Zusammenfassung der Ressource
Computer Legislation
- Data Protection Act
- Fairly and lawfully processed
- Processed for limited purposes
- Adequate, relevant and not excessive
- Accurate
- Not kept for longer
than is necessary
- Processed in line
with your rights
- Secure
- Not transferred to other
countries without
adequate protection
- In April 2011 Sony allowed hackers to break into
its online store, exposing a raft of personal
information such as names, addresses, dates of
birth and credit card information to criminals.
- Computer misuse act
- The Computer Misuse Act is
designed to protect
computer users against
wilful attacks and theft of
information.
- Offences under the act include
hacking, unauthorised access to
computer systems and purposefully
spreading malicious and damaging
software (malware), such as viruses.
- 21-year-old Gareth Cross of West Sussex
was sentenced to twelve months after
hacking into a private Facebook account.
- Freedom of information act
- Protects information that is
properly classified in the
interest of national security
- Protects records related
solely to the internal
personnel rules and
practices of an agency
- Protects records or
information compiled
for law enforcement
purposes
- Protects geological and
geophysical information
and data, including
maps, concerning wells.
- Prosecution of England footballer Steven
Gerrard provoked so much interest among
police officers that 130 of them breached
data protection laws to view his file
- Copyright, designs and patents act
- It gives the creators of
literary, dramatic, musical
and artistic works the right to
control the ways in which
their material may be used.