Roland UDVARLAKI
Unit-8 E-Commerce Assignment-3
P4 - Review the regulations governing e-commerce
Data Protection Act
Data Protection Act has been established in 1998, and it is still being used nowadays. This law collects a lot
of rules (and a lot of personal information such as: phone numbers, credit cards, addresses etc.) informing
and controlling how people can get, share other people’s information. Companies and or other
organisations must be aware the guidelines that they must follow at all times when handling, storing
personal information. This law includes all type of data which are stored electronically or in a written
format.
This law will protect the people whose information is currently being stored and shared with an
organisation. This law will prevent people without permission to gain access to these critical information
outside of the company.
1, All personal information must be kept and processed lawfully in a fair way.
2, All personal information must be used for the described lawful reasons and not for others. If other purposes
come on the way, the organisation must ask the person, owner for permission to use it elsewhere.
3, Personal information must be used properly and to relevant tasks for what they have asked to use it for at
the beginning.
4, Personal information must be up-to-date and accurate so for example no products will be shipped to an old
address, which could cause troubles for the owner to pick it up.
5, Personal information must be kept for as long as an organisation intends to use it and it’s necessary, must
not keep it afterwards for other purposes.
6, Data must be processed in a related way as this Act states it. No confusions and mistakes can be avoided.
7, The organisation that has asked for the personal information must be aware of the unlawful processing,
unauthorised accesses, damages, and or the loss of personal information, and must avoid and protect this at
any cost.
8, Personal information must not be transferred outside of the European Economic Area unless they can
provide the same security levels and can also provide the different laws, rights that would protect these critical
information.
When a company intends to use the personal data for something else or they wish to share it with third
parties, they must ask the owner, person first whose information is shared with them (the first company)
for permission to use or share their confidential information with a third party. They must write a notice
and a permission letter to the owner requiring a signature, and the letter must include the information the
company wishes to share and for what purposes.
Computer Misuse Act 1990
The Computer Misuse Act 1990 was created to protect people legally from hacking and from other illegal
activities they can suffer by using electronical devices. It protects people whose computer has been
accessed by an unauthorised person that was spying or trying to get access to their information (or viruses,
hacks – illegal activities). If someone gets caught, they can easily be sued and charged for breaking this law,
and can face years in prison for doing such illegal activities. Most organisations have different security
software built in to their system, so they can track down the hackers and hand them to the police.
Roland UDVARLAKI – Unit 8 – Assignment 3 – P4 - Page 1 of 3