Introducing
Your new presentation assistant.
Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.
Trending searches
Computers are often used to analyse data and make a decision based on the data given at a very high speed. They are often used in big companies where there isn't enough time for the employees to make these decisions
✳✱*
✳✱*
This Act was introduced to protect the investment of time, money and effort by the people who create original pieces of work.
This can mean authors of books, composers of music, the makers of a film, a computer game designer or a company that creates applications for smart phones.
They all invest a great deal of time and money to produce these things and quite rightly, their work belongs to them.
• To ensure people are rewarded for their endeavours
• To give protection to the copyright holder if someone tries to copy or steal their work.
This is an act which makes it illegal to discriminate people online via direct discrimiation or by indericit discrimination. This act is often followed by websites to ensure that they get a maximum amount of people veiwing their website
• Access a computer without permission.
• Access a computer without permission, hoping to break another law.
• Change, break or copy files without permission.
What are the consequences?
Most people who break this law can be fined for up to £2000 and jailed for up to 6 months. However, people who do computer fraud, blackmailing through computers, or making computer viruses will get a fine of any amount and be jailed for up to 5 years.
It is very difficult to prove that people have committed any of these offences without proper knowledge and use of I.P addresses so the law has not worked very well. There have been very few successful prosecutions.
Computers are taking over jobs of some humans . This is due to the fact that robots are more accurate and don't need to go on holidays
The Computer Misuse Act 1990 is a law passed by the British government. It was introduced to try to fight the growing threat of hackers and hacking.
Artificial intelligence is a disipline in computer science. It is also a relativly new area in which programmers devise new software to behave as if it was a human. One of the earliest examples includes a chess playing software which analyses millions of moves and makes the best decsion based on the difficulty of the program.
Banks clerks and shop assistants are no longer in demand. This is because there is internet banking which allows customers access to their bank accounts 24/7
If the program did have a conscience, would be allowed to terminate the programme?
What is it?
This act sets the fine line between freedom of speech and acts which are grossly offensive or indecent.
The Act is intended to allow suitable authorities’ access to communications to prevent criminal or terrorist activities
1. If you collect data about people for one reason, you must not use it for a different reason;
2. You must not give people's data to other people or organisations unless they agree;
3. People have the right to look at data that any organisations store about them;
4. You must not keep the data for longer than you need to and it must be kept up to date;
5. You must not send the data to places outside of the European Economic Area unless adequate levels of protection exist;
6. Organisations that store data about people must register with the Information Commissioner’s Office;
7. If you store data about people you must make sure that it is secure and well protected;
8. If an organisation has data about you that is wrong, then you have a right to ask them to change it.
The Data Protection Act (DPA) is a law passed by the British government in 1984 and updated in 1998.
It sets out rules for people who use or store data about living people and gives rights to those people whose data has been collected. The law applies to data held on computers or any sort of storage system, even paper records.
The law covers personal data which are facts like your address, telephone number, e-mail address, job history etc.
People who use the information are called data users. People who the data is about are called data providers.
What are the purposes of this act?
The act is important because it deals with communications that contain credible threats of violence such as:
Trolling
Stalking
Communications that contain material grossly offensive
• Access an internet connection with no intention to pay for the service, making it a crime to piggyback onto other people’s Wi-Fi without their permission
• Send offensive communications using any communications system including social media
• Demand ISPs provide access to a customer’s communications
• Allow mass surveillance of communications
• Demand ISPs fit equipment to facilitate surveillance
• Demand access be granted to protected information
• Allow monitoring of an individual internet activities
• Prevent the existence of such interception activities being revealed in court