Computing Related Legislation

  • Computing related legislation governs how IT and computer systems are utilised and accessed, covering ethical and legal grounds to ensure the rights of individuals and businesses are protected.

  • The Data Protection Act (2018) offers provisions for the handling of personal data. It contains eight principles: information must be processed fairly, lawfully, and transparently, collected for specified purposes, limited to what’s necessary, accurate and up to date, retained no longer than necessary, processed securely, with the accountability of the data controller.

  • The Computer Misuse Act (1990) makes illegal activities like unauthorised access to computer systems and malicious software distribution; it provides for three categories of offences, including unauthorised access, unauthorised access with further criminal intent, and unauthorised modification of data.

  • The Copyright, Designs and Patents Act (1988) gives protection to creators of original work from being used without their permission, including software, music, and literature. This also covers the unauthorised use of IT to copy and distribute copyrighted works.

  • Under the Freedom of Information Act (2000), the public has the right to access information held by public authorities, promoting transparency. Exceptions include information that is intended for future publication or that involves national security.

  • The Regulation of Investigatory Powers Act (2000) regulates the power of public bodies to carry out surveillance and investigation, which includes the interception of electronic communications. It ensures such interventions can only occur when it is necessary and proportionate to do so.

  • The Telecommunications Act (1984) is concerned with use and misuse of telecommunications systems. This could include internet misuse in work environments and serious fraudulent activities undertaken over telecom systems.

  • The General Data Protection Regulation (GDPR) (2018) gives individuals more control over their personal data, and ensures that organisations handle data securely leading to stricter penalties for data breaches.

  • The Equality Act (2010) protects individuals from discrimination, including how personal data can be used to discriminate against someone; for example, in terms of race, nationality, or disabilities.

  • Principles of ethical computing like consent, privacy, honesty and professionalism are established and maintained through laws and guidelines such as these. Their knowledge and application is crucial to developing and maintaining proper conduct in the IT field.