[go: up one dir, main page]

0% found this document useful (0 votes)
101 views10 pages

Legislations: Manav Satish Heer Arvind Satvir Arik

The document summarizes key UK legislation related to data protection, computer misuse, copyright, and investigatory powers. The Data Protection Act protects personal data and gives individuals rights over their data. The Computer Misuse Act makes unauthorized access or modification of computer systems illegal. The Copyright, Designs and Patents Act protects creative works from being copied or shared without permission. The Regulation of Investigatory Powers Act allows surveillance by public bodies if a warrant is issued and regulates access to communications data.

Uploaded by

Satvir Gill
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
101 views10 pages

Legislations: Manav Satish Heer Arvind Satvir Arik

The document summarizes key UK legislation related to data protection, computer misuse, copyright, and investigatory powers. The Data Protection Act protects personal data and gives individuals rights over their data. The Computer Misuse Act makes unauthorized access or modification of computer systems illegal. The Copyright, Designs and Patents Act protects creative works from being copied or shared without permission. The Regulation of Investigatory Powers Act allows surveillance by public bodies if a warrant is issued and regulates access to communications data.

Uploaded by

Satvir Gill
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10

LEGISLATIONS

Manav Satish
Heer Arvind
Satvir Arik
DATA PROTECTION ACT

• This law applies to information stored both on


computers and in organised paper filing
systems. The law covers personal data, which is
any data which can be used to identify a living
person. Furthermore, data which can be used in
combination with other data to identify a living
person is also classified as personal data.
• An individual who can be identified by personal data is referred to as the data subject, with the law protecting
them in eight specific ways as laid out by the Government:
• 1. Personal data shall be processed fairly and lawfully
• 2. Personal data shall be obtained only for one or more specified and lawful purpose
• 3. Personal data shall be adequate, relevant and not excessive for its purpose(s)
• 4. Personal data shall be accurate and where necessary kept up to date
• 5. Personal data shall not be kept for longer than is necessary for its purpose(s)
• 6. Personal data shall be processed in accordance with the rights of data subjects under this Act
• 7. Appropriate technical and organisational measures shall be taken against unauthorised or unlawful
processing of personal data and against accidental loss or destruction of, or damage to, personal data
• 8. Personal data shall not be transferred to a country or territory outside the European Economic Area, unless
that country or territory ensures an adequate level of data protection
• The Act also gives data subjects certain rights, such as the
right to request a copy of the data held about them, the
right to correct the data held about them and the right to
prevent marketing using contact details provided by the
data subject. As of 2018, The Data Protection Act has
been replaced by the General Data Protection Regulation
(GDPR) and the Data Protection Act 2018.
THE COMPUTER MISUSE ACT(1990)
1. It is a important legislation that makes it illegal to access and modify
data that is stored on a computer system without permission.
2. It was designed and introduced to deal with unauthorised access and
hacking into computer systems, with the intention of gaining
important information to spreading malware to the computer system.
3. It makes the following illegal:
 Unauthorised access to computer, with the intention of steal data or
spreading malware
 Gaining unauthorised access to a computer system
 Modifying data with permission 
 Obtaining and modifying important information
1. Business and organisations have to make sure that all data that is held by them is safe and cannot be gained
access by an unauthorised person. If data held by the business is leaked or obtained by someone without
permission then the business could be held responsible for the leak of the data. For example: if the data of
school students is leaked then the school is held responsible for the leak of the important information of the
students and they could be convicted for braking The Computer Misuse Act.
2. How to prevent breaking the law:
 Train staff to not be vulnerable to email spam - which could lead to hacking, and then theft go data.
 Perform regular backups and regular security checks - make sure that the all the important information is
stored safely so it can be access without permission and perform regular security check to make sure that the
computer system doesn’t have viruses or malware, which could lead to potential hacking.
3. R.V Callum Gentry-Brown - Computer Misuse Act 1990 s1 Unauthorised access - email spammed his
employer ace24 consultancy and copied 3,000 files and 55 folders - was sentenced to five suspension for two
years and also 200 hours of unpaid work.
THE COPYRIGHT DESIGN & PATENTS ACT (CDPA)-1988 

1. This law gives its creators  the rights to control how their work is used and
shared. They are two way it affects a business,
2. This law was introduced to prevent software piracy, which was created by one way is that it protects your product
the federation against software theft from getting stolen and getting sold as
3. Things that are protected by this law: their own to they customers e.g.
 Literary works
branded clothing’s. The other way It
 Databases
way its affects a business Is when they
 Artistic works
break the law as it can lead to very
 Musical works
costly law suits if the original  maker
 Dramatic works
decides to file a case which can make
 Sound recordings
the business lose lots of money and
 Films
also lose a majority of they reputation. 
 Computer program

 The  person who has the copyright has a exclusive right to copy or
reproduce , perform or show in public 
-To prevent braking the law, the business should carefully
check terms of use before going ahead and using someone
else's work and try be original as possible
- The first person in Scotland to be convicted of illegally
sharing music files online has been sentenced to three years
probation. Anne Muir admitted distributing £54,000 worth of
copyrighted music files by making them available to others
via a peer-to-peer file sharing application.
THE REGULATION OF INVESTIGATORY POWER ACT 2000

1. The RIPA governs the use of covert


3. Allows organisations to use investigatory
surveillance by public bodies For
powers in accordance with human rights. These
example, the Secret Service can legally powers include:
wire-trap online conversations in the  The interception of communication
interests of national security provided that  Acquisition of communication data
a warrant has been issued.  Intrusive surveillance 
 Access to encrypted data
2. The act was introduced so it give certain
 The use covert Human Resources 
groups the legal right to carry out digital  
surveillance and access digital
communication held by a person or
organisations
4. Business and organisations have to follow the law and give information like
customer’s communication data and etc when it is demanded by the
government.
5. Business should provide access to digital communication or the storage of
digital data if requested by the security services or a relevant public body under
the terms of the RIPA to prevent breaking the law.
6. In 2019 MI5 broke the law by breaching the safeguards that was meant to
limit how Spies intercept public data. MI5 breached parts of the Investigatory
Powers Act that regulates the processing of material obtained under a warrant,
including intercepted data. As a result, a team of inspectors were assigned to
closely monitor the work of MI5.

You might also like