Saturday, April 6, 2019

Review the Laws Related to Security and Privacy of Data Essay Example for Free

Review the Laws Related to Security and Privacy of entropy EssayComputer Mis drop Act 1990This put to work was introduced to prevent officers hacking. This also stops them entering a computer, programs or files without authorisation, this prompt is in place to prevent users to use the internet without permission to relieve oneself an act of crime and also prevents unauthorised modifications to a computer. This act does non relinquish both attacks on a server as this is illegal. Hacking into a computer is not allowed as it kindle disrupt the business as personal teaching can be stolen and also be used in crime, this can cause a problem in the businesses finance sector. Anyone who knowingly hacks into a computer with intent to steal information is going against this act. Anyone who misuses the computer in this way is going against the law as they argon using it for iniquitous acts. This act also does not allow anyone to use a fraudulent cr put card or any other card to m ake a purchase via the internet. Hackers who overload networks with information to intently change them can face a prison sentence for up to 10 years.This act makes it illegal for users to transfer pornography of someone and children as people departing find the offensive, having possession or viewing these emblems of substantives could take up the user in to trouble by the law. Users must not use the computer to harass or stalk a particular person, it is also the same when making telephone conversations as the user can not use offensive or threatening language they can face a sixth month imprisonment.This allows the organisation to take action and take back whats unspoiledfully there and also vindicate the hacker as they are covered by this law, this bring a sense of security as this law ould put the hackers from obtaining information incorrectly. Copyright Designs and Patents Act 1988 This is the current UK copyright law which has been created since 1988, it gives arti st and creators of, musical and dramatic or any other artist occupy the right to adjudge their work, this allows them to have control over how their stuff and nonsense is used, this right covers broadcast and public performance, copying, adapting, issuing, renting and lending copies to the public.It is not what has been created its the exposit within what has been created to be protected, for example if you have a melodic theme for a obligate that would not be protected however the information and content within the book that is written will be protected. So someone else can write a book around your idea but they cannot copy your book or adapt your book to do so. This helps to protect security and privacy of entropy as it protects the elbow grease bullion and time someone has put in to create their content, if this content is being copied the organisation will lose potential customers as someone is using their content to move another product.Privacy and remuneration requ irements of Data Protection Act 1984 1998 2000 This legislation first was written in 1984 there are updated var. of this data tribute act and the one that is used and most updated is the 2000 version, the 1998 version was a broadened and replaced the data protection act 1984, the main purpose for this law is that it gives rights and privacy of individuals, this ensure that their data is not processed without the creators experience and is only process with the consent of the artist. This act covers personal data relating to living individuals and protects sensitive personal data of that individual.This act covers data held in electronic formats. This has been changed as over time new technology and items are able to store data this is now updated so that it can cover these items as they will suppress sensitive and personal data to an individual. The 2000 version of this act contains added laws and have been updated. This protects the security of the individual as no one should b e allowed to take private and sensitive data without the individual being aware of this. Copyrights This sole(a) legal right that is tending(p) to the original artist to print, perform film, publish or record literary and authorize others to do so for heir material.This protects a physical expression of ideas , for example someone has an idea to write a book the content that is written in that book is covered by the copyright act as it will be unique to the creator. You do not need to register or claim copyright, this protection is automatic as soon as it is created. If someone steals information or wrongly sells other work or creation for their own financial benefit thusly this copy right act will protect the original creator and he can claim back the money that has been gained by the person who has taken the material without permission.This protects security and the use of private data as it does not allow anyone to take data or material without the author permission, if this d oes happen the user who has taken this material can be fined and prosecuted as the products does not belong to them, the author can also decide how his material has been used and if someone breaks his restriction they can also be prosecuted. absolved SourceThis is software system or material that is available with the origination, this allows users to copy the material and modify the material, the reason for this is because the creators would believe that if someone can edit the material for themselves it will be more useful to another persona and will also allow less problems to occur if the source is available, so organisation believe that it should not be given and source should not be shown, they usually give the compiled version this is so others cannot copy their material and modify this.Open source means that it is available to any one and they can modify it however they want, doing this will modify the security for a material such as software as this source code has been given to the users it will be less likely that someone would want to hack it and modify the code as it is already available. This does have some restrictions as it would like to preserve the name and authors of the material.FreewareThis is software that is offered free of sharpen and is downloadable off the internet, freeware is different to shareware as shareware would require wearment. Even though freeware is available it does have a attest this would have restriction as some freeware would not want the user to alter the program, repackage it or sell the freeware, redistribution is allowed of freeware but cannot be distributed for money purposes. The creators want to ive something to the community but want to retain control of any future development of the software, this allows users to have the material without making changes and is free to the users, this makes there coding private and cannot be used however as it is free hackers would not bother to steal or resell this type of material as anyone can get it online for free, this makes the software more secure as there is no hazard as it does not hold any value.SharewareThis usually is software that is distributed, this allows users to use the product and consequently pay for the product after the trial version has finished, you can then only continue to use the full version if you feel like the product is good to use but will have to pay to get the full version, the user will then be covered for registration and then support for the software if they purchase, once purchased additional features are usually given as only who pay can have these.This is been protected under copyright, even though you are able to use this software without payment you are still restricted to what you are allowed to do with it which is selling this software or adding it to another. This allows users to use expensive and powerful software for free and a short period of time however will later need to pay as the trial reaches to its end. This relates to security and privacy as the creators do not mind users having a full version for a short period as they may fascinate as an advantage to sell their product later, copyright protects shareware as users cannot manipulate or sell their product. commercial message Software This is a software that is designed for sale to meet a commercial need for a user, this type of software is only allowed to be used for commercial purposes, this is software that you would usually see in the retailers in a physical box and requires payment before it can be used, commercial software usually contain a registration key and when you purchase this you will acquire a pass to use it. You are still able to download commercial software and this can be much seen in sharewares.These are usually made available directly from the organisation website. This relates to security and privacy of data as the user has to purchase the software before they can use it as they will not receive a registration key not allowing them to use the software, this does make it a security risk as hackers will try to steal a registration key but the copyright act protects the organisation and can prosecute the hacker for stealing data from the organisation.

No comments:

Post a Comment