• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Assess the likelihood of Sid and Kenny avoiding personal liability for the debts of the company

Extracts from this document...

Introduction

Client Confidentiality Confidentiality is a major factor in any organisation. Every client in the organization is entitled to confidentiality. When holding information about the client three factors must be taken into consideration these are: 1. Seek the clients consent 2. Collect information that is only relevant to the situation 3. Keep the disclosure of the information to a minimum A right was set up called the "data protection act". It was set up to ensure the protection of peoples confidential information, and also states when the information can be used with out the clients consent. The act was set up in 1984 updated in 1998 because of technological advances. For example computer records were starting to be stored on computers. Another act was also set up regarding confidentiality is act is called the "access to health records act" this act was set up in 1990. ...read more.

Middle

Where as personal date requires explicit consent, for example your religious beliefs. The personal data that the rainbow leaders are aloud to hold about their rainbows are: * Name * Address - So that they can be contacted * Date of Birth - to ensure the child is the right age to join the rainbow guides * Telephone number - for contact in case of an emergency The sensitive data that the rainbow leads are aloud to hold about the rainbows are: * Health Details of medical conditions such as asthma to enable leaders to be prepared for medical emergencies and to avoid allergies. * Disabilities Details of any disability, to enable integration and to access any special provision required. * Religion/faith and race or ethnic origin To enable leaders to ensure programmes and menus take account of cultural needs The guiding association have set up a list of data protection principles. ...read more.

Conclusion

* If records are stored at home put them away when not in use. * If records are on a computer that others can access, e.g. via a network, keep the records on a disk and keep the disk safe. * Check with each data subject that her record is correct at least once a year. * Destroy out of date records by burning or shredding into small pieces. * Do not give lists to non-Guiding people or organisations, such as Churches, unless you have gained permission from the girl's parents or guardians to do so. * Do not use your records for anything other than Guiding purposes. * Keep the records in a way that while looking at one person's details you are not revealing someone else's on the same page. * Record facts not opinions. I have asked if these polices and put to use and I found out that they abide by each one and to make sure that they abide by the polices they have regular checks by the District Commissioner. ?? ?? ?? ?? Clare Wells :) ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. The Data Protection Act 1998 - questions and answers

    or paragraph 6(1) ('The processing is necessary for the purposes of legitimate interests pursued by the Data Controller...'). Care should be taken to ensure that the use does not extend to the point at which the data is being used as a quasi-database in which case registration under the Act will be essential.

  2. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    Mr Ajaib can be quite vulnerable to this, despite being a married man. He can find it difficult to differ between what he sees as a 'hot chick' to what really is a computerised spamming device. Once Mr Ajaib falls prey to the bot's lewd attempt at making Mr Ajaib

  1. 3E-The legislation that protects individuals and groups from the misuse of ICT

    If the data access codes are not kept safe enough by an organisation that holds data on the individuals living Leyton, then the likes of hackers can access the information quite easily. The law doesn't highly protect an individual's data, it protects it to some extent because there are possible

  2. Data Protection Act

    The Code is a non-statutory scheme that requires Governments and authorities to make certain information available to the public and to release information specific requests. The Freedom of Information covers a wider range of public authorities and allows the publish copies of documents as well as to the information in them.

  1. You have to explain how you have looked after the equipment and ensured its ...

    People say this is very bad. It stops people getting money from selling things they have made. And copyright law does not help. The Copyright, Designs and Patents Act make it a criminal offence to copy or steal software. Under the act it is an offence to copy or distribute

  2. Legal Aspects of Using Information Technology

    Penalty is a maximum fine of �2000 and a six month prison sentence * Computer fraud and blackmail- unauthorised access with a further criminal intent. The penalty is an unlimited fine and a maximum of five year prison sentence * Viruses- unauthorised modification of computer material (e.g. programs or data).

  1. Privacy and Data Protection: IT Law

    the US: Since the freedom of speech is written down explicitly in the Bill of Rights, it is superior to the only implicitly mentioned right to privacy.8 The Supreme Court has judged though, that mere advertisement is lower speech and can be regulated, but the choice has to be given

  2. Data Protection Issues – Compliance Within Computing Organisations, The Causes, Effects and Consequences.

    Processed for one or more limited lawful purposes Within the business organisation's registration will be an outline of the specific purpose for which data will be used. The broadness of these purposes will usually be competently crafted to account for all its daily activities.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work