SOC LEG ETH

Descripción

SocLegEth - Social Legal and Ethical computing
ca.loizou
Apunte por ca.loizou, actualizado hace más de 1 año
ca.loizou
Creado por ca.loizou hace casi 9 años
10
0

Resumen del Recurso

Página 1

Legal Legal: Computer Misuse Act 1990: Unauthorized access to computer material Unauthorized access to computer material with criminal intent Data Protection Act 1998 (followed and updated the Data Protection Act 1984) The Data Protection Act applies to personal data stored in a database. There are eight principles. Must be fairly and lawfully processed. Obtained and processed for limited purposes. Adequate, relevant and not excessive. Accurate and kept up-to-date Not kept for longer than is necessary Processed in line with the rights of the data subject Must be kept secure Not transferred to countries outside the EU, unless there is adequate protection Copyright, Software and Patents Act 1988 It is illegal to: Copy software or distribute software Execute or run software for which you do not have a licence Alter or edit software Transmit software or send via a telecommunications link Regulation of Investigatory Powers Act 2000Under the RIP Act (RIPA) it is...Health and Safety (Display Screen Equipment) Regulations 1992

SOCIAL

Breach of the Computer Misuse Act (1990)

Breach of the Data Protection Act (1998)

Mostrar resumen completo Ocultar resumen completo

Similar

Asch Study and Variations
littlestephie
Health and social care Unit 1 Quiz
Holly Bamford
Tudors: Chapter 1- Political and social role of the church
Amy Le Grys
A2 Philosophy and Ethics: Ethical Language (Meta-Ethics) - Key Philosophers
Adam Cook
Globalisation
V Griffiths
Contrato social
Javier Poblete
Evaluation: Social Causation Hypothesis as an Explanation for Schizophrenia
Katie Greensted
Social Studies Vocab.
Haden s.
Sociology - Socialisation
nicole_naismith
Bases Bio-Psico-Sociales del Comportamiento
evelia-1983