We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Data Protection Act and Computer Misuse Act

essay
The whole doc is available only for registered users

A limited time offer! Get a custom sample essay written according to your requirements urgent 3h delivery guaranteed

Order Now

Personal data must be:
1.Processed fairly and lawfully.
2.Processed only for one or more specified and lawful purpose. 3.Adequate, relevant and not excessive for those purposes.
4.Accurate and kept up to date – data subjects have the right to have inaccurate personal data corrected or destroyed if the personal information is inaccurate to any matter of fact. 5.Kept for no longer than is necessary for the purposes it is being processed. 6.Processed in line with the rights of individuals – this includes the right to be informed of all the information held about them, to prevent processing of their personal information for marketing purposes, and to compensation if they can prove they have been damaged by a data controller’s non-compliance with the Act. 7.Secured against accidental loss, destruction or damage and against unauthorised or unlawful processing – this applies to you even if your business uses a third party to process personal information on your behalf. 8.Not transferred to countries outside the European Economic Area – the EU plus Norway, Iceland and Liechtenstein – that does not have adequate protection for individuals’ personal information, unless a condition from Schedule four of the Act can be met.

Within the Data Protection Act, the people data about are called data subjects. -Data subjects have a number of rights. These include the right to: oSee data held on them on request.
oAlter inaccurate or incorrect data.
oSue if data is wrong and the mistake causes harm to them.
oData is collected by data controllers. A person called the data commissioner exists to help make sure the Act is followed. oData is collected by data collectors

Computer Misuse Act
Aimed at reducing hacking and the threat from viruses, there are 3 main offences covered by the Act: Unauthorised access to computer material (hacking). This includes copying software illegally (called software piracy). Gaining unauthorised access to a computer to carry out serious crimes like fraud or blackmail. Unauthorised changing of computer files, including planting viruses and deleting files. Conviction for any of the above can lead to an unlimited fine or five years in prison. This is why organisations e.g. The News of the World were disbanded for hacking.

Related Topics

We can write a custom essay

According to Your Specific Requirements

Order an essay
icon
300+
Materials Daily
icon
100,000+ Subjects
2000+ Topics
icon
Free Plagiarism
Checker
icon
All Materials
are Cataloged Well

Sorry, but copying text is forbidden on this website. If you need this or any other sample, we can send it to you via email.

By clicking "SEND", you agree to our terms of service and privacy policy. We'll occasionally send you account related and promo emails.
Sorry, but only registered users have full access

How about getting this access
immediately?

Your Answer Is Very Helpful For Us
Thank You A Lot!

logo

Emma Taylor

online

Hi there!
Would you like to get such a paper?
How about getting a customized one?

Can't find What you were Looking for?

Get access to our huge, continuously updated knowledge base

The next update will be in:
14 : 59 : 59