• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

E-Commerce Laws and Legislation - The Data Protection Act

Extracts from this document...

Introduction

´╗┐Nick Strife Data Protection Act The Data Protection Act was implemented to protect the privacy of living individuals who could be identified from the data, or from a combination of data held by the data controller. This also includes any opinions expressed about the individual. When Collecting data, the data controller must ensure they tell the individual who they are, what the information is going to be used for and ensure that they do not collect more information than is necessary. The data must be kept securely and not kept for longer than it?s needed. It must also be kept up to date and accurate. Individuals have the right to access their data at any time. Companies may charge a fee for this but they must respond within a set timeframe set out by their particular contract. The act contains eight ?Data Protection Principles?. These specify that personal data must be: 1. Processed fairly and lawfully. 2. Obtained for specified and lawful purposes. 3. Adequate, relevant and not excessive. 4. Accurate and up to date. 5. Not kept any longer than necessary. 6. Processed in accordance with the ?data subject?s? (the individual?s) rights. 7. Securely kept. 8. ...read more.

Middle

The idea must also be useful in some way. Drafting a patent application can be a very complicated process and the laws vary from country to country. Piracy is illegally copying, distributing or using programs, movies, music, etc you have not paid for. Piracy has a huge impact on businesses, if potential customers choose to illegally obtain their product rather than purchase it the business is losing money. Piracy has become a huge issue since the internet became available to the public; even more so since broadband became widespread. Businesses ? especially ones involved in a creative industry ? must be vigilant about their copyrighted work. Taking individuals or other companies to court over copyright disputes can be a long and costly process. Bigger companies may choose to hire their own legal team but smaller companies can?t always afford to do this ? which means if something does get stolen they will have to pay to outsource a lawyer. The impact piracy has had on society is that it?s become so widespread a lot of people think it is acceptable to copy or download programs, movies, music etc. illegally. ISP?s and law enforcement are cracking down on this behaviour and individuals are being hit with huge fines or having their internet connection limited or even cut off completely if they are repeat offenders. ...read more.

Conclusion

Whether this be medical records or a credit history consumers have the right to request any information about themselves from any public entity. Companies are obligated to provide this information on request within a reasonable time frame and are permitted to charge a fee to do this. The fees vary between different companies. The only time information may not be released is when the details held can be used to identify a different person to the one making the request because this would be in breach of the data protection act. Businesses and government entities must ensure they have appropriate policies in place to deal with requests from the public regarding release of their information. This needs to include how the customer would make such a request - either through the post or via email - technically requests can be made verbally but it is preferable to make the requests in a tangible form should any disputes arise. They also need to make sure their fee's for providing the information are made clear, as well as give a time frame. This affects business because providing data on request can take up valuable time and resources. If the customer is not happy with the data the company holds on them it can also lead to legal battles and expenditure to hire lawyers. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a teacher thought of this essay

4 star(s)

A very well written piece of work. The writer has clearly done some research and consolidated their findings into succinct sections. There is a lot of information in here that the student can use to revise from and prepare for an exam. the quality of written communication is good, there are a few minor errors.

It is a strong four stars. To push it to five stars the writer needs to include the scope of the acts geographically, refer to the dates that they came into being (as they have for the final one) and give some facts and figures to improve the level of detail with some examples.

Marked by teacher Ad Son 03/01/2013

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Compare the effectiveness of different transmission methods.

    radio. The thick Ethernet (10 base 5) is used as the thin Ethernet but the distance is at 500 meters. Optical Fibre : Eeffectiveness of different transmission Optical Fibre: this is a device that uses light for data transferring. The most commonly used optical fibre is the semi-conductor such as light emitting diode and laser diode.

  2. Unit 21: Working with ICT Hardware and Equipment

    type in a different path, \\data\informationsystems\software\virus stuff\vscan8.0\products\English\vsan8.0\VirusScanPatch 11\setup * Office web components * Profile 2000 * GroupWise - email systems * Db texts works if required * Printer - Find out what printer needs to be installed and then go to start, run, and type \\careersdata and then select the printer we need How regulatory requirements affect work activities.

  1. Threats to Data

    Threats from Inside an Organisation Information is valuable and information you have given to a transactional web-site can be of value to a third party for various reasons. For instance other companies could want your address so they could send you junk mail, they may want your telephone number so

  2. The Impact of Mobile Phones on social Interaction

    However, despite registering one million users by 1987 (1), it was not until the mid - late 1990's that mobile phones became more then a yuppie status symbol and began to become one of the fastest growing technologies in today's society.

  1. Advantages and disadvantages of E-Commerce.

    * Many people also consider shopping a social experience. For instance, they may enjoy going to a store or a shopping mall with friends or family, an experience that they cannot duplicate online. Consumers also need to be reassured that credit card transactions are secure and that their privacy is respected.

  2. Using examples, discuss the advantages/disadvantages of proportional representation systems compared to the ‘first past ...

    The plurality system cannot cope effectively with more than two parties per constituency and in the 1970's and 1980's the plurality system in the United Kingdom produced 2 hung parliaments and more than 100 hung councils (The Guardian 1991). It also results in tactical voting; in 'safe seats' people see

  1. Background and Information -ICT Coursework

    The customer is given a form to fill out of all their details. o The staff member files the form. o The customer is given a membership card. o To view customer records, the manager will have to manually query the database.

  2. Analyse the skills required by health and social care workers to use and ...

    that may allow other people to figure out who that person is such as address, age, date of birth, name. The purpose of sharing the information must be justified and have a valid purpose. This is to protect the service users as some information may cause them to be harassed,

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work