Saturday, 25 January 2014

IT law

Copyright:
The Copyright, Designs and Patents act (1988) protects the time, money and effort put into a original piece of work, they can protects artists, authors, photographers, creators of games, films and software.
They use it to ensure people are rewarded for their work and give protection to the copyright holder so nobody steals or copies their work. It also protects industries because if people just downloaded music then the music industry would lose money and fail. It is obtained when someone who creates a piece of work, it belongs to them and if someone copies or steals it they can sue that person by taking legal action. For images or paintings you have to get it copyrighted and if someone wants to use it they have to ask your permission. Some times it can be bad because people can get sued for using someone else's work and their business can go under, also some companies may complain and try to sue things they believed are copyrighted by aren't much like their ideas/work.

Data Protection:
The Data Protection Agency (1998) protects peoples personal data
Data collectors, the person who has to ask permission for taking data and they organize what data needs to be collected and what it is used for. They have to follow these eight principles of the Data Protection Agency when dealing with personal data: People have to know what data is being collected and they have to been asked if they company can take it, they have to know what their data is being collected for, and can only use it for that purpose, they can only take relevant information, the data should be accurate and up to date, it can't be held for longer than it is needed, people have the right to inspect the information a company has on them, the data can't be send to countries outside the EU and the data should be protected from hackers. It is used when somebody needs to takes somebody else's information such as medical information or contact information, companies, organisations or employers will need to know this information. It might be available for hackers to get it or people might misuse this information.


Computer misuse:
The computer misuse act (1990) is a legislation to help prosecute hackers
they have these offences: Unauthorized access to computer material, unauthorized access with intent to commit or facilitate a crime, unauthorized modification or computer material, making, supplying or obtaining anything which can be used in computer misuse offences. It helps prevent hacking and people stealing important information such as personal details and bank details. It also protects people from other people deleting important files that may be important to an organisation, it also prevents people making dangerous viruses or Trojans or computer systems. Some times it can be difficult to trace who is actually responsible for the offence, also if there was any intent for the offence, they can also say they weren't aware of what they were doing was illegal and also by the time the hacker is caught the damage to the system is done.