Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


privacy and legilisation

No description

louis kane

on 24 May 2016

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of privacy and legilisation

privacy and legilisation
How does this affect the design of computer systems?

There must be procedures for keeping personal data up-to-date and correcting wrong data
Login codes and passwords are needed to prevent unauthorised access
Personal data that is no longer relevant should be deleted from the system

creative commons licensing
A Creative Commons licence is used when an author is willing to give people the right to share or use a work that they have created
This could be, for example, a set of lesson plans or a book, play or video they have written or made
The creator can choose to allow only non-commercial uses, so that their work cannot be copied and distributed for profit

why does data need protecting
Personal data about each one of us is held on dozens, or even hundreds, of computers
We would like to be confident that this data is accurate and held for a specific purpose
A lot of this data is private and confidential and should not be available for anyone to look at
It should also be kept safe from people who want to use it for wrongful or criminal purposes

computers and the law
As computers became more and more widespread in the 1970s and 80s, new laws were needed to protect individuals and organisations from harm

computer missue act (1990)
Designed to prosecute hackers who gain access to computer systems without consent
Software developers should not create programs that are capable of gaining unauthorised access to other programs or data

copy right and computer systems
Computer programs are subject to copyright law
A user interface, and the ‘look and feel’ of an operating system, can also be subject to copyright law
In 1988 Apple launched a $5.5 billion law suit against Microsoft and Hewlett-Packard for copying their GUI interface, first developed in the 1980s. In 1993, they finally lost the case

the data protection act
This Act specifies the rules about collecting and holding data. These include:The data must be accurate and up to date
You have a right to see what data is held about you
The data must be protected from unauthorised access

Full transcript