I Fraud Act. The Data Protection ActThe

I am writing this letter in response to your question regarding the legal requirements that you will have to follow for Pure transfers to be successful.The Legal Requirements are obligations imposed on an organisation via the Law. The Requirements are also are also separated into two types of obligations.they are either statutory, “a requirement written into a Law passed by a legislative body”1 or regulatory, “requirements made by a government agency in accordance with the Law”1.  If these requirements are not followed your business may suffer consequences such as fines or suspension via a governing body. There are different legal requirements that you will have to consider with your business to succeed: the Data Protection Act (DPA), the Copyright Designs and Patents Act (CDPA), Telecommunications Regulations, the Computer Misuse Act (CMA) and the Fraud Act. The Data Protection ActThe Data Protection Act  is an “Act to make new provision for the regulation of the processing of information relating to individuals, including the obtaining, holding, use or disclosure of such information.” There are 8 principles to the DPA with regards to the personal data of people: 1) The data must be used fairly and lawfully. This means you must have valid reasons to collect and use the data and make sure the data is not used unjustly or illegally. 2) The data must be used for limited, specifically stated purposes. You can’t use your customers’ or employees’ personal information for reasons that you have not notified or told them about and they have to have agreed to that usage. 3) Data must be used in a way that is adequate, relevant and not excessive meaning that you should not have more than you need and they should be useful to your tasks.4) The data kept by the organisation must be accurate.5) The data must be kept for no longer than is absolutely necessary and destroyed after it is no longer necessary. 6) It must be handled according to people’s data protection rights.7) It must be kept safe and secure. 8) It must not be transferred outside the European Economic Area without adequate protection on the data.  This will affect they way your business deals with information by making sure it doesn’t use the data that it collects incorrectly. This will make sure that you won’t mishandle the data that you have been entrusted with. There is stronger legal protection for more sensitive information, such as:1) Somebody’s ethnic background2) Their political opinions3) Their religious beliefs4) Their personal health5) Their sexual health and orientation6) Their criminal records7) Their financial informationThe sensitive information has a more severe punishment for misuse so you should make sure not to abuse it. The Copyright Designs and Patents ActThe Copyright Designs and Patents Act protects the intellectual property of their rightful owners in the attempt of illegal obtainment, usage or sale. This means that if someone was to obtain the copyrighted property without going through proper channels they would be breaking this Law.  If you were to sell someone else’s copyrighted idea, or property you could be charged for copyright infringement. If you were to use a copyrighted idea with permission, you would have to pay them royalty fees because you are making money of their ideas. The Telecommunication Regulations ActThe Telecommunication Regulations Act makes sure that if your lawful communications are intercepted by someone they are prosecuted and tried for their crime. This is important regarding your business as it means that if someone were to intercept your communications regarding personal information of your customers you can be sure that the proper authorities will track down and arrest the eavesdroppers. This would mean that business would handle data and information that they process and use with care as not to break this law. With regards to the handling of data, the business would be more careful to prevent eavesdropping; regarding the way the business deals with information, they will be more careful to make sure that it is encrypted so that they don’t get prosecuted for negligence. The Computer Misuse ActThe Computer Misuse Act is An Act to make provision for securing computer material against unauthorised access or modification. If someone were to gain unauthorised access to your device; unauthorised access with intent to commit or facilitate commission of further offences or unauthorised editing of data, they can be prosecuted under the premise of the Computer Misuse Act. This would mean that if you were to gain access to someone’s device, even by guessing the password, you would still be prosecuted. This means that The Fraud ActFinally, the Fraud Act is an Act to stop wrongful or criminal deception intended to result in financial or personal gain.The fraud act was put into place to prevent criminals from obtaining services dishonestly. Set up in 2006, it was put into place due to the advancements of computer systems to protect people’s personal information from being leaked, misused or exploited. There are three types of fraud:Fraud by False representationThis is when someone uses a false representation to do something illegal like using someone else’s credit card to take out a loan.Fraud by failure to reveal informationThis is when someone gives inaccurate information for personal gain or to cause pain or loss of another.Fraud by Abuse of position within a hierarchyThis uses when someone abuses a position of power to for personal gain or to cause the pain of another.The Fraud Act helps reduce the fraud that people go through by bringing fraudsters to justice so that they are unable to do fraud again.In conclusion, follow these and you will not be prosecuted for misusing your computers.