SlideShare uma empresa Scribd logo
1 de 8
Information Communication Technology
An Introduction to Legislation in the UK




                             Stonemasonry Department 2012
Legislation
Now that you understand what ICT can be used for, and how
you interact with it through hardware devices and software
 applications it is important to know about the legislation
    which covers the use of ICT in the United Kingdom.

         In this presentation you will learn about:

              The Computer Misuse Act 1990
                 The Data Protection Act
                      Copyright Law
Computer Misuse Act 1990
 This act makes it illegal to do any of the following:

 Access computer material without permission, eg looking
 at someone else's files.

 Access computer material without permission with intent
 to commit further criminal offences, eg hacking into the
 bank's computer and wanting to increase the amount in
 your account.

 Alter computer data without permission, eg writing a virus
 to destroy someone else's data, or actually changing the
 money in an account.
Information taken directly from http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/1dataandcomputermisuserev2.shtml
Is Hacking Illegal?
The short answer to this question is NO! Hacking is not illegal
provided you are doing it for legitimate purposes. Computer
hackers are split into three distinct groups; black hat, grey hat
                         and white hat.




     ILLEGAL                ILLEGAL               LEGAL
                            (but not criminal)
Is Hacking Illegal?
 Black hat hackers target the websites/data of
 organisations or people without permission and with the
 intent of causing harm, stealing files or profiting as a
 direct result of gaining access to a system.

 Grey hat hackers also gain access to systems without the
 permission of the owner but once in, they either inform
 the owner of how to improve security or fix any flaws
 themselves.

 White hat hackers gain access to systems with the
 permission of the owner. They carry out penetration
 testing “pen tests” to make sure that systems are secure.
The Data Protection Act (1998)

 The DPA 1998 was passed by Parliament to control the
 way information is handled and to give legal rights to
 people who have information stored about them.

 Some data and information stored on a computer is
 personal and needs to be kept confidential. People want to
 keep their pay, bank details, and medical records private
 and away from the view of just anybody. If someone who is
 not entitled to see these details can obtain access without
 permission it is unauthorised access. The Data Protection
 Act sets up rules to prevent this happening.

Information taken directly from http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/1dataandcomputermisuserev2.shtml
Copyright Law

 This provides protection to the owners of the copyright
 and covers the copying of written, musical, or film works
 using computers. FAST is the industry body which is against
 software theft.

 There have been cases where laws such as Copyright have
 been used to crack down on file sharing websites or
 individuals who store and illegally distribute copyrighted
 material, eg music. There is a massive problem with many
 people around the world obtaining copyrighted material
 illegally.

Information taken directly from http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/1dataandcomputermisuserev2.shtml
Developed by The Stonemasonry Department
          City of Glasgow College
                    2012

Mais conteúdo relacionado

Mais procurados

Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
charlesgarrett
 

Mais procurados (20)

Computer forensics and steganography
Computer forensics and steganographyComputer forensics and steganography
Computer forensics and steganography
 
Botnets
BotnetsBotnets
Botnets
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2
 
Windows forensic artifacts
Windows forensic artifactsWindows forensic artifacts
Windows forensic artifacts
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
 
Windowsforensics
WindowsforensicsWindowsforensics
Windowsforensics
 
First Responder Officer in Cyber Crime
First Responder Officer in Cyber CrimeFirst Responder Officer in Cyber Crime
First Responder Officer in Cyber Crime
 
Cyber forensic investigation & Analysis
Cyber forensic investigation & AnalysisCyber forensic investigation & Analysis
Cyber forensic investigation & Analysis
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Network Forensics
Network ForensicsNetwork Forensics
Network Forensics
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
Obstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsObstacles to Cybercrime Investigations
Obstacles to Cybercrime Investigations
 

Destaque

Presentation template making equipment
Presentation   template making equipmentPresentation   template making equipment
Presentation template making equipment
doogstone
 
Template materials
Template materialsTemplate materials
Template materials
doogstone
 
Hand arm vibration
Hand arm vibrationHand arm vibration
Hand arm vibration
doogstone
 
Sustainability
SustainabilitySustainability
Sustainability
DjCurrie
 

Destaque (20)

Presentation constructing an information panel
Presentation   constructing an information panelPresentation   constructing an information panel
Presentation constructing an information panel
 
Snecked rubble step by step angled
Snecked rubble step by step angledSnecked rubble step by step angled
Snecked rubble step by step angled
 
Presentation template making equipment
Presentation   template making equipmentPresentation   template making equipment
Presentation template making equipment
 
Student induction 2013-14
Student induction 2013-14Student induction 2013-14
Student induction 2013-14
 
Chisels
ChiselsChisels
Chisels
 
Cutting a Return head
Cutting a Return headCutting a Return head
Cutting a Return head
 
Silica dust
Silica dustSilica dust
Silica dust
 
Checks and splays
Checks and splaysChecks and splays
Checks and splays
 
Presentation types of template
Presentation   types of templatePresentation   types of template
Presentation types of template
 
Template materials
Template materialsTemplate materials
Template materials
 
Hand arm vibration
Hand arm vibrationHand arm vibration
Hand arm vibration
 
Concrete Block Walling
Concrete Block WallingConcrete Block Walling
Concrete Block Walling
 
Sustainability
SustainabilitySustainability
Sustainability
 
State of the omnichannel nation
State of the omnichannel nationState of the omnichannel nation
State of the omnichannel nation
 
Online assignment
Online assignmentOnline assignment
Online assignment
 
Lesson template of sabareesh.p.s
Lesson template of sabareesh.p.sLesson template of sabareesh.p.s
Lesson template of sabareesh.p.s
 
Новости недвижимости Майами за август 2016
Новости недвижимости Майами за август 2016 Новости недвижимости Майами за август 2016
Новости недвижимости Майами за август 2016
 
Close to extinction/ Endangered Species in the Wild
Close to extinction/ Endangered Species in the WildClose to extinction/ Endangered Species in the Wild
Close to extinction/ Endangered Species in the Wild
 
Meditation 4
Meditation 4Meditation 4
Meditation 4
 
Hand doctor – kids game
Hand doctor – kids gameHand doctor – kids game
Hand doctor – kids game
 

Semelhante a It legislation

Business And The Law
Business And The LawBusiness And The Law
Business And The Law
RobbieA
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industry
jamiehaworth1
 
Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systems
saltashict
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
Pravir Karna
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)
Asish Verma
 

Semelhante a It legislation (20)

Business And The Law
Business And The LawBusiness And The Law
Business And The Law
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industry
 
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law
 
How to stay safe online
How to stay safe onlineHow to stay safe online
How to stay safe online
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Cie 2 cyber law
Cie 2  cyber lawCie 2  cyber law
Cie 2 cyber law
 
Info2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systemsInfo2 sec 5_-_protecting_ict_systems
Info2 sec 5_-_protecting_ict_systems
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human right
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)
 
SHAILENDRA.ppt
SHAILENDRA.pptSHAILENDRA.ppt
SHAILENDRA.ppt
 
ppt cyber law 1.pptx
ppt cyber law 1.pptxppt cyber law 1.pptx
ppt cyber law 1.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
IT-Presentation.pptx
IT-Presentation.pptxIT-Presentation.pptx
IT-Presentation.pptx
 

Mais de doogstone

Risk assessment
Risk assessmentRisk assessment
Risk assessment
doogstone
 
Construction electrical safety
Construction electrical safetyConstruction electrical safety
Construction electrical safety
doogstone
 
Presentation constructing a pentagon
Presentation   constructing a pentagonPresentation   constructing a pentagon
Presentation constructing a pentagon
doogstone
 
Presentation constructing a heptagon
Presentation   constructing a heptagonPresentation   constructing a heptagon
Presentation constructing a heptagon
doogstone
 
Snecked rubble step by step
Snecked rubble step by stepSnecked rubble step by step
Snecked rubble step by step
doogstone
 
Perimeters basic
Perimeters basicPerimeters basic
Perimeters basic
doogstone
 

Mais de doogstone (20)

Risk assessment
Risk assessmentRisk assessment
Risk assessment
 
Health and safety signage
Health and safety signageHealth and safety signage
Health and safety signage
 
Construction electrical safety
Construction electrical safetyConstruction electrical safety
Construction electrical safety
 
Riddor
RiddorRiddor
Riddor
 
Presentation constructing a pentagon
Presentation   constructing a pentagonPresentation   constructing a pentagon
Presentation constructing a pentagon
 
Presentation constructing a heptagon
Presentation   constructing a heptagonPresentation   constructing a heptagon
Presentation constructing a heptagon
 
Introduction to masonry walling
Introduction to masonry wallingIntroduction to masonry walling
Introduction to masonry walling
 
Surfacefinishes12
Surfacefinishes12Surfacefinishes12
Surfacefinishes12
 
Snecked rubble step by step
Snecked rubble step by stepSnecked rubble step by step
Snecked rubble step by step
 
Half brick walling calculations
Half brick walling calculationsHalf brick walling calculations
Half brick walling calculations
 
Cutting a cavetto mould
Cutting a cavetto mouldCutting a cavetto mould
Cutting a cavetto mould
 
Cutting an ovolo mould
Cutting an ovolo mouldCutting an ovolo mould
Cutting an ovolo mould
 
Rock formation
Rock formationRock formation
Rock formation
 
Manual handling
Manual handlingManual handling
Manual handling
 
Chisels
ChiselsChisels
Chisels
 
IT guide to data storage and protection
IT guide to data storage and protectionIT guide to data storage and protection
IT guide to data storage and protection
 
IT hardware and software
IT hardware and softwareIT hardware and software
IT hardware and software
 
Percentages
PercentagesPercentages
Percentages
 
Ratios
RatiosRatios
Ratios
 
Perimeters basic
Perimeters basicPerimeters basic
Perimeters basic
 

Último

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Último (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 

It legislation

  • 1. Information Communication Technology An Introduction to Legislation in the UK Stonemasonry Department 2012
  • 2. Legislation Now that you understand what ICT can be used for, and how you interact with it through hardware devices and software applications it is important to know about the legislation which covers the use of ICT in the United Kingdom. In this presentation you will learn about: The Computer Misuse Act 1990 The Data Protection Act Copyright Law
  • 3. Computer Misuse Act 1990 This act makes it illegal to do any of the following: Access computer material without permission, eg looking at someone else's files. Access computer material without permission with intent to commit further criminal offences, eg hacking into the bank's computer and wanting to increase the amount in your account. Alter computer data without permission, eg writing a virus to destroy someone else's data, or actually changing the money in an account. Information taken directly from http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/1dataandcomputermisuserev2.shtml
  • 4. Is Hacking Illegal? The short answer to this question is NO! Hacking is not illegal provided you are doing it for legitimate purposes. Computer hackers are split into three distinct groups; black hat, grey hat and white hat. ILLEGAL ILLEGAL LEGAL (but not criminal)
  • 5. Is Hacking Illegal? Black hat hackers target the websites/data of organisations or people without permission and with the intent of causing harm, stealing files or profiting as a direct result of gaining access to a system. Grey hat hackers also gain access to systems without the permission of the owner but once in, they either inform the owner of how to improve security or fix any flaws themselves. White hat hackers gain access to systems with the permission of the owner. They carry out penetration testing “pen tests” to make sure that systems are secure.
  • 6. The Data Protection Act (1998) The DPA 1998 was passed by Parliament to control the way information is handled and to give legal rights to people who have information stored about them. Some data and information stored on a computer is personal and needs to be kept confidential. People want to keep their pay, bank details, and medical records private and away from the view of just anybody. If someone who is not entitled to see these details can obtain access without permission it is unauthorised access. The Data Protection Act sets up rules to prevent this happening. Information taken directly from http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/1dataandcomputermisuserev2.shtml
  • 7. Copyright Law This provides protection to the owners of the copyright and covers the copying of written, musical, or film works using computers. FAST is the industry body which is against software theft. There have been cases where laws such as Copyright have been used to crack down on file sharing websites or individuals who store and illegally distribute copyrighted material, eg music. There is a massive problem with many people around the world obtaining copyrighted material illegally. Information taken directly from http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/1dataandcomputermisuserev2.shtml
  • 8. Developed by The Stonemasonry Department City of Glasgow College 2012