Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Currently it protects Films, Software, Music and anything original. This Act
was introduced to protect the investment of time, money and effort by the
people who create original pieces of work.
In relation to ICT, The Copyright Act helps to ensure that the following are
prevented:
• Copying of software
When purchasing a piece of software, you don’t actually but the software
itself but buy a license to be allowed to use it. There are 3 different types
of licenses each with its own boundaries and restrictions.
Type of
How many people it covers
license
The software can be loaded onto just one machine. Only one
Single User person can use the software at a time. However, if that person
License stops using the machine then someone else can log on and use the
software.
Multi-user licenses are bought for a certain number of users e.g.
Multi User 20. So at any one time, up to 20 people on the network can use the
License software. The 21st person cannot use the software until one
person logs off or shuts it down.
A site license allows everyone on that site or in an office to use
the software. It can be loaded onto every machine and anyone on
the site can use it. Sometimes a site license covers loading the
Site License software onto staff laptops so that they can use it whilst on the
move. It might even cover staff to have a copy of the software at
home, but that is dependent on the terms of the site license. You
shouldn't just assume that you can do this.
By just cutting the software piracy rate from 25% to 15% would result in an
extra 40,000 jobs in the IT sector and an extra £2.5 billion in tax revenues.
The extra revenue that software companies would receive would mean that
they could reinvest more into new product development.
t’s estimated, in fact, that people breaking the law and downloading
copyrighted music costs the industry something like £8.5 billion a year – and
loses £1.5 billion for the VAT man.
So, the end result, if everybody that has a PC in the UK decided to download
ripped off music rather than buy it, would be an end to the music industry in
the UK.
Legislation in ICT
Data Protection Act (1998)
Eight Principles of the act
The Computer Misuse Act (1990) was developed to cope with problems of
hackers and viruses.
• Hacking
• Fraud
• Viruses/Logic Bombs
• Software Theft/Copyright Infringement
• Storing of Illegal Images (Violence/Terrorism etc.)
There are also external and internal threats to privacy and security.
Internal threats usually refer to how computer systems are at risk from
within a company/organization. (This can include threats within the actual
room a computer is stored in or within the computer that data is stored in)
External Threats refer to how data within the offices systems can be
affected from sources outside the building/organization.
For all of the above internal and external threats, you should be able to
come up with further examples and the various ways to avoid them,
whenever possible. These may include:
Viruses
There are many types of viruses around, for example a Trojan Horse it a
program that appears to perform a useful function, and sometimes does so
quite well, but also includes an unadvertised features that is usually
malicious in nature.
Malicious means = causing harm
Modifying = improve or change
Worms
A worm is similar to a virus by design and is considered to be a sub-class of a
virus. Worms spread from computer to computer, but unlike a virus, it has
the capability to travel without any human action. A worm takes advantage of
file or information transport features on your system, which is what allows it
to travel unaided.
Several commercially available programs can now help detect viruses and
provide some degree of protection against them. However if you’re using
such programs, be careful that they don’t cause greater problems than they
can solve. Some anti-virus programs may warn of a suspected infection when
none has actually taken place. Because of the differences in anti-virus
packages, it’s important to standardize testing procedures and analytical
tools, so results can be compared on a consistent basis. Unfortunately,
malicious code is now a fact of life. Computer viruses appear to be a longer
term threat. Systems and data will continue to be updated to deal with the
threat accordingly.