Computer missuse act

Topics: Data Protection Act 1998, Computer Misuse Act 1990, Identity theft Pages: 1 (644 words) Published: September 10, 2014
The data protection act is in place to ensure that people and companies that have access to personal information only use it for what they need to, to complete their work. This relates to my work in the way that I am not only handing peoples businesses and what’s going on in them but I have people’s personal data to hand. So I know what a lot of what’s going on in people’s private lives, so I need to ensure that I keep this data private and not go around making it publicly known knowledge. The data protection act relates also mentions the fact that all information kept should be relevant and accurate as keeping false information could lead to governing bodies having the wrong information which could lead implications in future. It also states that it must be deleted when no longer needed; this means when you stop acting for a client you are to dispose of their information properly and ensure that it is all destroyed. Way to ensure that data is protected is using passwords to log on computers or to access files, and if it is not on computer you can lock filing cabinets this will ensure that you are doing everything in your power to stop people accessing it.

The computer misuse act is the offence of intending to secure information that is unauthorised or unnecessary to carry out your job. In my job this means only using the information needed to complete accounts or change information with HMRC, it is possible for me to have access to a lot of personal information about the clients we act for. It is essential under the computer misuse act that I only access what I need to carry out my job and further more ensure that none of the information is left lying around or on show. To help myself to follow this act I can ensure I only use my own computer and don’t accidently find myself accessing information I didn’t mean to which other people might see and be able to use. I could also only use the computer when I am working or studying to completely avoid accusations...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Data Protection Act 1998 Research Paper
  • Data Protection Act and Computer Misuse Act Essay
  • Ict Health and Safety Act Essay
  • Unit 25: Maintaining Computer Systems P1, M1 Essay
  • Computer Misuse Act Essay
  • computer Essay
  • Computer Misuse Act Essay
  • Computer Misuse Act Essay

Become a StudyMode Member

Sign Up - It's Free