Legislation Acts for ICT
ICT equipment now have laws which everyone must abide by, they can
still use their ICT to their every needs but they cannot exploit this
use by accessing areas of information or data which are not meant to
be seen by the public eye. This mainly includes things like government
data and other people’s personal information.
The 1998 Data Protection Act
The data protection act is basically the “right to privacy” .This is
what everyone who has personal details and so forth on their pc
expects since you don’t want other people accessing your information.
The data protection act was made a law in 1984 but it was replaced by
a new one, the act in 1998 that included the European Union law.
There are 8 principles for personal data:
1. Be processed fairly and lawfully
2. Be obtained for specified and lawful purposes
3. Be adequate relevant and not excessive for the purpose
4. Be accurate and up-to-date
5. Not to be kept longer than necessary
6. Be processed within the rights of data subjects
7. Be kept secure against loss damage and unauthorised and unlawful
processing
8. Not be transferred to countries outside the European Economic Area.
These are the 8 areas in which the data protection act is in control
of. Say for example I had bank account details on my pc and I was
exchanging bank details over the internet no one beside me should be
able to access that data since it is my personal bank account, but if
someone managed to access that data and changed anything under my
personal account they would be breaking the law of data protection.
This law can also be broken if someone sent on my personal data to
another source without consulting me or asking for my permission for
it to be sent on it would be breaking the law of data protection.
1984, some did not, but today in United States there is an issue of privacy similar to the
Data Protection Act 1998: This is there to control and looks after your personal information. Everyone who uses and is able to access your personal information, there are ru...
The Data Protection Act 1998 places controls on the length of time, who has access, and how much personal information can be stored on an individual by organisations, businesses and the Government. Any private information must be kept secure in compliance with the law. This ensures the individual’s right to privacy and confidentiality is upheld. (Gov.uk.
The Data Protection Act controls how your personal information is used by organisations, businesses or the government.
Computer misuse Act It is an act of the parliament of the UK redacted in 1990 as a measure to cope to the new technological threats. Old traditional forms of crime such as harassment and fraud offences are being committed electronically via computers or internet nowadays. Lately are appearing new forms of e-crime using new technologies such as Denial of Service ( DOS ) attack and phishing by offenders with good technical knowledge in IT.Thus laws in our society needs to be updated to deal to the new forms of crime. Computer misuse Act has been enacted after some cyber attacks, for instance the hacking attack against British Telecom commited by Robert Schifreen and Stephen Gold, between 1984 and 1985, using conventional devices such as a
to be processed. If you carry out a survey to count the number of cars
Information Commissioner’s Office (2014) Data protection registration – self assessment. [online] Available at ; http://ico.org.uk/for_organisations/data_protection/registration/self-assessment/1 [Accessed 20-04-14].
“The CAN-SPAM Act, a law that sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have you stop emailing them, and spells out tough penalties for violations” (Fingerman, 2004).
The Stop Online Piracy Act was proposed in January of 2012. SOPA was a legislative act that attempted to prevent piracy through DNS blocking and censorship. The legislation caused the protest and blackout of multiple online internet services including Reddit, 4Chan, Google, Wikipedia, Mozilla, and Tumblr. Now, internet users are faced with another possible challenge called the Cyber Intelligence Sharing and Protection Act, or CISPA. CISPA was quickly passed by the House of Representatives on April 26th, 2012, and is now being processed through the Senate (Beadon). CISPA's purpose is to promote national cybersecurity through allowing private companies and the federal government to exchange users' private information, including emails and text messages, with complete legal immunity and one hundred percent anonymity. To some, CISPA appears as SOPA 2.0, another attempt to further limit American rights and privacy. Meanwhile, to others, CISPA appears as a milestone that needs to be reached in order to advance technologically and improve the nation's security. CISPA's purpose appears noble, but the current version of the legislation at least requires a revision due to its privacy invading policies, vague terminology, possible restrictions of internet freedom, and violation of the Fourth Amendment.
The internet has been one of the most influential technological advancements of the twenty-first century. It is in millions of homes, schools, and workplaces. The internet offers not only a way of communicating with people around the world, but also a link to information, shopping, chatting, searching, and maps. This freedom to be anyone and to "go" anywhere right from the comfort of home has become a cherished item. However, there is always a down side to every up. Because of the freedom to post anything and access anything on the internet, the issue of regulation has arisen; for example, what should and should not be allowed on the internet? Who has the right to regulate this space that we cherish for its freedom?
Internet regulation is basically restricting or controlling access to certain aspects or information. Internet regulation consists of mainly two categories: Censorship of data, and controlling aspects of the Internet.
The right to privacy is our right to keep a domain around us, which includes all those things that are apart of us, such as our body, home, property, thoughts, feelings, secrets and identity. The right to privacy gives us the ability to choose which parts in this domain can be accessed by others, and to control the extent, manner and timing of the use of those parts we choose to disclose (Privacy Concerns 1). “Everyone has the right for his private and family life, his home and his correspondence. There shall be no interference by a public authority with the exercise of this right…” (Privacy concerns 2). In 1998, the Human Rights Act, the act sets out the fundamental rights and freedoms that individuals have, came into force; it incorporated the European Convention on Human Rights, Article 8 which protects the right to private and family life. Was the first time there was a generalized right to privacy recognized by law in this country.
The Health and Safety Act of 1974 was set up as a means to protect
Data Protection is to do with you fundimental right to privacy, you may access and correct data that is about yourself. Anyone who keeps data about you has to comply with the data protection principles, there are 8 of these principles, and they are, 1. Fair obtaining, 2. Purpose specification, 3. Use and disclosure of information, 4. Security, 5. Accurate and up-to-date, 6. Adequate, relevant and not excessive, 7. Retention time, 8. Right of access. The following report is on an individuals rights and on an organisations responsibilities. It will guide you on how the rights and principles apply in different situations, like the use of CCTV or in the workplace.
Duquenoy, P., Jones, S., & Blundell, B. (2008). Ethical, legal and professional issues in computing. London: Thomson.