Followers

Thursday 23 December 2010

Consequences Of Using Computers

Legal

The Computer Misuse Act (1990)
- There to protect against unauthorised use of computer systems
- Three Levels - 1. Unauthorised access to data and programs
                       - 2. Unauthorised access and committing further offenses
                       - 3. Unauthorised modification of computer material
- Unauthorised access can be known as cracking or hacking
- Maximum penalty is a fine or a prison sentence

Data Protection Act - Commissioned in 1984 and recommissioned in 1998
- 8 Principles - Data Gathering - Subject knows that data is being gathered
                     - Data Purpose - Obtained for one or more specific purposes
                     - Data Quantity - How much data is recorded
                     - Data Quality - Data should be accurate and up to date
                     - Data Lifetime - Data kept for a certain amount of time
                     - Subject's Rights - Only processed under consent of subject
                     - Internal Data Security - Appropriate technical measures to keep data safe
                     - External Data Security - Is it being moved between countries

Regulation of Investigatory Powers Act (2000) - Referred generally as RIPA
- Prevents the interception of public or private messages
- Security can intercept as long as they have a warrant
- Can be used to force ISPs to help them (Encryption Keys)
- Only applies when the message is being delivered
- In a mailbox it is then covered by the Data Protection Act

Copyright, Designs and Patents Act (1988)
- Protects materials - Music, Art and Films
                              - Only use copyright items with owners consent
                              - Design right protects how something looks
                              - Patents protect how an innovation works and what it does
                              - Trademarks protect the name or logo used by a business

Health and Safety Regulations (1992)
- Employers must look after staff who use computers for a long time
- Software designers must think about colour schemes and font types
- Designers should try to reduce the amount of typing and mouse clicks


Ethical and Social
Digital Rights Management (DRM)
- Application of controls which limit the use of digital media
- Used by copyright owners to limit when you can use digital media
- It can limit the number of plays, number of transfers etc.
- Proprietary Software - Comes with a license
                                   - Must not be changed, re-sold or passed on
                                   - Open Source - Free software with different controls
                                   - Can be modified, re-used
                                   - Cannot be sold thought to make money


Code Of Conduct
- A set of instruction for how you should behave at a computer.
- Not a law - but each company has disiplinary actions
- May cover items such as - Not using other people's accounts
                                         - Not interfering with other people's work
                                         - Not to download software or install software
                                         - Not looking at personal information - e-mail, socialising
                                         - Not to use them for copying material

1 comment: