer Legislation1  T2
Consumer Legislation1 T2
lees_ush
 

Más de lees_ush (9)

4corporate Image
4corporate Image4corporate Image
4corporate Image
 
3logo Survey Charts
3logo Survey Charts3logo Survey Charts
3logo Survey Charts
 
2logo Survey
2logo Survey2logo Survey
2logo Survey
 
1logos
1logos1logos
1logos
 
Health And Safety T2
Health And Safety  T2Health And Safety  T2
Health And Safety T2
 
External Market Place T1
External Market Place  T1External Market Place  T1
External Market Place T1
 
Different Types Of Business Part 1 T1
Different Types Of Business Part 1   T1Different Types Of Business Part 1   T1
Different Types Of Business Part 1 T1
 
Different Types Of Business (Ltd And Plc) Part 2 T1
Different Types Of Business (Ltd And Plc) Part 2   T1Different Types Of Business (Ltd And Plc) Part 2   T1
Different Types Of Business (Ltd And Plc) Part 2 T1
 
Consumer Legislation1 T2
Consumer Legislation1  T2Consumer Legislation1  T2
Consumer Legislation1 T2
 

Computer Legislation2 T2