Documente Academic
Documente Profesional
Documente Cultură
Describe the provisions of the Computer Misuse Act. Describe the principles of software copyright and licensing agreements. Recall the nature, purpose and provisions of the current data protection legislation rights, duties, exemptions, etc.
Abuse of ICT
There are also opportunities for the abuse of ICT:
Sending unsolicited e-mails (now an offence in some countries) Creating inappropriate or misleading web-sites Registering a domain that might appear to belong to someone else cyber-squatting Inappropriate use of ICT is not necessarily illegal.
Logic Bombs
Denial of Service attacks Viruses could commit offences at different levels depending on the payload:
Some display harmless messages Some are deliberately malicious
Copyright covers the implementation of the idea the actual words, images and sounds that you use
The act is enforced by FAST the Federation Against Software Theft (also FACT for general copyright)
Mobile phone records can be used to locate criminals and victims of crime
Audit logs and records of e-mails and network traffic could be used as evidence
Data Protection
We all have a right to privacy
There might be a variety of reasons why youd want to keep something private:
It might be possible to using the information for fraudulent purposes
The information might be of a sensitive nature, such as medical records You might just not want people to know!
Defines the terms data subject (the person about whom data is held) and data controller (called data user in the 1984 version)
Requires that all data controllers (and the nature of the processing they do) must be recorded on the public register of data controllers Is overseen by the Information Commissioner
Use of data in cases dealing with national security, the prevention of crime, or the collection of taxes & duty