• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Assess the likelihood of Sid and Kenny avoiding personal liability for the debts of the company

Extracts from this document...

Introduction

Client Confidentiality Confidentiality is a major factor in any organisation. Every client in the organization is entitled to confidentiality. When holding information about the client three factors must be taken into consideration these are: 1. Seek the clients consent 2. Collect information that is only relevant to the situation 3. Keep the disclosure of the information to a minimum A right was set up called the "data protection act". It was set up to ensure the protection of peoples confidential information, and also states when the information can be used with out the clients consent. The act was set up in 1984 updated in 1998 because of technological advances. For example computer records were starting to be stored on computers. Another act was also set up regarding confidentiality is act is called the "access to health records act" this act was set up in 1990. ...read more.

Middle

Where as personal date requires explicit consent, for example your religious beliefs. The personal data that the rainbow leaders are aloud to hold about their rainbows are: * Name * Address - So that they can be contacted * Date of Birth - to ensure the child is the right age to join the rainbow guides * Telephone number - for contact in case of an emergency The sensitive data that the rainbow leads are aloud to hold about the rainbows are: * Health Details of medical conditions such as asthma to enable leaders to be prepared for medical emergencies and to avoid allergies. * Disabilities Details of any disability, to enable integration and to access any special provision required. * Religion/faith and race or ethnic origin To enable leaders to ensure programmes and menus take account of cultural needs The guiding association have set up a list of data protection principles. ...read more.

Conclusion

* If records are stored at home put them away when not in use. * If records are on a computer that others can access, e.g. via a network, keep the records on a disk and keep the disk safe. * Check with each data subject that her record is correct at least once a year. * Destroy out of date records by burning or shredding into small pieces. * Do not give lists to non-Guiding people or organisations, such as Churches, unless you have gained permission from the girl's parents or guardians to do so. * Do not use your records for anything other than Guiding purposes. * Keep the records in a way that while looking at one person's details you are not revealing someone else's on the same page. * Record facts not opinions. I have asked if these polices and put to use and I found out that they abide by each one and to make sure that they abide by the polices they have regular checks by the District Commissioner. ?? ?? ?? ?? Clare Wells :) ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. The Data Protection Act 1998 - questions and answers

    or paragraph 6(1) ('The processing is necessary for the purposes of legitimate interests pursued by the Data Controller...'). Care should be taken to ensure that the use does not extend to the point at which the data is being used as a quasi-database in which case registration under the Act will be essential.

  2. Data Protection Act

    One of the main aims of this directive was to ensure the "Protection of fundamental rights and freedoms and in particular the right to privacy with respect to the processing of personal data in the telecommunications sector" What does the regulation cover?

  1. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    If I am affected, I can charge him myself. This acts as a deterrent to a lot of virus spreaders but it's extremely hard to trace back skilled hackers. They can use proxies and other such devices to hide their ISP, making it really hard to trace back to the original culprit.

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    This is significantly because the law keeps information secure, which precludes other people from gaining access to the data. Also, The Data Protection Act allows people of the Leyton community to take action upon any organisation that misuses the data.

  1. You have to explain how you have looked after the equipment and ensured its ...

    We want them to have time to write books. Then we can read them and enjoy them. So we have to pay for the books, so that the person who wrote them can get money. And we have to stop people copying the books themselves, so that they have to pay for the books.

  2. Legal Aspects of Using Information Technology

    The sixth principle states that the personal data must be processed in accordance with the rights of data subjects. Some of theses rights include the data subject's right to: * find out what data is being processed about them, in what manner and why * find out if data is

  1. Privacy and Data Protection: IT Law

    It seems that, concerning the privacy issue, the EU has chosen the latter option, by imposing a comprehensive, general law governing the collection, use and dissemination of data by public and private sector, whose enforcement is assured by an oversight body.

  2. Examining safety and security - accuracy checks

    Data to be entered Data actually entered Data correct �500 �500 �500 �3,000 �3,000 �3,000 500 509 400 3000 2000 4000 ( ( but is accepted because it is within the correct range. Computer immediately signals an error, because 400 is below the minimum level - outside the range.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work