PSI: Topics and their Laws

Get Started. It's Free
or sign up with your email address
PSI: Topics and their Laws by Mind Map: PSI: Topics and their Laws

1. Privacy

1.1. Data Protection

1.1.1. EU General Data Protection Regulation 2018 covers all individuals from EU and EEA superseeds EU Directive enforceable without requiring enabling national legislation subjects have the right to: applies to controllers and processors that are established in the EU even if processing is taking place outside the EU applies to data subjects in the EU even if controllers and processors are outside the EU European Directive on Data Protection 1995 EU-US Privacy Shield alternative framework for data exchange after safe-harbour agreement was declared invalid EU aim: provide transparency about transfer of data to US and protection US: companies can annually certify and demonstrate compliance and cooperation with EU authorities

1.1.2. UK Data Protection Act 1984 protects individuals from large organisations covers: Data Protection Act 1998 conforms to EU Directive on DP 1995 covers internet data too not just large organisations Data Protection Act 2018 updates data protection laws in the UK to supplement GDPR

1.2. Communications

1.2.1. UK Regulation of Investigatory Powers Act 2000 (RIPA) permits any organisation providing computer/phone services to monitor and record users' communications for legitimate reasons (eg. detecting crime) users must be informed that such interceptions may take place (DRAFT) Inverstigatory Powers Bill 2015 made to replace RIPA require communication data to be kept for 12 months cover all types of electronic communications

1.3. Freedom of Information

1.3.1. Freedom of Information Act 2000 basic principle: information held by public bodies should be available to the public (with certain exceptions) public bodies: Parliament, NHS, government departments, local authorities, universities, schools etc. information covered: printed documents, electronic documents, emails etc. exceptions: classified documents cons: responding to FoIA requests can be costly possible conflicts between FoIA and DPA

2. Computer Misuse

2.1. Computer .Misuse and UK/US Laws

2.1.1. US Computer Fraud and Abuse Act 1986 covers the following: penalties

2.1.2. UK Computer Misuse Act 1990 (CMA) 3 criminal offences: applies to: Police and Justice Act 2006 increased CMA penalties for offences amended CMA to cover intent to impair operation of any computer amended CMA to cover software tools intended to facilitate computer misuse new offences: problems with Issues with Computer Misuse laws convictions have been infrequent police are over-stretched, experts are needed companies attacked prefer not to share with the public to avoid drawing attention to security weaknesses

2.2. Computer Fraud

2.2.1. UK covered by existing anti-fraud laws

2.2.2. cons: much easier to occur due to e-commerce and online banking detection and collection are harder

2.3. Obfuscation-based Inference Control

2.3.1. Anonymisation decoupling identification from information achieving it is hard labelling a data set as anonymised remains unclear

2.3.2. Generalisation reducing the precision of data to reduce the likelihood of informing identity

2.3.3. Suppression suppression information, making fewer data available to attacker to reduce inferences

2.3.4. Dummy Addition adding dummies or fake data points to data sets prior to providing to other party

2.3.5. Perturbation adding noise to reduce the ability of other party to form inferences

3. Internet

3.1. ISPs

3.1.1. UK Caching temporarily stores downloaded data to speed up downloading of the same data not liable provided that: Hosting ISP permanently stores data uploaded by its customers not liable provided that: Mere Conduit simply transmits data up/downloaded by the customer not liable for damages or criminal sanctions Internet Watch Foundation (IWF) anyone can report unlawful content if IWF judges that content is unlawful, it informs the local police and ISP

3.1.2. US loser than EU law liability for hosting is the same as liability for mere conduit

3.2. Cybercrime

3.2.1. Council of Europe Convention covers child pornography criminal copyright infringement computer-related fraud hacking hate material

3.3. Pornography

3.3.1. US adult porn is protected by the constitutional right of freedom of speech child porn is a criminal offence

3.3.2. EU adult porn is lawful provided its non-violent, consensual and inaccessible to children child porn is a criminal offence

3.4. SPAM

3.4.1. EU EC Directive on Privacy and Electronic Communications 2002 requires that cons:

3.4.2. US CAN-SPAM Act 2003 requires that

4. Intellectual Property Rights

4.1. Paris Convention 1883

4.1.1. covers trade marks and patents

4.2. Berne Convention 1886

4.2.1. covering copyright

4.3. known as negative rights as they demand that someone does not perform an activity


4.4.1. Copyright, Design and Patents Act 1998 protects: original literary, dramatic, musical and artistic works sound recordings, films and TV programmes lasts up to 70 years after authors death software copyright original code is protected, not boilerplate using a program permits: penaties civil offence if done for individual reasons criminal offence if done for commercial reasons databases copyright up to 15 years

4.5. Confidentiality

4.5.1. if someone reveals information obtained under an obligation of confidence, he/she can be sued in a civil court

4.5.2. UK Public Interest Disclosure Act 1998 overrides an obligation of confidence making it possible for employees to expose wrong-doing whistle-blower must first approach employer and then a professional body or public official


4.6.1. apply for one at National Patenting Office if granted then information of the invention will be published

4.6.2. covered by CDPA 1998


4.7.1. UK Trade Marks Act 1994 register for one in the UK Intellectual Property Office

4.8. Trade Secrets

4.8.1. trade secrets definition a secret device or technique used by a company in manufacturing its products

4.8.2. protected by General Tort Law

4.8.3. UK Directive 2016/943

4.8.4. US Economic Espionage Act 1996

4.9. Domain Names

4.9.1. Managed by ICANN (Internet Corporation of Assigned Names and Numbers)

4.9.2. sold on first-come-first-served basis

4.9.3. not protected by law

5. Software Legal

5.1. UK

5.1.1. Unfair Contract Terms Act 1977 makes liability terms enforceable in law only to the extent that they are reasonable person injured as result of faulty software or hardware can sue the supplier faults might cause significan economic damage

5.1.2. Sale Of Goods Act 1979 requires that goods sold must be fit for purpose applies to retail software unclear if it also applies to software downloaded from the internet

5.2. EU

5.2.1. Payment Card Industry Data Security Standard (PCI DSS) designed and developed to ensure consistent and secure use of cardholder data standard not a law so compliance is only attained through agreements and contracts laws are still relevant as cardholder data is still personal data control objectives: 1. build and maintain secure network and systems 2. protect cardholder data 3. maintain vulnerability management program 4. implement strong access control measures 5. regularly monitor and test networks 6. maintain an information security policy rules for the display of the PAN number on receipts only show first 6 and last 4 digits

5.2.2. Fair and Accurate Credit Transactions Act (FACTA) 2003 designed to reduce identity fraud and providing citizens greater insight into their credit profile rules regarding display of PAN numbers no more than the last 5 digits of the card number

6. Health and Safety

6.1. UK

6.1.1. Health and Safety Regulations 1992 DSE users are employees that use display screen equipment continuously for more than an our in a single working day regulation doesn't apply to people using DSE for less than an hour or infrequent use employers should consult and communicate with DSE regards issue as well as providing relevant information employers must: analyse workstations and assess and reduce risk ensure appropriate controls are in place ensure employees have sufficient information and training provide eyesight tests upon request, special eyewear if required review the assessment employees can request eye tests and employers are expected to provide test and supply eyewear checklist for assessment is provided by the Health and Safety Executive

7. Codes of Conduct

7.1. Professional body

7.1.1. an organisation that promotes high standards in a particular profession

7.1.2. IT related ones: ACM (US) Association for Computing Machinery BCS (UK) British Computer Society IEEE (US) Institute of Electrical and Electronics Engineers IET (UK) Institution of Engineering and Technology

7.2. Code of conduct

7.2.1. each body publishes one and requires all its members to adhere to it

7.2.2. member can be expelled for serious breach

8. History of IT

8.1. Mainframe Era (1950s - 1970s)

8.1.1. centralised computers with dumb terminals

8.1.2. automation of existing back office activities

8.1.3. independent applications for each business areas

8.1.4. tight central control (no autonomy)

8.1.5. high cost

8.1.6. large businesses, utilities, government

8.2. Minicomputer Era (1970s - 1980s)

8.2.1. limited distribution of functions with some autonomy for business units

8.2.2. dumb input/output devices

8.2.3. application systems still independent

8.2.4. problems of data storage and integration

8.2.5. still largely about transaction processing

8.2.6. medium size business could also enter as prices dropped

8.3. Distributed/PC era (1980s - 1990s)

8.3.1. departmental automation with large degree of autonomy

8.3.2. data distributed and poorly managed

8.3.3. low connectivity and compatibility

8.3.4. difficult to collect corporate information

8.3.5. small businesses could enter market using PCs for straightforward business activities

8.4. Client-server Era (1990s)

8.4.1. distributed autonomy

8.4.2. internet standardising communication

8.4.3. more data capture and sharing of processing

8.4.4. data warehousing

8.4.5. SMEs gained access to packaged solutions and application generators

8.5. Network Era (2000s)

8.5.1. complex architecture integrating mainframe applications with application servers and the internet

8.5.2. integrated applications (e.g. supply chain) with distributed functionality

8.5.3. use of third-party components or web services

8.5.4. SMEs have access to Web for marketing and on-line sales; services such as Paypal