SlideShare una empresa de Scribd logo
1 de 22
Legal Constraints
Customer Data Policy
   Formal document identifying the constraints
    or limitations in using customer information
     statements   of what should or should not be done
     examples   to make clear any statements you
      make
     References  to all the material, including any Acts
      of Parliament
Data Protection Act
of 12th July 1984 / 1998
Anyone processing personal data must comply with the
   eight enforceable principles of good practice.
1. Fairly and lawfully processed;
2. Processed for limited purposes;
3. Adequate, relevant and not excessive;
4. Accurate;
5. Not kept longer than necessary;
6. Processed in accordance with the data subject's rights;
7. Secure (no unauthorised access, alteration or disclosure)
8. Not transferred to other countries without adequate
    protection.
The Information Commissioner
   The Act established the office of Information
    Commissioner, whose duties include:
     administering  a public register of Data Users with
      broad details of the data held
     investigating complaints and initiating prosecutions for
      breaches of the Act.
     publishing several documents that offer guidelines to
      data users and computer bureaux.
Registration
   All Data Users have to register, giving:
     their   name and address (or that of their company)
    a   description of the data held and its purpose
    a description of the sources from which the data is
      obtained
    a  description of the persons to whom it is intended to
      disclose data
Exemptions from the Act
   The Act does not apply to payroll, pensions and accounts data, nor to
    names and addresses held for distribution purposes.
   Registration may not be necessary when the data are for
    personal, family, household or recreational use.
   Subjects do not have a right to access data if the sole aim of
    collecting it is for statistical or research purposes, or where it is simply
    for backup.
   Data can be disclosed to the data subject’s agent (e.g. lawyer or
    accountant), to persons working for the data user, and in response to
    urgent need to prevent injury or damage to health.
    Additionally, there are exemptions for special categories, including
    data held:
         - in connection with national security;
         - for prevention of crime;
         - for the collection of tax or duty.
Software Copyright Laws
   Computer software is now covered by the
    Copyright Designs and Patents Act of
    1988, which covers a wide range of
    intellectual property such as music, literature
    and software.
Copyright, Designs & Patents Act
1988
   Provisions of the Act make it illegal to:
     copy   software
     run pirated software
     transmit software over a telecommunications
      line, thereby creating a copy
The Computer Misuse Act of
1990
   In the early 1980s in the UK, hacking
    was not illegal. Some universities
    stipulated that hacking, especially
    where damage was done to data
    files, was a disciplinary offence, but
    there was no legislative framework
    within which a criminal prosecution
    could be brought.
Computer Misuse Act of 1990
   The Computer Misuse Act of 1990 defined three
    specific criminal offences to deal with the
    problems of hacking, viruses and other
    nuisances.
     unauthorised  access to computer programs or data
     unauthorised access with a further criminal intent
     unauthorised modification of computer material
           (i.e. programs or data)
Computer Crime & The Law
 Cracking (or Hacking)
 Viruses
 Trojans
 Logic Bombs
How A Virus Works
1.   ORIGINATION - A programmer writes a program - the
     virus - to cause mischief or destruction. The virus is
     capable of reproducing itself
2.   TRANSMISSION - Often, the virus is attached to a
     normal program. It then copies itself to other software
     on the hard disk
3.   REPRODUCTION - When another drive is inserted into
     the computer’s disk drive, the virus copies itself on to
     the drive
4.   INFECTION - Depending on what the original
     programmer wrote in the virus program, a virus may
     display messages, use up all the computer’s
     memory, destroy data files or cause serious system
     errors
Health Hazards
   Stress

   RSI

   Eyestrain

   ELF radiation

   Backache
Display Screen Regulations 1992
    Employers are required to
      Perform  an analysis of workstations in order to
       evaluate the safety and health conditions to which
       they give rise
      Provide training to employees in the use of
       workstation components
      Ensure     employees take regular breaks or changes in
       activity
      Provide  regular eye tests for workstation users and
       pay for glasses
Computers, Health And The Law

   Employees have a responsibility to
     Use workstations and equipment correctly, in
      accordance with training provided by employers
     Bring problems to the attention of their employer
      immediately and co-operate in the correction of these
      problems
Computers, Health and the law
   Manufacturers are required to ensure that
    their products comply with the Directive.
    For example:
     Screens must tilt and swivel
     Keyboards must be separate and moveable
     Notebook PCs are not suitable for entering large
           amounts of data
The Ergonomic Environment
    Ergonomics refers to the design and functionality of the
    environment, and encompasses the entire range of
    environmental factors. Employers must give
    consideration to:
   Lighting: office well lit, with blinds
   Furniture: chairs of adjustable height, with tilting
    backrest, swiveling on five-point base
   Work space: combination of
    chair, desk, computer, accessories, lighting, heating and
    ventilation all contribute to overall well-being
   Noise: e.g. noisy printers relocated
   Hardware: screen must tilt and swivel and be flicker-free, the
    keyboard separately attached
   Software: should facilitate task, be easy to use and
    adaptable to user’s experience
DRM
 Music & Films
 Technology to restrict where, how
  often, on what you can use it
Proprietary Software
 Sold under licence – not ownership
 Unable to modify
 Restricted rights to sell-on
Open Source Movement
 Have access to the source code – can
  therefore modify it
 Redistribute the code or executable
 Usually free to obtain
The Rights of Data Subjects
    Apart from the right to complain to the Information
    Commissioner, data subjects also have a range of
    rights which they may exercise in the civil courts.
    These are:
   Right to compensation for unauthorised disclosure of
    data (arising from principle no. 3);
   Right to compensation for inaccurate data (arising out
    of principle no. 5);
   Right of access to data and to apply for rectification or
    erasure where data are inaccurate (arising out of
    principle no. 7);
   Right to compensation for unauthorised access, loss or
    destruction of data (arising out of principle no. 8).
Relevant Legislation
Data Protection
   Data Protection Act 1998
   Freedom of Information Act 2000 (FOIA)


Usage of IT Systems
   Computer Misuse Act 1990
   Terrorism Act 2000
   Privacy and Electronic Communications Regulations
    2003

Más contenido relacionado

La actualidad más candente

Policy and procedure of hospitals
Policy and procedure of hospitalsPolicy and procedure of hospitals
Policy and procedure of hospitalsMohammed Alabdali
 
Smart city project's Information Security challenges
Smart city project's Information Security challenges              Smart city project's Information Security challenges
Smart city project's Information Security challenges Behak Kangarloo
 
Information and network security 4 osi architecture
Information and network security  4 osi architectureInformation and network security  4 osi architecture
Information and network security 4 osi architectureVaibhav Khanna
 
Information and network security 3 security challenges
Information and network security 3 security challengesInformation and network security 3 security challenges
Information and network security 3 security challengesVaibhav Khanna
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security conceptsG Prachi
 
Information and network security 1 introduction
Information and network security 1 introductionInformation and network security 1 introduction
Information and network security 1 introductionVaibhav Khanna
 
Information and network security 6 security attacks
Information and network security 6 security attacksInformation and network security 6 security attacks
Information and network security 6 security attacksVaibhav Khanna
 
concept , types and components if information technology
concept , types and components if information technology concept , types and components if information technology
concept , types and components if information technology saifur rahman
 
Information and network security 5 security attacks mechanisms and services
Information and network security 5 security attacks mechanisms and servicesInformation and network security 5 security attacks mechanisms and services
Information and network security 5 security attacks mechanisms and servicesVaibhav Khanna
 
Privacy, Security and Ethics in Educational Technology
Privacy, Security and Ethics in Educational TechnologyPrivacy, Security and Ethics in Educational Technology
Privacy, Security and Ethics in Educational TechnologyRica Young
 
Information and network security 7 security services
Information and network security 7 security servicesInformation and network security 7 security services
Information and network security 7 security servicesVaibhav Khanna
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02anjalee990
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issuesHaseeb Ahmed Awan
 
Information and network security 9 model for network security
Information and network security 9 model for network securityInformation and network security 9 model for network security
Information and network security 9 model for network securityVaibhav Khanna
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challengesCRM
 

La actualidad más candente (20)

Policy and procedure of hospitals
Policy and procedure of hospitalsPolicy and procedure of hospitals
Policy and procedure of hospitals
 
Smart city project's Information Security challenges
Smart city project's Information Security challenges              Smart city project's Information Security challenges
Smart city project's Information Security challenges
 
Information and network security 4 osi architecture
Information and network security  4 osi architectureInformation and network security  4 osi architecture
Information and network security 4 osi architecture
 
Information and network security 3 security challenges
Information and network security 3 security challengesInformation and network security 3 security challenges
Information and network security 3 security challenges
 
Lec1 ict
Lec1 ictLec1 ict
Lec1 ict
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Information and network security 1 introduction
Information and network security 1 introductionInformation and network security 1 introduction
Information and network security 1 introduction
 
Security
SecuritySecurity
Security
 
Information and network security 6 security attacks
Information and network security 6 security attacksInformation and network security 6 security attacks
Information and network security 6 security attacks
 
concept , types and components if information technology
concept , types and components if information technology concept , types and components if information technology
concept , types and components if information technology
 
Information and network security 5 security attacks mechanisms and services
Information and network security 5 security attacks mechanisms and servicesInformation and network security 5 security attacks mechanisms and services
Information and network security 5 security attacks mechanisms and services
 
Threats
ThreatsThreats
Threats
 
Privacy, Security and Ethics in Educational Technology
Privacy, Security and Ethics in Educational TechnologyPrivacy, Security and Ethics in Educational Technology
Privacy, Security and Ethics in Educational Technology
 
Information and network security 7 security services
Information and network security 7 security servicesInformation and network security 7 security services
Information and network security 7 security services
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
 
Pricavy issues
Pricavy issuesPricavy issues
Pricavy issues
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issues
 
Information and network security 9 model for network security
Information and network security 9 model for network securityInformation and network security 9 model for network security
Information and network security 9 model for network security
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challenges
 

Destacado

Legal, Ethical and Contractual constraints in the Media Industry
Legal, Ethical and Contractual constraints in the Media IndustryLegal, Ethical and Contractual constraints in the Media Industry
Legal, Ethical and Contractual constraints in the Media IndustryMattwattsmedia
 
BTEC National in ICT: Unit 3 - Introduction in Access
BTEC National in ICT: Unit 3 - Introduction in AccessBTEC National in ICT: Unit 3 - Introduction in Access
BTEC National in ICT: Unit 3 - Introduction in Accessmrcox
 
BTEC National in ICT: Unit 3 - MIS Features and Functions
BTEC National in ICT: Unit 3 - MIS Features and FunctionsBTEC National in ICT: Unit 3 - MIS Features and Functions
BTEC National in ICT: Unit 3 - MIS Features and Functionsmrcox
 
BTEC National in ICT: Unit 3 - Functional Areas of Xpect
BTEC National in ICT: Unit 3 - Functional Areas of XpectBTEC National in ICT: Unit 3 - Functional Areas of Xpect
BTEC National in ICT: Unit 3 - Functional Areas of Xpectmrcox
 
Unit 3 gathering information and data
Unit 3   gathering information and dataUnit 3   gathering information and data
Unit 3 gathering information and datamrcox
 
Regulatory framework of telecommunication
Regulatory framework of telecommunicationRegulatory framework of telecommunication
Regulatory framework of telecommunicationKarun Mahajan
 
PPT on Consumer Rights by Poojali
PPT on Consumer Rights by PoojaliPPT on Consumer Rights by Poojali
PPT on Consumer Rights by PoojaliPoojaliKrishna999
 
Consumer Contracts Regulations 2013 - a Guidance Note by Brian Miller Solicitor
Consumer Contracts Regulations 2013 - a Guidance Note by Brian Miller SolicitorConsumer Contracts Regulations 2013 - a Guidance Note by Brian Miller Solicitor
Consumer Contracts Regulations 2013 - a Guidance Note by Brian Miller SolicitorBrian Miller, Solicitor
 
Cultural factors effecting ict
Cultural factors effecting ictCultural factors effecting ict
Cultural factors effecting ictAdam Heatherington
 
BTEC National in ICT: Unit 3 - More on DFDs
BTEC National in ICT: Unit 3 - More on DFDsBTEC National in ICT: Unit 3 - More on DFDs
BTEC National in ICT: Unit 3 - More on DFDsmrcox
 
UNIT 2 P6 part 2
UNIT 2 P6 part 2UNIT 2 P6 part 2
UNIT 2 P6 part 2OriginalGSM
 
BTEC National in ICT: Unit 3 - Data vs Information
BTEC National in ICT: Unit 3 - Data vs InformationBTEC National in ICT: Unit 3 - Data vs Information
BTEC National in ICT: Unit 3 - Data vs Informationmrcox
 
Corporate-Espionage
Corporate-EspionageCorporate-Espionage
Corporate-EspionageSam
 
Limitations of marketing research
Limitations of marketing researchLimitations of marketing research
Limitations of marketing researchHari C
 

Destacado (20)

Legal, Ethical and Contractual constraints in the Media Industry
Legal, Ethical and Contractual constraints in the Media IndustryLegal, Ethical and Contractual constraints in the Media Industry
Legal, Ethical and Contractual constraints in the Media Industry
 
BTEC National in ICT: Unit 3 - Introduction in Access
BTEC National in ICT: Unit 3 - Introduction in AccessBTEC National in ICT: Unit 3 - Introduction in Access
BTEC National in ICT: Unit 3 - Introduction in Access
 
BTEC National in ICT: Unit 3 - MIS Features and Functions
BTEC National in ICT: Unit 3 - MIS Features and FunctionsBTEC National in ICT: Unit 3 - MIS Features and Functions
BTEC National in ICT: Unit 3 - MIS Features and Functions
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
Computer Misuse Act
Computer Misuse ActComputer Misuse Act
Computer Misuse Act
 
LO1
LO1LO1
LO1
 
Business growth consultant
Business growth consultantBusiness growth consultant
Business growth consultant
 
BTEC National in ICT: Unit 3 - Functional Areas of Xpect
BTEC National in ICT: Unit 3 - Functional Areas of XpectBTEC National in ICT: Unit 3 - Functional Areas of Xpect
BTEC National in ICT: Unit 3 - Functional Areas of Xpect
 
Unit 3 gathering information and data
Unit 3   gathering information and dataUnit 3   gathering information and data
Unit 3 gathering information and data
 
Regulatory framework of telecommunication
Regulatory framework of telecommunicationRegulatory framework of telecommunication
Regulatory framework of telecommunication
 
PPT on Consumer Rights by Poojali
PPT on Consumer Rights by PoojaliPPT on Consumer Rights by Poojali
PPT on Consumer Rights by Poojali
 
Consumer Contracts Regulations 2013 - a Guidance Note by Brian Miller Solicitor
Consumer Contracts Regulations 2013 - a Guidance Note by Brian Miller SolicitorConsumer Contracts Regulations 2013 - a Guidance Note by Brian Miller Solicitor
Consumer Contracts Regulations 2013 - a Guidance Note by Brian Miller Solicitor
 
Cultural factors effecting ict
Cultural factors effecting ictCultural factors effecting ict
Cultural factors effecting ict
 
BTEC National in ICT: Unit 3 - More on DFDs
BTEC National in ICT: Unit 3 - More on DFDsBTEC National in ICT: Unit 3 - More on DFDs
BTEC National in ICT: Unit 3 - More on DFDs
 
UNIT 2 P6 part 2
UNIT 2 P6 part 2UNIT 2 P6 part 2
UNIT 2 P6 part 2
 
BTEC National in ICT: Unit 3 - Data vs Information
BTEC National in ICT: Unit 3 - Data vs InformationBTEC National in ICT: Unit 3 - Data vs Information
BTEC National in ICT: Unit 3 - Data vs Information
 
Ethical Issues In ICT
Ethical Issues In ICTEthical Issues In ICT
Ethical Issues In ICT
 
Corporate-Espionage
Corporate-EspionageCorporate-Espionage
Corporate-Espionage
 
Limitations of marketing research
Limitations of marketing researchLimitations of marketing research
Limitations of marketing research
 
PPT on "Labour Laws in India"
PPT on "Labour Laws in India"PPT on "Labour Laws in India"
PPT on "Labour Laws in India"
 

Similar a BTEC National in ICT: Unit 3 - Legal Constraints

How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe onlineHadilAlHaj
 
Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemssaltashict
 
Business And The Law
Business And The LawBusiness And The Law
Business And The LawRobbieA
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of itsr24production
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Dr. Khaled Bakro
 
2 Understand what is meant by professional practice
2 Understand what is meant by professional practice2 Understand what is meant by professional practice
2 Understand what is meant by professional practiceMark Anthony Kavanagh
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerceDamo Ward
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11mrmwood
 
Computer Legislation2 T2
Computer Legislation2  T2Computer Legislation2  T2
Computer Legislation2 T2lees_ush
 
Super billing computer ethics, privacy and security
Super billing computer ethics, privacy and securitySuper billing computer ethics, privacy and security
Super billing computer ethics, privacy and securitysuperb11b
 
Chapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and SafeguardsChapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and Safeguardslobnaqassem2
 
3.6 legislation and regulations
3.6 legislation and regulations3.6 legislation and regulations
3.6 legislation and regulationsmrmwood
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industryjamiehaworth1
 
BS CS5 Lecture 5.pptx
BS CS5 Lecture 5.pptxBS CS5 Lecture 5.pptx
BS CS5 Lecture 5.pptxwhoiam36
 
Legal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptxLegal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptxKRITARTHBANSAL1
 
Bring your own device guidance
Bring your own device guidanceBring your own device guidance
Bring your own device guidanceGary Chambers
 
10. law invest & ethics
10. law invest & ethics10. law invest & ethics
10. law invest & ethics7wounders
 

Similar a BTEC National in ICT: Unit 3 - Legal Constraints (20)

How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systems
 
Business And The Law
Business And The LawBusiness And The Law
Business And The Law
 
Computer ethics cyber security and technology of it
Computer ethics cyber security and technology of itComputer ethics cyber security and technology of it
Computer ethics cyber security and technology of it
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
 
needforsecurity
needforsecurityneedforsecurity
needforsecurity
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
 
2 Understand what is meant by professional practice
2 Understand what is meant by professional practice2 Understand what is meant by professional practice
2 Understand what is meant by professional practice
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerce
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11
 
Computer Legislation2 T2
Computer Legislation2  T2Computer Legislation2  T2
Computer Legislation2 T2
 
Issues related to ict
Issues related to ictIssues related to ict
Issues related to ict
 
Super billing computer ethics, privacy and security
Super billing computer ethics, privacy and securitySuper billing computer ethics, privacy and security
Super billing computer ethics, privacy and security
 
Chapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and SafeguardsChapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and Safeguards
 
3.6 legislation and regulations
3.6 legislation and regulations3.6 legislation and regulations
3.6 legislation and regulations
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industry
 
BS CS5 Lecture 5.pptx
BS CS5 Lecture 5.pptxBS CS5 Lecture 5.pptx
BS CS5 Lecture 5.pptx
 
Legal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptxLegal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptx
 
Bring your own device guidance
Bring your own device guidanceBring your own device guidance
Bring your own device guidance
 
10. law invest & ethics
10. law invest & ethics10. law invest & ethics
10. law invest & ethics
 

Último

MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 

Último (20)

MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 

BTEC National in ICT: Unit 3 - Legal Constraints

  • 2. Customer Data Policy  Formal document identifying the constraints or limitations in using customer information  statements of what should or should not be done  examples to make clear any statements you make  References to all the material, including any Acts of Parliament
  • 3. Data Protection Act of 12th July 1984 / 1998 Anyone processing personal data must comply with the eight enforceable principles of good practice. 1. Fairly and lawfully processed; 2. Processed for limited purposes; 3. Adequate, relevant and not excessive; 4. Accurate; 5. Not kept longer than necessary; 6. Processed in accordance with the data subject's rights; 7. Secure (no unauthorised access, alteration or disclosure) 8. Not transferred to other countries without adequate protection.
  • 4. The Information Commissioner  The Act established the office of Information Commissioner, whose duties include:  administering a public register of Data Users with broad details of the data held  investigating complaints and initiating prosecutions for breaches of the Act.  publishing several documents that offer guidelines to data users and computer bureaux.
  • 5. Registration  All Data Users have to register, giving:  their name and address (or that of their company) a description of the data held and its purpose a description of the sources from which the data is obtained a description of the persons to whom it is intended to disclose data
  • 6. Exemptions from the Act  The Act does not apply to payroll, pensions and accounts data, nor to names and addresses held for distribution purposes.  Registration may not be necessary when the data are for personal, family, household or recreational use.  Subjects do not have a right to access data if the sole aim of collecting it is for statistical or research purposes, or where it is simply for backup.  Data can be disclosed to the data subject’s agent (e.g. lawyer or accountant), to persons working for the data user, and in response to urgent need to prevent injury or damage to health.  Additionally, there are exemptions for special categories, including data held: - in connection with national security; - for prevention of crime; - for the collection of tax or duty.
  • 7. Software Copyright Laws  Computer software is now covered by the Copyright Designs and Patents Act of 1988, which covers a wide range of intellectual property such as music, literature and software.
  • 8. Copyright, Designs & Patents Act 1988  Provisions of the Act make it illegal to:  copy software  run pirated software  transmit software over a telecommunications line, thereby creating a copy
  • 9. The Computer Misuse Act of 1990  In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially where damage was done to data files, was a disciplinary offence, but there was no legislative framework within which a criminal prosecution could be brought.
  • 10. Computer Misuse Act of 1990  The Computer Misuse Act of 1990 defined three specific criminal offences to deal with the problems of hacking, viruses and other nuisances.  unauthorised access to computer programs or data  unauthorised access with a further criminal intent  unauthorised modification of computer material (i.e. programs or data)
  • 11. Computer Crime & The Law  Cracking (or Hacking)  Viruses  Trojans  Logic Bombs
  • 12. How A Virus Works 1. ORIGINATION - A programmer writes a program - the virus - to cause mischief or destruction. The virus is capable of reproducing itself 2. TRANSMISSION - Often, the virus is attached to a normal program. It then copies itself to other software on the hard disk 3. REPRODUCTION - When another drive is inserted into the computer’s disk drive, the virus copies itself on to the drive 4. INFECTION - Depending on what the original programmer wrote in the virus program, a virus may display messages, use up all the computer’s memory, destroy data files or cause serious system errors
  • 13. Health Hazards  Stress  RSI  Eyestrain  ELF radiation  Backache
  • 14. Display Screen Regulations 1992  Employers are required to  Perform an analysis of workstations in order to evaluate the safety and health conditions to which they give rise  Provide training to employees in the use of workstation components  Ensure employees take regular breaks or changes in activity  Provide regular eye tests for workstation users and pay for glasses
  • 15. Computers, Health And The Law  Employees have a responsibility to  Use workstations and equipment correctly, in accordance with training provided by employers  Bring problems to the attention of their employer immediately and co-operate in the correction of these problems
  • 16. Computers, Health and the law  Manufacturers are required to ensure that their products comply with the Directive. For example:  Screens must tilt and swivel  Keyboards must be separate and moveable  Notebook PCs are not suitable for entering large amounts of data
  • 17. The Ergonomic Environment Ergonomics refers to the design and functionality of the environment, and encompasses the entire range of environmental factors. Employers must give consideration to:  Lighting: office well lit, with blinds  Furniture: chairs of adjustable height, with tilting backrest, swiveling on five-point base  Work space: combination of chair, desk, computer, accessories, lighting, heating and ventilation all contribute to overall well-being  Noise: e.g. noisy printers relocated  Hardware: screen must tilt and swivel and be flicker-free, the keyboard separately attached  Software: should facilitate task, be easy to use and adaptable to user’s experience
  • 18. DRM  Music & Films  Technology to restrict where, how often, on what you can use it
  • 19. Proprietary Software  Sold under licence – not ownership  Unable to modify  Restricted rights to sell-on
  • 20. Open Source Movement  Have access to the source code – can therefore modify it  Redistribute the code or executable  Usually free to obtain
  • 21. The Rights of Data Subjects Apart from the right to complain to the Information Commissioner, data subjects also have a range of rights which they may exercise in the civil courts. These are:  Right to compensation for unauthorised disclosure of data (arising from principle no. 3);  Right to compensation for inaccurate data (arising out of principle no. 5);  Right of access to data and to apply for rectification or erasure where data are inaccurate (arising out of principle no. 7);  Right to compensation for unauthorised access, loss or destruction of data (arising out of principle no. 8).
  • 22. Relevant Legislation Data Protection  Data Protection Act 1998  Freedom of Information Act 2000 (FOIA) Usage of IT Systems  Computer Misuse Act 1990  Terrorism Act 2000  Privacy and Electronic Communications Regulations 2003