• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Legislation regulating E-Commerce

Extracts from this document...

Introduction

Data Protection Act 1998 This is the act that deals with the customer details that can be collected or stored on paper and electronically. In e-commerce when the user enters all the personal details such as name, address, telephone number, e-mail address and etc. According to this data protection act, the customer has a right to avoid from sending his/her details to a third party. Computer Misuse Act 1990 This act is a law that works against illegal activities such as: hacking, misuse software's or helping person to get access to someone else's computer. This act prosecutes hacking or attacking a computer with viruses. According to computer misuse act there are three new offences such as: * unauthorised access to computer programs or data * unauthorised ...read more.

Middle

This can lead to unauthorised crimes. Consumer Credit Act 1974 This is another important act in e-commerce related to payments by the customers and customer satisfaction according to these transactions done by credit card is protected up to �25000. So if the customer fails to pay the amount, the bank is bound to pay for the products that customer purchased. And the other important feature of this act is if a customer is not satisfied with the product then the customer can have a refund during cooling off period. Trading Standards The main purpose of trading sanders' is to maintain fair trading. There are three main acts related to this: 1. ...read more.

Conclusion

People can request information about government bodies and legal entities. This act can refer to e-commerce as when a customer request some sort of information for example about a product, the seller would be able to provide it. Copyright legislation This is the act that controls literary, dramatic, musical and artistic works in a website also it controls the way that these should be used. The right that covers in this act are: * Broadcast and public performance, * copying * adapting * issuing * renting * lending copies to the public This act helps e-commerce websites as the pictures and details that they have in the website cannot be copied by someone else. For example the image and description of products cannot be copied by someone else in another website without the permission. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Policy, Strategy & Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a star student thought of this essay

3 star(s)

Response to the question

In summary, the report is quite basic. The report does state a number of regulations which websites have to comply with. However their understanding is lacking, and more detailed is required. The report states how The Data Protection Act is ...

Read full review

Response to the question

In summary, the report is quite basic. The report does state a number of regulations which websites have to comply with. However their understanding is lacking, and more detailed is required. The report states how The Data Protection Act is applied to websites on-line, however there are eight main principles of this regulation. The report could state these eight different principles and explain a little of each one, of how websites would need to comply with this set of regulation. The description of the 'Consumer Credit Act 1974' is quite limited. This section will need to be expanded and developed further. Additional background research would have to be undertaken by the student to achieve high marks.

Level of analysis

The report uses a case study of Amazon.com, this is quite good. As this links the background understanding of the student to a commercial environment. However the report doesn't mention why a person would want access to these details (credit card details). The report could include something on the lines of 'People may want to access a person's Amazon account to gain access to their billing details, which could be used to purchase high value goods with using the consumer's funds'. The section 'Trading Standards' gives a very brief understanding of these laws. The report could mention how fake products could be harmful. For example, the report could include something on the lines of 'If a consumer purchases tobacco on-line and this is a fake product, this could contain unusually unsafe levels of some chemicals and could cause signification damage to the consumer. It's essential that this law is re-enforced on-line, and not left on the back burner.'.

Quality of writing

The report states the term 'hacking', however this isn't explained. All technical terms will need to be explained to allow the examiner to understand the student, as the examiner may not have an in-depth IT knowledge.


Did you find this review helpful? Join our team of reviewers and help other students learn

Reviewed by danielbeal 24/02/2012

Read less
Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Policy, Strategy & Systems essays

  1. Illegal music downloads. This Essay will treat and analyze main points of advantages ...

    According to the web- based publication, "the 2008 study into Internet piracy found that recording industries had lost 186,000 employees in current year and the amount of loses is increasing every year" (CIOL, 18 March 2010), which means, that illegal file sharing develops economic crisis in the job market.

  2. The impact of ICT on an adult in full-time employment and the effects on ...

    councils financial system and consist of an old and a new system, the first and oldest is C.I.S.S and this was specially developed for the council and has been used in the council for a long time, the next is a German system called SAP which has only been installed

  1. Threats to Organisations and Systems. Describe the countermeasures available to an organisation that ...

    category, while software failure typically occurs due to bugs in the code. Lost like I said before with data corruption, data on a USB could be lost or misplaced very easily. The USBs and other sources of storage hold the information of every customer; including their bank details, addresses and

  2. Computer crime can broadly be defined as criminal activity involving an information technology infrastructure, ...

    As stated above Computer Misuse Act states three offenses, the "provision of section 1,2 and 3 of the Computer Misuse Act, as now amended by the Police and Justice Act 2006, provide the major United Kingdom activity in the regard of illegal access involving hacking, virus and the misuse of devices."

  1. How a particular organisation can take advantage of IT developments

    This will basically save the customers petrol money and especially time. Customers would not take that risk. So if the organisation doesn't have a website and customers from out of town or customers that live a fair distance away from the organisation will face trouble.

  2. Tatton Homes ltd. ICT Systems Report

    Pc's at the existing office would need be upgraded to work with the demanding 3D software. Both offices should be using the same software. Another upgrade that would be useful is the Microsoft office software that is used as the default office software.

  1. The new era of Offshore IT Outsourcing.

    By hiring cheap, efficient labor in a digitally connected world, the corporations are able to conduct their business at a much lower cost. However, just like everything else in the world, outsourcing also comes with its own set of evils.

  2. Project Management - The Project Manager must have the necessary technical skills but ...

    These codes of conduct could be broken by unprofessional behaviour, such as: * Being selfish with your expert knowledge. * Harming others (e.g. producing a virus). * Dishonesty. * Not honouring property rights. * Not giving credit for intellectual property ("passing off").

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work