Posts

Showing posts from July, 2017

computer codes of pratice

here's a sample of a code of practice for a business. feel free to adapt adapt and use it for your own organization. ensure that you check it with your legal department or legal advisor before establishing and issuing a code of practice, as this type of document will almost certainly have contractual implications for your organization. involving customers in the drafting of a code practice is also useful. during world war ll, the germans used enigma, a cipher machine, to develop unbreakable codes for sending messages. enigma's settings offered 158,000,000,000,000,000,000 possible solutions yet the allies were eventually able to crack code. Accesss computing facilities are provided by uodit for the university as a whole and by schools and departments for their members access to facilities is normally arranged by the allocation of a unique user identifier (often called a username or login name). for some facilities the presentation of a university ID card or other form of

copyright and patents act 1998

The Copyright, Designs and Patents Act 1988, is the current UK copyright law. It gives the creators of literary, dramatic, musical and artistic works the right to control the ways in which their material may be used. The rights cover: Broadcast and public performance, copying, adapting, issuing, renting and lending copies to the public. In many cases, the creator will also have the right to be identified as the author and to object to distortions of his work. Copyright arises when an individual or organisation creates a work, and applies to a work if it is regarded as original, and exhibits a degree of labour, skill or judgement. Interpretation is related to the independent creation rather than the idea behind the creation. For example, your idea for a book would not itself be protected, but the actual content of a book you write would be. In other words, someone else is still entitled to write their own book around the same idea, provided they do not directly copy or adapt yours

computer misuse act 1990

The Computer Misuse Act 1990 (CMA) is an act of the UK Parliament passed in 1990. CMA is designed to frame legislation and controls over computer crime and Internet fraud. The legislation was created to: Criminalize unauthorized access to computer systems. Deter serious criminals from using a computer in the commission of a criminal offence or seek to hinder or impair access to data stored in a computer. The CMA is broad and sweeping, but has also been broadly and liberally applied in the courts. This has raised concerns among privacy advocates and those who believe in circumscribing government influence on daily life and behavior. Nevertheless, the CMA has served as a model for computer crime legislation in other Commonwealth countries.

freedom of information act 2000

The Freedom of Information Act 2000 provides public access to information held by public authorities. It does this in two ways: public authorities are obliged to publish certain information about their activities; and members of the public are entitled to request information from public authorities. The Act covers any recorded information that is held by a public authority in England, Wales and Northern Ireland, and by UK-wide public authorities based in Scotland. Information held by Scottish public authorities is covered by Scotland’s own Freedom of Information (Scotland) Act 2002. Public authorities include government departments, local authorities, the NHS, state schools and police forces. However, the Act does not necessarily cover every organisation that receives public money. For example, it does not cover some charities that receive grants and certain private sector organisations that perform public functions. Recorded information includes printed documents, comput

data protection act 1998

The Data Protection Act 1998 (DPA 1998) is an act of the United Kingdom (UK) Parliament defining the ways in which information about living people may be legally used and handled. The main intent is to protect individuals against misuse or abuse of information about them. The DPA was first composed in 1984 and was updated in 1998. The text of DPA 1998 contains six major sections called Parts, followed by 16 explanatory notes called Schedules. The Parts outline the basic rights of data subjects, methods in which data may be handled by those who possess it, special exemptions and modes of enforcement. The Schedules explain the Parts in greater detail and elaborate on diverse contingencies and legal interpretations. The fundamental principles of DPA 1998 specify that personal data must: be processed fairly and lawfully. be obtained only for lawful purposes and not processed in any manner incompatible with those purposes. be adequate, relevant and not excessive. be accurate and c