Preview

Review the Laws Related to Security and Privacy of Data

Good Essays
Open Document
Open Document
1633 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Review the Laws Related to Security and Privacy of Data
ss | | | | | | | |

Review the laws related to security and privacy of data
In this document I will be discussing the laws that are related to security and privacy of datas, I will explain how they relate to the security and privacy of data.
Computer Misuse Act 1990
This act was introduced to prevent users hacking. This also stops them entering a computer, programs or files without authorisation, this act is in place to prevent users to use the internet without permission to cause an act of crime and also prevents unauthorised modifications to a computer. This act does not allow any attacks on a server as this is illegal.
Hacking into a computer is not allowed as it can disrupt the business as personal information can be stolen and also be used in crime, this can cause a problem in the businesses finance sector.
Anyone who knowingly hacks into a computer with intent to steal information is going against this act. Anyone who misuses the computer in this way is going against the law as they are using it for criminal acts.
This act also does not allow anyone to use a fraudulent credit card or any other card to make a purchase via the internet. Hackers who overload networks with data to intently disable them can face a prison sentence for up to 10 years.
This act makes it illegal for users to upload pornography of someone and children as people will find the offensive, having possession or viewing these types of materials could get the user in to trouble by the law. Users must not use the computer to harass or stalk a particular person, it is also the same when making telephone conversations as the user can not use offensive or threatening language they can face a sixth month imprisonment.
This allows the organisation to take action and take back whats rightfully there and also punish the hacker as they are covered by this law, this bring a sense of security as this law would put the hackers from obtaining information wrongly.
Copyright Designs and

You May Also Find These Documents Helpful

  • Satisfactory Essays

    * The hackers can gain access to a company’s payment processing network. The attackers then installed malicious code designed to gather sensitive information from the network, which allowed them to easily access the network at their convenience.…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    In addition, organizations constantly face legal, ethical, and regulatory requirements from governments, business partners, and others they work with. These will add additional factors when weighing the costs and benefits of different solutions to information security risks. In fact, these requirements may even make some risks more important, often because a company will not want to get in trouble with a government even though they might normally live with the risk they are being forced to resolve through regulations. Understanding the various laws that will affect data is of prime importance to any security…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking – it is the act of bypassing ones account or database and hacking involves stealing of identity and use it in his/her own interest.…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Some legislation relates to security and confidentiality, for example: • • The Data Protection Act 1998 ensures that all employers who process data on individuals are listed in the register of data controllers The Copyright, Designs and Patents Act 1988 protects the rights of people who create original works.…

    • 564 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Unit 13 P4

    • 979 Words
    • 4 Pages

    This act was passed in 1990 and made three offences in relation to hacking. An offence under the computer misuse act would be to access someone else’s computer without any permission or authorisation (for example, looking through someone’s private files without them giving you permission). Another offence under the act was being able to access someone’s computer with the intent of causing another crime on top of that. An example of this would be to hack into someone’s banking account and transferring their money over to yourself, hacking without permission was the initial crime and theft of their money is the intended crime. The last offence to be added to the Computer Misuse Act was to edit the computer in any way. For example, you hack into a computer and leave a virus that will in time destroy the computer. McLinsoft computing staff must know that they cannot commit any of these actions. Doing so can lead to a prison sentence of up to 12 months (or 6 months in Scotland) [3]. Examples of computer misuse in the workplace can be obtaining colleague’s log-on details and accessing their private data, releasing a virus throughout the company network, or even hacking into other company networks and obtaining any…

    • 979 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Unit 4222 - 307

    • 395 Words
    • 2 Pages

    7. Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.…

    • 395 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Data protection is a very important piece of legislation that was brought into power in 1998, because it has been designed to prevent confidential and personal information being passed on to other people and any relevant companies without a person’s consent. This also means that any information that is stored of children should be kept in either a password protected or lockable location.…

    • 478 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Since this law basically means ensures that you that the information is used fairly and lawfully, this means that you must delete the details of the customers once you do not need it anymore. The Data Protection Act has even stronger security precautions that they have to take into action when information such as ethnic background, religious…

    • 1327 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Diploma Level 3 Hsc 38

    • 299 Words
    • 2 Pages

    Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental lost or destruction of, or damage to personal data.…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    one of the most important and common one is the Data Protection Act 1998 – this law states each individuals personal details are to be kept securely locked away, this law also protects the services users freedom rights, the DPA advise that all service users have a right to privacy and everyone else would need to seek services’ permission to obtain personal records…

    • 762 Words
    • 4 Pages
    Good Essays
  • Better Essays

    unit 11 p4/p5

    • 1905 Words
    • 7 Pages

    The Health and Safety at Work act is about stopping people getting hurt or injured or ill through the work that they do. HASAWA also states that the employer is responsible for the health and safety of all their employees.…

    • 1905 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Hacking is commonly used to refer to forms of trespass against a computer belonging to someone else. As per Infosec, a website devoted to information security – "Hacking means illegally accessing other people's computer systems for destroying, disrupting or carrying out illegal activities on the network or computer systems". Digitalguards defines it as, "Unauthorized use, or attempts to circumvent or bypass the security mechanisms of an information system or network".…

    • 2842 Words
    • 12 Pages
    Powerful Essays
  • Better Essays

    This could not be farther from the truth. Sure, the act of remotely accessing someone’s computer to steal their private files would be hacking. Note the words “Steal their private files”. What if that condition was removed? Or what if you are simply accessing your own computer or that of a friend’s to help him or help out?…

    • 3042 Words
    • 13 Pages
    Better Essays
  • Good Essays

    Ethical Hacking

    • 1018 Words
    • 5 Pages

    In order to discuss the ethical, legal, and social implications of this issue, one has to understand the definition of Ethical Hacking. The Word Spy states that "Ethical hacking is a computer hacker who attempts to infiltrate a secure computer system in an effort to learn the system 's weaknesses so that they can be repaired" (The Word Spy, 2003). The question arises here is whether Ethical Hacking is ethical or unethical.…

    • 1018 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Anti Cyber Crime Law

    • 382 Words
    • 2 Pages

    Lastly, with or without Republic Act No. 10175, this is definitely a crime. You don’t have the right to hack into anything. It’s like you’re going into a house in the middle of the night and trying not to wake up the dogs.…

    • 382 Words
    • 2 Pages
    Good Essays