Tuesday, May 21, 2019
Review the Laws Related to Security and Privacy of Data Essay
Com readyer Mis determination Act 1990This act was introduced to prevent users hacking. This likewise stops them ledger entry a computer, programs or files without authorisation, this act is in place to prevent users to use the internet without permission to cause an act of crime and also prevents unauthorised modifications to a computer. This act does not allow any attacks on a server as this is under-the-counter. Hacking into a computer is not allowed as it can disrupt the teleph one and only(a) circuit as personal information can be stolen and also be used in crime, this can cause a problem in the businesses finance sector.Anyone who knowingly hacks into a computer with intent to distract information is going against this act. Anyone who misuses the computer in this way is going against the law as they are employ it for criminal acts. This act also does not allow anyone to use a fraudulent credit card or any opposite card to shamble a purchase via the internet. Hackers wh o overload networks with data to intently disable them can face a prison sentence for up to 10 years.This act makes it illegal for users to upload pornography of mostone and children as people forget find the offensive, having possession or viewing these types of cloths could get the user in to trouble by the law. Users must not use the computer to harass or stalk a particular person, it is also the same when making telephone conversations as the user can not use offensive or threatening language they can face a sixth month imprisonment.This allows the organisation to take go through and take top whats rightfully on that point and also punish the hacker as they are covered by this law, this bring a sense of auspices as this law ould put the hackers from obtaining information wrongly. Copyright Designs and Patents Act 1988 This is the current UK re-createright law which has been created since 1988, it get tos artist and creators of, musical and dramatic or any other artist h ave the right to restrainer their work, this allows them to have control over how their material is used, this right covers broadcast and public performance, copying, adapting, issuing, renting and lending copies to the public.It is not what has been created its the details within what has been created to be protected, for example if you have a idea for a book that would not be protected however the information and guinea pig within the book that is written ordain be protected. So someone else can write a book around your idea but they cannot copy your book or adapt your book to do so. This helps to protect security and privacy of data as it protects the effort money and time someone has put in to create their marrow, if this content is being copied the organisation give lose potential customers as someone is using their content to sell another harvest-home. hiding and compensation requirements of Data Protection Act 1984 1998 2000 This legislation first was written in 1984 th ere are updated version of this data protection act and the one that is used and most updated is the 2000 version, the 1998 version was a broadened and replaced the data protection act 1984, the main purpose for this law is that it gives rights and privacy of individuals, this ensure that their data is not processed without the creators knowledge and is only process with the consent of the artist. This act covers personal data relating to living individuals and protects sensitive personal data of that individual.This act covers data held in electronic formats. This has been changed as over time new technology and items are able to store data this is now updated so that it can cover these items as they leave contain sensitive and personal data to an individual. The 2000 version of this act contains added laws and have been updated. This protects the security of the individual as no one should be allowed to take snobby and sensitive data without the individual being aware of this. Copyrights This exclusive legal right that is given to the original artist to print, perform film, publish or destroy literary and authorize others to do so for heir material.This protects a physical expression of ideas , for example someone has an idea to write a book the content that is written in that book is covered by the copyright act as it will be unique to the creator. You do not involve to immortalize or claim copyright, this protection is automatic as soon as it is created. If someone steals information or wrongly sells other work or mental institution for their own financial benefit then this copy right act will protect the original creator and he can claim back the money that has been gained by the person who has taken the material without permission.This protects security and the use of private data as it does not allow anyone to take data or material without the author permission, if this does happen the user who has taken this material can be fined and prosecuted as the products does not belong to them, the author can also dissolve how his material has been used and if someone breaks his restriction they can also be prosecuted.Open SourceThis is software or material that is available with the source, this allows users to copy the material and modify the material, the reason for this is because the creators would believe that if someone can edit the material for themselves it will be more useful to another persona and will also allow less problems to occur if the source is available, so organisation believe that it should not be given and source should not be shown, they usually give the compiled version this is so others cannot copy their material and modify this.Open source means that it is available to any one and they can modify it however they want, doing this will improve the security for a material such as software as this source code has been given to the users it will be less belike that someone would want to hack it and modify the code as it is already available. This does have some restrictions as it would like to preserve the name and authors of the material.FreewareThis is software that is offered expel of charge and is downloadable off the internet, unthawware is different to shareware as shareware would require payment. Even though allowware is available it does have a license this would have restriction as some freeware would not want the user to alter the program, repackage it or sell the freeware, redistribution is allowed of freeware but cannot be distributed for money purposes. The creators want to ive something to the community but want to retain control of any future development of the software, this allows users to have the material without making changes and is free to the users, this makes there coding private and cannot be used however as it is free hackers would not bother to steal or resell this type of material as anyone can get it online for free, this makes the software more secure as there is no risk as it does not hold any value.SharewareThis usually is software that is distributed, this allows users to use the product and then pay for the product after the running play version has finished, you can then only continue to use the full version if you feel like the product is good to use but will have to pay to get the full version, the user will then be covered for registration and then support for the software if they purchase, once purchased surplus features are usually given as only who pay can have these.This is been protected under copyright, even though you are able to use this software without payment you are still restricted to what you are allowed to do with it which is selling this software or adding it to another. This allows users to use expensive and powerful software for free and a short period of time however will later need to pay as the trial reaches to its end. This relates to security and privacy as the creators do not mind users having a fu ll version for a short period as they may see as an advantage to sell their product later, copyright protects shareware as users cannot manipulate or sell their product.Commercial Software This is a software that is designed for sale to meet a commercial need for a user, this type of software is only allowed to be used for commercial purposes, this is software that you would usually see in the retailers in a physical corner and requires payment before it can be used, commercial software usually contain a registration key and when you purchase this you will acquire a licence to use it. You are still able to download commercial software and this can be often seen in sharewares.These are usually do available directly from the organisation website. This relates to security and privacy of data as the user has to purchase the software before they can use it as they will not receive a registration key not allowing them to use the software, this does make it a security risk as hackers wil l try to steal a registration key but the copyright act protects the organisation and can prosecute the hacker for stealing data from the organisation.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.