IDENTIFY HOW TO STAY SAFE AND RESPECT OTHERS

  • Slides: 4
Download presentation
IDENTIFY HOW TO STAY SAFE AND RESPECT OTHERS WHEN USING EMAIL CALLUM HIBBERT

IDENTIFY HOW TO STAY SAFE AND RESPECT OTHERS WHEN USING EMAIL CALLUM HIBBERT

COPYRIGHT • COPYRIGHT IS A LEGAL RIGHT CREATED BY THE LAW OF A COUNTRY

COPYRIGHT • COPYRIGHT IS A LEGAL RIGHT CREATED BY THE LAW OF A COUNTRY THAT GRANTS THE CREATOR OF AN ORIGINAL WORK EXCLUSIVE RIGHTS FOR ITS USE AND DISTRIBUTION. THIS IS USUALLY ONLY FOR A LIMITED TIME. THE EXCLUSIVE RIGHTS ARE NOT ABSOLUTE BUT LIMITED BY LIMITATIONS AND EXCEPTIONS TO COPYRIGHT LAW, INCLUDING FAIR USE. COPYRIGHT LEGALLY PROTECTS AN AUTHOR'S WORKS — AND, THEREFORE, IS VITALLY IMPORTANT TO BOOK PUBLISHING LIVELIHOOD.

DATA PROTECTION ACT • THE DATA PROTECTION ACT 1998 (DPA) IS A UNITED KINGDOM

DATA PROTECTION ACT • THE DATA PROTECTION ACT 1998 (DPA) IS A UNITED KINGDOM ACT OF PARLIAMENT WHICH DEFINES THE LAW ON THE PROCESSING OF DATA ON IDENTIFIABLE LIVING PEOPLE AND IS THE MAIN PIECE OF LEGISLATION THAT GOVERNS THE DATA PROTECTION. • 1. PERSONAL DATA SHALL BE PROCESSED FAIRLY AND LAWFULLY AND, IN PARTICULAR, SHALL NOT BE PROCESSED. • 2. PERSONAL DATA SHALL BE OBTAINED ONLY FOR ONE OR MORE SPECIFIED AND LAWFUL PURPOSES. • 3. PERSONAL DATA SHALL BE ADEQUATE, RELEVANT AND NOT EXCESSIVE IN RELATION TO THE PURPOSE OR PURPOSES FOR WHICH THEY ARE PROCESSED. • 4. PERSONAL DATA SHALL BE ACCURATE AND, WHERE NECESSARY, KEPT UP TO DATE. • 5. PERSONAL DATA PROCESSED FOR ANY PURPOSE OR PURPOSES SHALL NOT BE KEPT FOR LONGER THAN IS NECESSARY FOR THAT PURPOSE OR THOSE PURPOSES. • 6. PERSONAL DATA SHALL BE PROCESSED IN ACCORDANCE WITH THE RIGHTS OF DATA SUBJECTS UNDER THIS ACT. • 7. APPROPRIATE TECHNICAL AND ORGANISATIONAL MEASURES SHALL BE TAKEN AGAINST UNAUTHORISED OR UNLAWFUL PROCESSING OF PERSONAL DATA AND AGAINST ACCIDENTAL LOSS OR DESTRUCTION. • 8. PERSONAL DATA SHALL NOT BE TRANSFERRED TO A COUNTRY OR TERRITORY OUTSIDE THE EUROPEAN ECONOMIC AREA UNLESS THAT COUNTRY OR TERRITORY ENSURES AN ADEQUATE LEVEL OF PROTECTION.

COMPUTER MISUSE ACT • THE COMPUTER MISUSE ACT IS DESIGNED TO PROTECT COMPUTER USERS

COMPUTER MISUSE ACT • THE COMPUTER MISUSE ACT IS DESIGNED TO PROTECT COMPUTER USERS AGAINST WILFUL ATTACKS AND THEFT OF INFORMATION. OFFENCES UNDER THE ACT INCLUDE HACKING, UNAUTHORISED ACCESS TO COMPUTER SYSTEMS AND PURPOSEFULLY SPREADING MALICIOUS AND DAMAGING SOFTWARE (MALWARE), SUCH AS VIRUSES. IT STOPS HACKERS FROM GETTING INTO YOUR EMAIL AND SEEING YOUR PRIVACY AND TAKE CONTROL OF EVERYTHING.