Legal and morale issiues Flashcards
What is the data protection act
-Anyone who stores personal details must keep them secure. Companies with computer systems that store any personal data must have processes and security mechanisms designed into the system to do this
What are the 9 principles of the data protection act?
-Data must be processed fairly and lawfully
-Data must be adequate, relevant and not excessive
-Data must be accurate and up to date
-Data must not be retained for longer then necessary
-Data can only be used for the purpose for which it was collected
-Data must be kept secure
-Data must be handled in accordance with peoples rights
-Data must not be transferred outside of the EU without adequate protection
What is the computer misuse act?
primarily designed to prevent unauthorised access or hacking of problems or data
What are the 4 principles of the computer missuses act?
-No unauthorised access to computer material
-No unauthorised access to with intent to commit or facilitate a crime
-No unauthorised modification of computer material
-No making, supplying or obtaining anything which can be used in computer misuse offences
what are the pros and cons of pc in the work place?
Computers are taking the roles previously done by humans
+saves companies money
+computers can work 24hrs a day with no breaks
-less jobs for people
what is AI?
AI is when a computer system can make decisions and learn new situations
what are the 4 computing related legislation you need to be aware of?
-The data protection act
-The computer misuse act
-the copyright design and patent act
-The regulation of investigatory powers act
What is the copywrite designs and patents act?
Designed to protect the creators of books, music, video and software from having their work illegally copied
What is the regulation of investigatory powers act?
The act regulates the powers of public bodies to carry out surveillance and investigation
What are the 6 principles of the investigatory powers act?
-Enables certain public bodies to demand that an ISP provide access to a customer’s communications in secret
-Enables mass surveillance of communications in transit
-Enables certain public bodies to demand ISPs fit equipment to facilitate surveillance
-Enables certain public bodies to demand that someone hand over keys to protected information
-Allows certain public bodies to monitor peoples internet activities
-prevents the existence of interception warrants and any data collected with them from being revealed in court