{"id":394,"date":"2018-01-22T14:37:25","date_gmt":"2018-01-22T14:37:25","guid":{"rendered":"http:\/\/learnlearn.uk\/gcsecs\/?page_id=394"},"modified":"2019-04-04T11:03:48","modified_gmt":"2019-04-04T11:03:48","slug":"computer-legislation","status":"publish","type":"page","link":"https:\/\/learnlearn.uk\/gcsecs\/computer-legislation\/","title":{"rendered":"Computer Legislation"},"content":{"rendered":"<div class=\"responsive-tabs\">\n<h2 class=\"tabtitle\">Introduction Video<\/h2>\n<div class=\"tabcontent\">\n\n<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/N1QUHzTs-cs\" width=\"800\" height=\"600\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n\n<\/div><h2 class=\"tabtitle\">DPA<\/h2>\n<div class=\"tabcontent\">\n\n<p><strong>Data Protection Act 1998<\/strong><\/p>\n<ul>\n<li>Controls the processing of personal data<\/li>\n<li>Protects the rights of data subjects<\/li>\n<li>Those organisations who break the rules may be liable to fines<\/li>\n<li>Some types of sensitive data is given extra protection (e.g. Medical information, sexual orientation, criminal history, ethnic background)<\/li>\n<\/ul>\n<p>Must make sure the information is:<\/p>\n<ul>\n<li>used fairly, lawfully and transparently<\/li>\n<li>used for specified, explicit purposes<\/li>\n<li>used in a way that is adequate, relevant and limited to only what is necessary<\/li>\n<li>accurate and, where necessary, kept up to date<\/li>\n<li>kept for no longer than is necessary<\/li>\n<li>handled in a way that ensures appropriate security, including protection against unlawful or unauthorised processing, access, loss, destruction or damage<\/li>\n<\/ul>\n\n<\/div><h2 class=\"tabtitle\">CMA<\/h2>\n<div class=\"tabcontent\">\n\n<p><strong>Computer Misuse Act 1990<\/strong><\/p>\n<p>Makes the unauthorized access to computer systems illegal. Covers blackmail, fraud, hacking, viruses, etc.<\/p>\n<p>4 levels of offence, with different punishment.<\/p>\n<ul>\n<li>Unauthorized access to computer material &#8211; up t 6 months in prison \/ \u00a35,000 fine<\/li>\n<li>Unauthorized access to computer material with intent to commit a further offence &#8211; 5 year prison sentence and unlimited fine.<\/li>\n<li>Unauthorized modification of data\u00a0 &#8211; 5 year sentence and unlimited fine<\/li>\n<li>Making, supplying or obtaining anything which can be used in computer misuse offences. &#8211;\u00a0 10 year prison sentence an unlimited fine<\/li>\n<\/ul>\n\n<\/div><h2 class=\"tabtitle\">CDPA<\/h2>\n<div class=\"tabcontent\">\n\n<p><strong>Copyright Design and Patents Act 1988<\/strong><\/p>\n<p>Illegal to copy, modify or distribute software , music, video or other intellectual property\u00a0 without permission from the author<\/p>\n<ul>\n<li>Designed to ensure that people are fairly rewarded for their artistic work<\/li>\n<li>Protects rights holders if their work is stolen.<\/li>\n<\/ul>\n\n<\/div><h2 class=\"tabtitle\">FoIA<\/h2>\n<div class=\"tabcontent\">\n\n<p><strong>Freedom of Information Act 2000<\/strong><\/p>\n<ul>\n<li>Provides public access to information held by public authorities<\/li>\n<li>Members of the public can request information held by public bodies and authorities have to publish the data within a specified deadline<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<\/div><\/div>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data Protection Act 1998 Controls the processing of personal data Protects the rights of data subjects Those organisations who break the rules may be liable to fines Some types of sensitive data is given extra protection (e.g. Medical information, sexual orientation, criminal history, ethnic background) Must make sure the information is: used fairly, lawfully and&hellip;&nbsp;<a href=\"https:\/\/learnlearn.uk\/gcsecs\/computer-legislation\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Computer Legislation<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":70,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Computer Legislation - GCSE Computer Science Theory<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/learnlearn.uk\/gcsecs\/computer-legislation\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Computer Legislation - GCSE Computer Science Theory\" \/>\n<meta property=\"og:description\" content=\"Data Protection Act 1998 Controls the processing of personal data Protects the rights of data subjects Those organisations who break the rules may be liable to fines Some types of sensitive data is given extra protection (e.g. Medical information, sexual orientation, criminal history, ethnic background) Must make sure the information is: used fairly, lawfully and&hellip;&nbsp;Read More &raquo;Computer Legislation\" \/>\n<meta property=\"og:url\" content=\"https:\/\/learnlearn.uk\/gcsecs\/computer-legislation\/\" \/>\n<meta property=\"og:site_name\" content=\"GCSE Computer Science Theory\" \/>\n<meta property=\"article:modified_time\" content=\"2019-04-04T11:03:48+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/computer-legislation\/\",\"url\":\"https:\/\/learnlearn.uk\/gcsecs\/computer-legislation\/\",\"name\":\"Computer Legislation - GCSE Computer Science Theory\",\"isPartOf\":{\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/#website\"},\"datePublished\":\"2018-01-22T14:37:25+00:00\",\"dateModified\":\"2019-04-04T11:03:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/computer-legislation\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/learnlearn.uk\/gcsecs\/computer-legislation\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/computer-legislation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"OCR GCSE Computer Science Home\",\"item\":\"https:\/\/learnlearn.uk\/gcsecs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Computer Legislation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/#website\",\"url\":\"https:\/\/learnlearn.uk\/gcsecs\/\",\"name\":\"GCSE Computer Science Theory\",\"description\":\"Just another My Blog site\",\"publisher\":{\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/learnlearn.uk\/gcsecs\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/#organization\",\"name\":\"GCSE Computer Science Theory\",\"url\":\"https:\/\/learnlearn.uk\/gcsecs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2019\/02\/LearnLearnLogowhite.png\",\"contentUrl\":\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2019\/02\/LearnLearnLogowhite.png\",\"width\":710,\"height\":98,\"caption\":\"GCSE Computer Science Theory\"},\"image\":{\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Computer Legislation - GCSE Computer Science Theory","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/learnlearn.uk\/gcsecs\/computer-legislation\/","og_locale":"en_GB","og_type":"article","og_title":"Computer Legislation - GCSE Computer Science Theory","og_description":"Data Protection Act 1998 Controls the processing of personal data Protects the rights of data subjects Those organisations who break the rules may be liable to fines Some types of sensitive data is given extra protection (e.g. Medical information, sexual orientation, criminal history, ethnic background) Must make sure the information is: used fairly, lawfully and&hellip;&nbsp;Read More &raquo;Computer Legislation","og_url":"https:\/\/learnlearn.uk\/gcsecs\/computer-legislation\/","og_site_name":"GCSE Computer Science Theory","article_modified_time":"2019-04-04T11:03:48+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/learnlearn.uk\/gcsecs\/computer-legislation\/","url":"https:\/\/learnlearn.uk\/gcsecs\/computer-legislation\/","name":"Computer Legislation - GCSE Computer Science Theory","isPartOf":{"@id":"https:\/\/learnlearn.uk\/gcsecs\/#website"},"datePublished":"2018-01-22T14:37:25+00:00","dateModified":"2019-04-04T11:03:48+00:00","breadcrumb":{"@id":"https:\/\/learnlearn.uk\/gcsecs\/computer-legislation\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/learnlearn.uk\/gcsecs\/computer-legislation\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/learnlearn.uk\/gcsecs\/computer-legislation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"OCR GCSE Computer Science Home","item":"https:\/\/learnlearn.uk\/gcsecs\/"},{"@type":"ListItem","position":2,"name":"Computer Legislation"}]},{"@type":"WebSite","@id":"https:\/\/learnlearn.uk\/gcsecs\/#website","url":"https:\/\/learnlearn.uk\/gcsecs\/","name":"GCSE Computer Science Theory","description":"Just another My Blog site","publisher":{"@id":"https:\/\/learnlearn.uk\/gcsecs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/learnlearn.uk\/gcsecs\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/learnlearn.uk\/gcsecs\/#organization","name":"GCSE Computer Science Theory","url":"https:\/\/learnlearn.uk\/gcsecs\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/learnlearn.uk\/gcsecs\/#\/schema\/logo\/image\/","url":"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2019\/02\/LearnLearnLogowhite.png","contentUrl":"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2019\/02\/LearnLearnLogowhite.png","width":710,"height":98,"caption":"GCSE Computer Science Theory"},"image":{"@id":"https:\/\/learnlearn.uk\/gcsecs\/#\/schema\/logo\/image\/"}}]}},"rttpg_featured_image_url":null,"rttpg_author":{"display_name":"learnlearnadmin","author_link":"https:\/\/learnlearn.uk\/gcsecs\/author\/learnlearnadmin\/"},"rttpg_comment":0,"rttpg_category":null,"rttpg_excerpt":"Data Protection Act 1998 Controls the processing of personal data Protects the rights of data subjects Those organisations who break the rules may be liable to fines Some types of sensitive data is given extra protection (e.g. Medical information, sexual orientation, criminal history, ethnic background) Must make sure the information is: used fairly, lawfully and&hellip;&nbsp;Read&hellip;","_links":{"self":[{"href":"https:\/\/learnlearn.uk\/gcsecs\/wp-json\/wp\/v2\/pages\/394"}],"collection":[{"href":"https:\/\/learnlearn.uk\/gcsecs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/learnlearn.uk\/gcsecs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/learnlearn.uk\/gcsecs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/learnlearn.uk\/gcsecs\/wp-json\/wp\/v2\/comments?post=394"}],"version-history":[{"count":4,"href":"https:\/\/learnlearn.uk\/gcsecs\/wp-json\/wp\/v2\/pages\/394\/revisions"}],"predecessor-version":[{"id":938,"href":"https:\/\/learnlearn.uk\/gcsecs\/wp-json\/wp\/v2\/pages\/394\/revisions\/938"}],"wp:attachment":[{"href":"https:\/\/learnlearn.uk\/gcsecs\/wp-json\/wp\/v2\/media?parent=394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}