- accessing data/programs that you are unauthorised to
- access with an intent to commit or allow other people to commit further offences
- Unauthorised modification of computer material
Regulation of Investigatory powers act 2000 (RIPA)- This act prevent interception of public and private messages that are moving but it does allow governments to intercept message if they have the correct warrant.
Copyright designs an patents act 1988- this act protects creative media with copyright protection this then means that you can only copy or use copyright items with the owners permission and must acknowledge them.Design right then protect how something looks,patents protect how something works and what it does,trademarks protect the name or logo used by a business.
Health and safety regulations 1992- this makes employers look after there staff and provide the proper equipment to use a computer long term without getting injury
DRM-stands for digital rights management and they try to control and limit the use of digital media, limit when you can use digital media E.g. limit number of plays, limit only to play on a specific device , count number of install.Proprietary software comes with a license which covers who can use the stuff and how many copys they can make.
Code of conduct- this is not a law but varies company to company and is the rules on how employees can use their work computer.
Use of robotic- advantages: they are much more accurate and precise than humans,cant get bored,reduce the risk to human life and if made properly resistant to the elements.Disadvantage: they cant learn or cope well when they are outside their mission parameters,at the moment they cant make complicated decisions,they sometimes still need a human operator and are usaly built for very specific objectives.
The data protection act 1984 and 1998- there are 8 key point to compile with in this act
Saturday, 3 December 2011
3.2.7 Consequences of uses of Computers
The computer misuse act 1990- to protect against unauthorised use of computer systems (called hacking or cracking). There are three levels of severity:
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment