Tuesday, July 4, 2017

LO2: Codes Of Practice

Activity: Codes of Practice

1. Find examples of computer codes of practice, either from your college or by carrying out Internet research.

  • Limited Personal Use 
  • Prohibited Activities
  • Offensive and Illegal Material
  • Discrimination, Harassment, Bullying and Defamation
  • Malicious Activities
2. Produce a code of practice for a top secret military or government establishment.


3. Produce a code of practice for a small web design or computer consultancy company.

  • Don't change the settings of the computer
  • Print only when necessary
  • Keep your files organized
  • Surf safely
  • Save often

4. List the areas in which these codes are similar.
    List the areas in which they differ significantly.
    Explain the reasons for the areas where they differ. 


Reference:


Griffith.edu.au. (2017). Information Technology Code of Practice. [online] Available at: https://www.griffith.edu.au/griffith-portal-support/code-practice [Accessed 5 Jul. 2017].


Monday, July 3, 2017

LO2: Legal Issues

Three of the laws that affect the use of information:

Data Protection Act 1998


The Data Protection Act 1998 is an act of the United Kingdom is which information about living people may be legally used and handled. 

The fundamental principles of DPA1998 specify that personal data must:
  • be processed fairly and lawfully
  • be obtained only for lawful purposes
  • be adequate, relevant and not excessive
  • be accurate and current
  • not be retained for longer than necessary
  • be processed in accordance with the rights and freedoms of data subjects
  • be protected against unauthorized or unlawful processing and against accidental loss, destruction or damage
  • not be transferred to a country or territory outside the European Economic Area (unless the country has the rights)


Freedom of Information Act 2000

The Freedom of Information Act 2000 is an act of United Kingdom Parliament defining the ways which the public may obtain access to government-held information. The function is to allow private individuals and other corporations reasonable access to information while minimizing the risk of harm to any entity. 


Computer Misuse Act 1990

The Computer Misuse Act 1990 is an act of the United Kingdom Parliament passed in 1990, this law is designed to frame legislation and controls over computer crime and internet fraud. 


Copyright and Patents Act 1988

An act to restate the law of copyright, to make fresh provision as to the rights of perfomers and others in performances. to amend the law of patents. to enable financial assistance to be given to certain international bodies and for connected purposes. 





Reference:

WhatIs.com. (2017). What is U.K. Data Protection Act 1998 (DPA 1998)? - Definition from WhatIs.com. [online] Available at: http://whatis.techtarget.com/definition/UK-Data-Protection-Act-1998-DPA-1998 [Accessed 4 Jul. 2017].


WhatIs.com. (2017). What is Freedom of Information Act 2000? - Definition from WhatIs.com. [online] Available at: http://whatis.techtarget.com/definition/Freedom-of-Information-Act-2000 [Accessed 4 Jul. 2017].


WhatIs.com. (2017). What is Computer Misuse Act 1990 (CMA)? - Definition from WhatIs.com. [online] Available at: http://whatis.techtarget.com/definition/Computer-Misuse-Act-1990-CMA [Accessed 4 Jul. 2017].


Wipo.int. (2017). United Kingdom: Copyright, Designs and Patents Act 1988 (Chapter 48). [online] Available at: http://www.wipo.int/wipolex/en/text.jsp?file_id=127294 [Accessed 4 Jul. 2017].


CRP - Key Considerations for Research

Determine the key considerations are for planning and undertaking research Issues that can be encountered in research  poor time mana...