We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Data Protection Act and Computer Misuse Act Essay Sample

essay
  • Pages: 2
  • Word count: 379
  • Rewriting Possibility: 99% (excellent)
  • Category: computer protection

Get Full Essay

Get access to this section to get all help you need with your essay and educational issues.

Get Access

Introduction of TOPIC

Personal data must be:
1.Processed fairly and lawfully.
2.Processed only for one or more specified and lawful purpose. 3.Adequate, relevant and not excessive for those purposes.
4.Accurate and kept up to date – data subjects have the right to have inaccurate personal data corrected or destroyed if the personal information is inaccurate to any matter of fact. 5.Kept for no longer than is necessary for the purposes it is being processed. 6.Processed in line with the rights of individuals – this includes the right to be informed of all the information held about them, to prevent processing of their personal information for marketing purposes, and to compensation if they can prove they have been damaged by a data controller’s non-compliance with the Act. 7.Secured against accidental loss, destruction or damage an

d against unauthorised or unlawful processing – this applies to you even if your business uses

Sorry, but full essay samples are available only for registered users

Choose a Membership Plan
a third party to process personal information on your behalf. 8.Not transferred to countries outside the European Economic Area – the EU plus Norway, Iceland and Liechtenstein – that does not have adequate protection for individuals’ personal information, unless a condition from Schedule four of the Act can be met.

Within the Data Protection Act, the people data about are called data subjects. -Data subjects have a number of rights. These include the right to: oSee data held on them on request.
oAlter inaccurate or incorrect data.
oSue if data is wrong and the mistake causes harm to them.
oData is collected by data controllers. A person called the data commissioner exists to help make sure the Act is followed. oData is collected by data collectors

Computer Misuse Act
Aimed at reducing hacking and the threat from viruses, there are 3 main offences covered by the Act: Unauthorised access to computer material (hacking). This includes copying software illegally (called software piracy). Gaining unauthorised access to a computer to carry out serious crimes like fraud or blackmail. Unauthorised changing of computer files, including planting viruses and deleting files. Conviction for any of the above can lead to an unlimited fine or five years in prison. This is why organisations e.g. The News of the World were disbanded for hacking.

We can write a custom essay on

Data Protection Act and Computer Misuse Act Essay ...
According to Your Specific Requirements.

Order an essay

You May Also Find These Documents Helpful

Computer software programs

To know about the connection of these topics it is must to know about the link between these phrases as well as the basic concept of these two. Firstly, to know what is computer software and wireless Information systems and then secondly to discuss about their affects upon each other. Computer software is basically some programs or events that are written just to achieve certain functions by the software engineers. Events are the set of steps that is written and combined to make a program. Now there arises a question that what is a program then the answer of this question is that: Programs are basically a set of rules and instructions on the basis of which a computer act to achieve certain functions. To perform specific set of actions on computers intelligently or normally is the basic need to write a program. Wireless Information systems are basically the systems...

The Turing Test Review

The Turing Test (TT) is used to test whether computers have mentality. The set up of the test is as follows: there are 3 subjects involved. All three subjects are accessible to each other via a chat program and nothing else. The first subject is a real person, a human being. The second subject is a computer. The third subject is an interrogator whose job it is to determine which of the other two subjects is a human and which a machine. A computer has mentality if it is able to ‘trick’ the third subject into thinking that it is a human. The idea here is that to pass the TT, the computer just has to fool the person at the other end of the conversation that it is human. The TT can be interpreted in two distinct ways: (1) that it is a necessary condition for mentality; or (2)...

Chic Paints Ltd Essay Sample

1 Chic Paints Limited (CPL) are a large manufacturing company who specialise in producing niche specialist paints such as those used on boats, cars and industrial machinery. As a result of a management buyout from Ashstead Plc 6 years ago, CPL was bought by 5 of Ashstead’s directors who had previously formed the board on Chic Paints when it was a subsidiary of Ashstead Plc. CPL aims to manufacture paints and allied products that are expertly formulated to meet the highest international standards, using the best available technology for end user consumers. 4.2 Chic Paints is a private limited company with both the accounts department and the company as whole, having a relatively tall organisation structure. Since the formation of CPL 6 years ago, company has steadily reduced its turnover from £200 million to £120 million however has improved its gross profit margin from around 12% in 2007 to around...

Popular Essays

logo

Emma Taylor

online

Hi there!
Would you like to get such a paper?
How about getting a customized one?