AS IT INFO 2 - Acts

Beschreibung

IT Mindmap am AS IT INFO 2 - Acts, erstellt von Jarth am 09/05/2013.
Jarth
Mindmap von Jarth, aktualisiert more than 1 year ago
Jarth
Erstellt von Jarth vor mehr als 11 Jahre
56
1

Zusammenfassung der Ressource

AS IT INFO 2 - Acts
  1. Copyright, Designs & Patents Act
    1. Established 1988
      1. 'Makes it illegal to copy or distribute software without permission or a licence'
        1. Covers music, literature and software
        2. Data Protection Act
          1. Purposes
            1. Requires People who use Personal Data to be Honest and Upfront about its use.
              1. Gives Individuals Certain Statutory Rights
              2. Created in 1984, revised in 1998
                1. Provides legal rights for computer users
                2. Freedom of Information Act
                  1. Concerns itself with information needed by the public authority
                    1. Includes:
                      1. How public authorities carry out their duties
                        1. How public authorities make their decisions
                          1. How public authorities spend public money
                          2. Exemptions:
                            1. Where information could jeopardise the prevention/ detection of a crime
                              1. Where the cost of collecting information exceeds a reasonable limit
                              2. Made in 2000
                              3. Computer Misuse Act
                                1. Introduced 1990
                                  1. Examples of crimes
                                    1. Unauthorised access to computer programs or data
                                      1. Up to a six month penalty and/or a fine
                                        1. Guessing someone's password then looking at the system to see what data it contains
                                        2. Unauthorised access with further criminal intent
                                          1. Up to a five year penalty and/ or a fine
                                            1. Guessing passwords to bank accounts and using that to access sensitive data without the subject's permission with the intention of committing fraud
                                            2. Unauthorised modification of computer material
                                              1. Carries up to five years offence penalty and/or a fine
                                                1. Deliberately deleting files, introducing viruses or modifying programs intending to cause damage
                                            3. Regulation of Investigatory Powers Act
                                              1. An offence to access or intercept a message sent through either public or private telecommunications
                                                1. Established 2000
                                                  1. Data interception only allowed in certain situations, for example, when a message must be intercepted to help solve a crime
                                                  Zusammenfassung anzeigen Zusammenfassung ausblenden

                                                  ähnlicher Inhalt

                                                  Common Technology Terms
                                                  Julio Aldine Branch-HCPL
                                                  Project Communications Management
                                                  farzanajeffri
                                                  Network Protocols
                                                  Shannon Anderson-Rush
                                                  Abstraction
                                                  Shannon Anderson-Rush
                                                  Computing
                                                  Kwame Oteng-Adusei
                                                  HTTPS explained with Carrier Pigeons
                                                  Shannon Anderson-Rush
                                                  Introduction to the Internet
                                                  Shannon Anderson-Rush
                                                  Construcción de software
                                                  CRHISTIAN SUAREZ
                                                  Historical Development of Computer Languages
                                                  Shannon Anderson-Rush
                                                  Useful String Methods
                                                  Shannon Anderson-Rush
                                                  Web Designing & Development Full Tutorial
                                                  Nandkishor Dhekane