• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

E-Commerce Laws and Legislation - The Data Protection Act

Extracts from this document...

Introduction

´╗┐Nick Strife Data Protection Act The Data Protection Act was implemented to protect the privacy of living individuals who could be identified from the data, or from a combination of data held by the data controller. This also includes any opinions expressed about the individual. When Collecting data, the data controller must ensure they tell the individual who they are, what the information is going to be used for and ensure that they do not collect more information than is necessary. The data must be kept securely and not kept for longer than it?s needed. It must also be kept up to date and accurate. Individuals have the right to access their data at any time. Companies may charge a fee for this but they must respond within a set timeframe set out by their particular contract. The act contains eight ?Data Protection Principles?. These specify that personal data must be: 1. Processed fairly and lawfully. 2. Obtained for specified and lawful purposes. 3. Adequate, relevant and not excessive. 4. Accurate and up to date. 5. Not kept any longer than necessary. 6. Processed in accordance with the ?data subject?s? (the individual?s) rights. 7. Securely kept. 8. ...read more.

Middle

The idea must also be useful in some way. Drafting a patent application can be a very complicated process and the laws vary from country to country. Piracy is illegally copying, distributing or using programs, movies, music, etc you have not paid for. Piracy has a huge impact on businesses, if potential customers choose to illegally obtain their product rather than purchase it the business is losing money. Piracy has become a huge issue since the internet became available to the public; even more so since broadband became widespread. Businesses ? especially ones involved in a creative industry ? must be vigilant about their copyrighted work. Taking individuals or other companies to court over copyright disputes can be a long and costly process. Bigger companies may choose to hire their own legal team but smaller companies can?t always afford to do this ? which means if something does get stolen they will have to pay to outsource a lawyer. The impact piracy has had on society is that it?s become so widespread a lot of people think it is acceptable to copy or download programs, movies, music etc. illegally. ISP?s and law enforcement are cracking down on this behaviour and individuals are being hit with huge fines or having their internet connection limited or even cut off completely if they are repeat offenders. ...read more.

Conclusion

Whether this be medical records or a credit history consumers have the right to request any information about themselves from any public entity. Companies are obligated to provide this information on request within a reasonable time frame and are permitted to charge a fee to do this. The fees vary between different companies. The only time information may not be released is when the details held can be used to identify a different person to the one making the request because this would be in breach of the data protection act. Businesses and government entities must ensure they have appropriate policies in place to deal with requests from the public regarding release of their information. This needs to include how the customer would make such a request - either through the post or via email - technically requests can be made verbally but it is preferable to make the requests in a tangible form should any disputes arise. They also need to make sure their fee's for providing the information are made clear, as well as give a time frame. This affects business because providing data on request can take up valuable time and resources. If the customer is not happy with the data the company holds on them it can also lead to legal battles and expenditure to hire lawyers. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a teacher thought of this essay

4 star(s)

A very well written piece of work. The writer has clearly done some research and consolidated their findings into succinct sections. There is a lot of information in here that the student can use to revise from and prepare for an exam. the quality of written communication is good, there are a few minor errors.

It is a strong four stars. To push it to five stars the writer needs to include the scope of the acts geographically, refer to the dates that they came into being (as they have for the final one) and give some facts and figures to improve the level of detail with some examples.

Marked by teacher Ad Son 03/01/2013

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Compare the effectiveness of different transmission methods.

    radio. The thick Ethernet (10 base 5) is used as the thin Ethernet but the distance is at 500 meters. Optical Fibre : Eeffectiveness of different transmission Optical Fibre: this is a device that uses light for data transferring. The most commonly used optical fibre is the semi-conductor such as light emitting diode and laser diode.

  2. Unit 21: Working with ICT Hardware and Equipment

    type in a different path, \\data\informationsystems\software\virus stuff\vscan8.0\products\English\vsan8.0\VirusScanPatch 11\setup * Office web components * Profile 2000 * GroupWise - email systems * Db texts works if required * Printer - Find out what printer needs to be installed and then go to start, run, and type \\careersdata and then select the printer we need How regulatory requirements affect work activities.

  1. Consider five models of communication – Linear, Circular, Argyles, Hargies and Hartleys

    This model both individuals have equal emphasis on communication. And both are influence by each others thought and emotions. Hartley (1999) page 51 & 52 This model has all the same features as Argyles model and all the weakness have been addressed.

  2. Using examples, discuss the advantages/disadvantages of proportional representation systems compared to the ‘first past ...

    (Smyth 1992). It's not unusual for nearly 70% of all votes (those for losing candidates) to be effectively wasted, as they do not count towards the election of the MP. Moreover, votes for winning candidates in safe seats tend to accumulate into huge majorities (The Guardian 1991).

  1. Identify the information systems used in a specified organisation

    These systems may be used to compare the performance of the business to previous months or to their competitors such as Asda and Morrison?s. These systems can also help decision making with the managers as they can look at reports.

  2. Communication & Employability Skills for IT. OCR Cambridge Technicals Unit 1 LO1-P1

    This is used throughout many businesses. Employees need to use this skill to keep their business up to date with the latest news. Prioritizing- identifying critical tasks, arranging tasks in order of importance, use to do lists to organise the tasks needed to be done.

  1. Evaluate the use of e-commerce in a brick and click organisation

    However, delivery services are not 24/7 like online so it does limit the convenience of it. However on other hand Asda has to face competition from companies all over the world. Not only have that, Asda also had to advertise on the internet to make sure that customers know that Asda sell their goods online.

  2. Analyse the skills required by health and social care workers to use and ...

    that may allow other people to figure out who that person is such as address, age, date of birth, name. The purpose of sharing the information must be justified and have a valid purpose. This is to protect the service users as some information may cause them to be harassed,

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work