The Data Protection Act 1998
The Data Protection Act 1998 : Applies to data on paper and in computers, applies to personal data.
The Computer Misuse Act 1990
The computer misuse act 1990 : Concerns malicious use of computers (hacking etc.)
Outlines 3 primary offences:
1. Unauthorized access to computer materials.
2. Unauthorized access with intent to commit further offences.
3. Unauthorized modification of computer material.
The copyright designs and patents act 1988
The copyright designs and patents act 1988 :
- Gives the author ownership/copyright of personal intellectual property
- Automatically applies to original work
- Others cannot use or distribute without permission
- Permission can be granted / bought / licensed
Creative commons licence is where you give permission for everyone to use as they please (Copyright free)
The regulation of investigatory powers act 1990
The regulation of investigatory powers act 1990 : Regulates and limits how public bodies can conduct technological surveillance…
- This can include monitoring internet activity
- And Electronic communications
Advantages :
- Can help detect terrorism - public safer
- In technological world security services need power to stop crime before it happens.
Disadvantages:
- Enforces ISP’s and Companies to give up customer communications when requested - have to have back-doors to allow.
- Powers extend to small agencies like local council - may be used improperly for minor offences .
- Hard to enforce e.g. End to End encryption
- privacy infringement