Data Protection Act and Computer Misuse Act
- Pages: 2
- Word count: 361
- Category: Computers Protection
A limited time offer! Get a custom sample essay written according to your requirements urgent 3h delivery guaranteed
Order NowPersonal data must be:
1.Processed fairly and lawfully.
2.Processed only for one or more specified and lawful purpose. 3.Adequate, relevant and not excessive for those purposes.
4.Accurate and kept up to date – data subjects have the right to have inaccurate personal data corrected or destroyed if the personal information is inaccurate to any matter of fact. 5.Kept for no longer than is necessary for the purposes it is being processed. 6.Processed in line with the rights of individuals – this includes the right to be informed of all the information held about them, to prevent processing of their personal information for marketing purposes, and to compensation if they can prove they have been damaged by a data controller’s non-compliance with the Act. 7.Secured against accidental loss, destruction or damage and against unauthorised or unlawful processing – this applies to you even if your business uses a third party to process personal information on your behalf. 8.Not transferred to countries outside the European Economic Area – the EU plus Norway, Iceland and Liechtenstein – that does not have adequate protection for individuals’ personal information, unless a condition from Schedule four of the Act can be met.
Within the Data Protection Act, the people data about are called data subjects. -Data subjects have a number of rights. These include the right to: oSee data held on them on request.
oAlter inaccurate or incorrect data.
oSue if data is wrong and the mistake causes harm to them.
oData is collected by data controllers. A person called the data commissioner exists to help make sure the Act is followed. oData is collected by data collectors
Computer Misuse Act
Aimed at reducing hacking and the threat from viruses, there are 3 main offences covered by the Act: Unauthorised access to computer material (hacking). This includes copying software illegally (called software piracy). Gaining unauthorised access to a computer to carry out serious crimes like fraud or blackmail. Unauthorised changing of computer files, including planting viruses and deleting files. Conviction for any of the above can lead to an unlimited fine or five years in prison. This is why organisations e.g. The News of the World were disbanded for hacking.