Main Page About Template

Computing related legislation

The Data Protection Act 1998

This law applies to personal data stored on computers (or in paper filing systems). Examples of personal data are a person's name or address.

  1. Personal data must be processed fairly and lawfully
  2. Personal data must be obtained for a lawful purpose
  3. Personal data must be accurate and up to date
  4. Personal data must not be excessive for its purpose
  5. Personal data must be kept for longer than necessary
  6. There must be appropriate measures to protect from theft of, damage to or loss of personal data
  7. Personal data must not be transferred to a country outside the European economic area unless there is an adequate level of data protection
  8. Personal data must be processed with the rights outlined in this act

The act also gives data subjects certain rights such as the right to request a copy of the data being held on them.

The Computer Misuse Act 1990

This law outlines three primary offences concerning malicious use of computers:

  1. Unauthorised access to computer materials
  2. Unauthorised access with the intent to commit further offences
  3. Unauthorised modification of computer materials

Each offence can be punished with imprisonment.

The Copyright, Design and Patents Act 1988

This act protects people's property online. It automatically applies to original content including music, art, videos, code and literary work.

  1. copy the work
  2. sell the work to the public
  3. rent or lend the work to the public
  4. show the work to the public
  5. make an adaption of the work, or do any of the above with the adaption

Copyright is infringed if any unauthorised person does any of the actions listed above.

It is an individual's responsibility to take action under the act.

The Regulation of Investigatory Powers Act 2000

This act covers investigation, surveillance and interception of communication by public bodies. For example, the secret service can wire-tap online conversations (in the interest of national security) given a warrant has been issued.

This act also enforces some laws on internet service providers and mobile phone companies such as:

  1. upon request, information must be given up to authorised authorities
  2. networks must have sufficient hardware to facilitate surveillance

This act is controversial as it extends to small agencies like local councils. In addition, some people feel that the act is an invasion of privacy.