Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Information Systems - Laws

No description
by

Sunday-Joy Copland

on 25 September 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Information Systems - Laws

Information Systems - Laws
Sunday & Gregor

Computer Misuse act
Hacking is gaining unauthorized access to a computer system, data or a program without permission.
The first section deals with 'basic hacking'. The second with situations where a computer system is being used to help in committing another crime and the third act covers 'expert hacking'.

Data Controller
The data controller is a person who determines the purposes for which, and the manner in which, any personal data are is processed.
Data Subject
The data subject is the person or business on which the data is held about.
Data User
The data user is the person on which is handling the data.
Copyrights Designs and Patents Act
The data protection act - 1998
There are 8 main principles in this act which include;
1) Personal data shall be handled fairly and lawfully.
2) Personal data shall be obtained for only lawful purposes, and not processed in any manner against this act.
3) Personal data shall be acceptable, relevant and not excessive in relation to the purpose.
4) Personal data shall be accurate and kept up to date.
5) Personal data processed for any purpose shall not be kept longer than necessary.
6) Personal data shall be processed in accordance with the rights of the data subjects.
7) Measures shall be taken against unlawful processing of data and loss or destruction of personal data.
8) Personal data shall not be transferred to a country outside Europe, unless that country ensures protections for the rights of the data subject.
Data Controller
Data Subject
Data User
This act contains 3 sections covering various misues;
1) Unauthorized access tom computer material.
2) Unauthorized access with intent to commit or facilitate commission of further offenses.
3) Unauthorized modification to computer material.
Hacking
illegal to copy any published material without either the permission of the copyright holder or purchase of a license
copying music and filsms to sell for a profit or even to give away for free
There are 3 methods of licensing software and slightly different laws for each;
1) Software can be legally bought and installed on as many computers as the license permits.
2)
There are 3 methods of licensing software and slightly different laws for each;
1) Software can be legally bought and installed on as many computers as the license permits.
2) Shareware is generally downlaoded from the internet and can be legally installed for usually about 30 days.
3) Freeware is similar to shareware except that there is no need to pay therefore no free trial, its all free.
/
Full transcript