• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Legislation regulating E-Commerce

Extracts from this document...


Data Protection Act 1998 This is the act that deals with the customer details that can be collected or stored on paper and electronically. In e-commerce when the user enters all the personal details such as name, address, telephone number, e-mail address and etc. According to this data protection act, the customer has a right to avoid from sending his/her details to a third party. Computer Misuse Act 1990 This act is a law that works against illegal activities such as: hacking, misuse software's or helping person to get access to someone else's computer. This act prosecutes hacking or attacking a computer with viruses. According to computer misuse act there are three new offences such as: * unauthorised access to computer programs or data * unauthorised ...read more.


This can lead to unauthorised crimes. Consumer Credit Act 1974 This is another important act in e-commerce related to payments by the customers and customer satisfaction according to these transactions done by credit card is protected up to �25000. So if the customer fails to pay the amount, the bank is bound to pay for the products that customer purchased. And the other important feature of this act is if a customer is not satisfied with the product then the customer can have a refund during cooling off period. Trading Standards The main purpose of trading sanders' is to maintain fair trading. There are three main acts related to this: 1. ...read more.


People can request information about government bodies and legal entities. This act can refer to e-commerce as when a customer request some sort of information for example about a product, the seller would be able to provide it. Copyright legislation This is the act that controls literary, dramatic, musical and artistic works in a website also it controls the way that these should be used. The right that covers in this act are: * Broadcast and public performance, * copying * adapting * issuing * renting * lending copies to the public This act helps e-commerce websites as the pictures and details that they have in the website cannot be copied by someone else. For example the image and description of products cannot be copied by someone else in another website without the permission. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Policy, Strategy & Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a star student thought of this essay

3 star(s)

Response to the question

In summary, the report is quite basic. The report does state a number of regulations which websites have to comply with. However their understanding is lacking, and more detailed is required. The report states how The Data Protection Act is ...

Read full review

Response to the question

In summary, the report is quite basic. The report does state a number of regulations which websites have to comply with. However their understanding is lacking, and more detailed is required. The report states how The Data Protection Act is applied to websites on-line, however there are eight main principles of this regulation. The report could state these eight different principles and explain a little of each one, of how websites would need to comply with this set of regulation. The description of the 'Consumer Credit Act 1974' is quite limited. This section will need to be expanded and developed further. Additional background research would have to be undertaken by the student to achieve high marks.

Level of analysis

The report uses a case study of Amazon.com, this is quite good. As this links the background understanding of the student to a commercial environment. However the report doesn't mention why a person would want access to these details (credit card details). The report could include something on the lines of 'People may want to access a person's Amazon account to gain access to their billing details, which could be used to purchase high value goods with using the consumer's funds'. The section 'Trading Standards' gives a very brief understanding of these laws. The report could mention how fake products could be harmful. For example, the report could include something on the lines of 'If a consumer purchases tobacco on-line and this is a fake product, this could contain unusually unsafe levels of some chemicals and could cause signification damage to the consumer. It's essential that this law is re-enforced on-line, and not left on the back burner.'.

Quality of writing

The report states the term 'hacking', however this isn't explained. All technical terms will need to be explained to allow the examiner to understand the student, as the examiner may not have an in-depth IT knowledge.

Did you find this review helpful? Join our team of reviewers and help other students learn

Reviewed by danielbeal 24/02/2012

Read less
Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Policy, Strategy & Systems essays

  1. Illegal music downloads. This Essay will treat and analyze main points of advantages ...

    According to the web- based publication, "the 2008 study into Internet piracy found that recording industries had lost 186,000 employees in current year and the amount of loses is increasing every year" (CIOL, 18 March 2010), which means, that illegal file sharing develops economic crisis in the job market.

  2. Threats to Organisations and Systems. Describe the countermeasures available to an organisation that ...

    phone numbers which all is very vital to a potential confidence trickster or a fraudster. Deleted Deletion of the file is one of the most common mistakes that can affect a business like PaperPlane all depending on the magnitude of the importance of the file deleted.

  1. Computer crime can broadly be defined as criminal activity involving an information technology infrastructure, ...

    (Ian J., Lloyd 2008). This act as a whole was purely introduced to prevent such mishaps such as above and also to prevent hacking, copyright infringements, theft or fraud, "interfering with or obstructing the lawful use of a computer, impeding or preventing access to or impairing the usefulness or effectiveness

  2. How a particular organisation can take advantage of IT developments

    If for example a particular customer goes there to shop and finds out that they don't have the item/product that the customer is looking for or if he is a regular customer and the organisation does not have that specific item/product in stock, the organisation will lose a significant amount of customers.

  1. The new era of Offshore IT Outsourcing.

    By hiring cheap, efficient labor in a digitally connected world, the corporations are able to conduct their business at a much lower cost. However, just like everything else in the world, outsourcing also comes with its own set of evils.

  2. Tatton Homes ltd. ICT Systems Report

    Pc's at the existing office would need be upgraded to work with the demanding 3D software. Both offices should be using the same software. Another upgrade that would be useful is the Microsoft office software that is used as the default office software.

  1. The impact of ICT on an adult in full-time employment and the effects on ...

    then he would be denied this which also brings us onto the area of the Data Protection Act which is one of his big worries as he has to keep all his passwords secret in case somebody got hold of them, he also has to password protect every e-mail that is sent.

  2. Project Management - The Project Manager must have the necessary technical skills but ...

    These codes of conduct could be broken by unprofessional behaviour, such as: * Being selfish with your expert knowledge. * Harming others (e.g. producing a virus). * Dishonesty. * Not honouring property rights. * Not giving credit for intellectual property ("passing off").

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work