COMP2 - Laws Flashcards
Copyright, Designs and Patents Act 1988
This act provides legal protection to authors of materials, ensuring works are not used inappropriately.
Copyright
you should only copy or use copyrighted works with the owner’s permission.
Examples of copyrighted materials: music, films, art and literature.
Design Rights
Gives protection from copying of your original design. It protects how something looks.
Patent
Protects how an invention works or what it does. The patent lasts up to 20 years.
Trademark
Protects the name or logo used to identify a business or product and so customers can tell it apart from other organisations.
Computer Misuse Act 1990
3 Offences
1) Unauthorised acces to computer programs or data.
2) Unauthorised acces with a further criminal intent.
3) Unauthorised modification of computer material (programs or data).
Cracking and Hacking
Cracking: Illegally breaking into a computer system.
Hacking: Illegally breaking into a computer system; programming in an unstructured way.
Data Protection Act 1984/1998 8 Principles (for personal data)
1) Fairly and lawfully processed.
2) Processed for limited purposes,
3) Adequate, relevant and not excessive.
4) Accurate.
5) Not kept for longer than necessary.
6) Processed in accordance with the data subject’s rights.
7) Secure.
8) Not transferred to countries without adequate protection.
Health and Safety Regulations 1974/1992
Emplyers
Carry out risk assessments, keep records and fix any problems that occur.
Have emergency procedures.
Provide clear information to employees of health and safety risks.
Health and Safety Regulations 1974/1992
Employees
Take care of their own and others’ health and safety.
Use equipment provided in accordance with training.
Not misuse any provided health and safety equipment.
Digital Rights Management
Application of control technologies to limit the use of digital media.
Regulation of Investigatory Powers (RIP) Act 2000
Illegal without lawful authority:
1) Interception of post in public postal service.
2) Interception of commuunicaton on public telecommunication network (eg: internet and email).
3) Unauthorised interception of communication on private telecommunication system (eg: intranet mail).
4) Unauthorised disclosure of intercepted mail.