Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Impact of ICT - Legislation

AS ICT lesson outlining the major pieces of legislation that are required knowledge for the exam.

Philip Upstone

on 12 February 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Impact of ICT - Legislation

ImpaCT of ICT Legislation Combating ICT crime Networking Computers Standards Health & Safety Impact on Individuals, Organisations and Society Possible future developments Data Protection ACt (1998) Computer misuse act (1990) Copyright, Designs and patents act (1988) regulation of investigatory powers act (2000) electronic communications act (2000) freedom of information act (2000) Data Protection ACt (1998) Set up to protect individuals from organisations who might intentionally or accidental misuse or abuse their private details. 6 Rights Subject Access
prevent processing likely to cause damage
prevent processing for direct marketing
prevent automated decision making
rectify, block or erase incorrect data
compensation if damage caused 8 Principles processed fairly and lawfully
only used for identified purposes
adequate, relevant and not excessive
accurate and up to date
not kept for longer than necessary
processed in accordance with rights
kept secure
not transferred outside the EU unless a similar law is in place Exemptions National Security
Crime & Taxation
Health, education & social work
domestic purposes Computer Misuse act (1990) Introduced to protect organisation from hackers, and was amended in 2006 4 Provisions Unauthorised access
Unauthorised access with intent to commit further offences
Unauthorised access with intent to modify data or impair operation

making, supplying or obtaining articles for use in computer misuse offences Copyright, Designs and patents act (1988) Makes it illegal to steal or create unauthorised copies of software. also covers manuals, books, CDs, music, and film regulation of investigatory powers act (2000) Introduced to clarify the legal situation over communication interception techniques. Nicknamed the 'snoopers charter' makes it a criminal offence to monitor communications without lawful authority Organisations may monitor and record communications
to establish facts to ascertain compliance with practices
in the interests of national security
to prevent or detect crime
to investigate unauthorised use of telecommunications system Organisations can monitor but not record:
when trying to determine if a communication is business or personal
communications to anonymous help lines Electronic communications act (2000) introduced in order to create a legal framework to encourage e-commerce 2 main parts set up an approved register of cryptography suppliers
allowed digital signatures to become admissible in law freedom of information act (2000) the act deals with providing access to official information. it applies to all public authorities. including:
the health service
and schools
Full transcript