A law that determines if people are allowed to access computers
and be able to modify the data on the computer system.
It makes 'Unauthorised access' illegal, including hacking or
other techniques to use a computer system uninvited.
Such as using someone's password to get
into their computer without them
allowing you to
'Unauthorised Access' with intentions to commit further
crime (such as fraud) is taken as an even more serious
offence.
Logging in as someone else, using an account
account for something is an offence
'Unauthorised Modification' is also illegal. This is where you
change data without permission or deliberately infecting a
computer with a virus.
Deleting files, changing files
Making, supplying or gaining material that could be used in
computer misuse offences
Such as
viruses
Implications of a hacker gaining access to business-owned computers:
Businesses will lose income if the hackers shut down their e-commerce system
(electronically buying or selling products via online services/the Internet.
Loss of reputation for businesses as people are unconvinced
that their system is secure.
A risk of virus or malware infection that
may be undetected but could send
information to the criminal/hacker.
A cost to update and improve security to prevent further
attacks.
Data Protection Act
Aims to protect anyone who has
personal information stored on a
computer system.
Information commissioner
The person that oversees companies who wish to store their
customers' personal information.
Data controller
Organisation that stores data on an individual by registering
with the information commissioner
The Data Subject is the person whose
data is being stored, and they must give
consent for their data to be stored.
They then have many rights
They are allowed to see any information held on them
They may have to pay a fee for this
They may ask to change data if they are not sure it is correct
They can claim conpensation if their rights are broken
They can prevent automated decision making
However, the Data Subject cannot see
information held on them if it is involved n
national security or a police investigation.
RESPONSIBILITIES
Storing data no longer than necessary
Measures of protection, e.g passwords, encryption
(encoding a message so that only authorised users can
access it)
storing only relevant information
ensuring the data is accurate and up to
date
Using data honestly, for a purpose agreed with the user.
Not sending data to outside countries without
first ensuring that it is secure and can be kept
safe by legislation (laws) in that country.
The Data Processor does not own the data,
but will use the data on behalf of the Data
Controller, following the same rules and
regulations.
The Copyright, Designs and Patents Act
Protects the creative work of individuals or businesses
They own 'copyright' so they can determine what to
do with it, whether that is selling it, or simply being
credited for their work.
They protect the original creators by
making it a crime for anyone to
download, use and share the
copyright work without first paying,
or sometimes just asking for
permission
Protects from...
Software piracy, by illegal download or illegal distribution.
Use of software without the relevant license.
Theft of intellectual property, e.g. designs for 3D printers or
text and written work
Using or downloading images without permission of the
copyright owner
The illegal download of videos and audio files
The Communications Act 2003
It covers various different
communications media,
protecting against certain issues
Offensive and indecent images
Sending such images of others is
another offence covered by the Act, and deliberately sharing
images with such content on social media can be an offence
under the Act.
Threatening behaviour online
'Trolling' is when you post comments to
deliberately cause distress, and the
Communications Act tries to prevent such
threats happening. However, the law needs to
be updated due to the fact that online trolls can
cause offence wihout threat.
Piggybacking
When you use someone else's
Internet connection of Wifi without their
consent or without intention to pay.
Why do hackers hack?
To steal or modify information
Disrupt business, pure mischief or a challenge
Steal money, personal gain
Make a point - political reasons, get revenge on people with opposing views