• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Assess the likelihood of Sid and Kenny avoiding personal liability for the debts of the company

Extracts from this document...


Client Confidentiality Confidentiality is a major factor in any organisation. Every client in the organization is entitled to confidentiality. When holding information about the client three factors must be taken into consideration these are: 1. Seek the clients consent 2. Collect information that is only relevant to the situation 3. Keep the disclosure of the information to a minimum A right was set up called the "data protection act". It was set up to ensure the protection of peoples confidential information, and also states when the information can be used with out the clients consent. The act was set up in 1984 updated in 1998 because of technological advances. For example computer records were starting to be stored on computers. Another act was also set up regarding confidentiality is act is called the "access to health records act" this act was set up in 1990. ...read more.


Where as personal date requires explicit consent, for example your religious beliefs. The personal data that the rainbow leaders are aloud to hold about their rainbows are: * Name * Address - So that they can be contacted * Date of Birth - to ensure the child is the right age to join the rainbow guides * Telephone number - for contact in case of an emergency The sensitive data that the rainbow leads are aloud to hold about the rainbows are: * Health Details of medical conditions such as asthma to enable leaders to be prepared for medical emergencies and to avoid allergies. * Disabilities Details of any disability, to enable integration and to access any special provision required. * Religion/faith and race or ethnic origin To enable leaders to ensure programmes and menus take account of cultural needs The guiding association have set up a list of data protection principles. ...read more.


* If records are stored at home put them away when not in use. * If records are on a computer that others can access, e.g. via a network, keep the records on a disk and keep the disk safe. * Check with each data subject that her record is correct at least once a year. * Destroy out of date records by burning or shredding into small pieces. * Do not give lists to non-Guiding people or organisations, such as Churches, unless you have gained permission from the girl's parents or guardians to do so. * Do not use your records for anything other than Guiding purposes. * Keep the records in a way that while looking at one person's details you are not revealing someone else's on the same page. * Record facts not opinions. I have asked if these polices and put to use and I found out that they abide by each one and to make sure that they abide by the polices they have regular checks by the District Commissioner. ?? ?? ?? ?? Clare Wells :) ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Data Protection Act

    One of the main aims of this directive was to ensure the "Protection of fundamental rights and freedoms and in particular the right to privacy with respect to the processing of personal data in the telecommunications sector" What does the regulation cover?

  2. The Data Protection Act 1998 - questions and answers

    or paragraph 6(1) ('The processing is necessary for the purposes of legitimate interests pursued by the Data Controller...'). Care should be taken to ensure that the use does not extend to the point at which the data is being used as a quasi-database in which case registration under the Act will be essential.

  1. 3E-The legislation that protects individuals and groups from the misuse of ICT

    Overall, I believe that the law has been extremely effective in keeping everyone's data personal and secured. The advantages prevail over the disadvantages because with the law in place, a number of events are less likely to commence and even though there are a few drawbacks; without the law their will be more problems then with the law in place.

  2. Privacy and Data Protection: IT Law

    the kind of information they collect, the purposes for which it may be used, and any third parties to whom it may be disclosed. This notice must be given at the time of the collection of any personal information or "as soon thereafter as is practicable."

  1. Legal Aspects of Using Information Technology

    According to Supply of Goods Act 1979 and 1995, all goods must be, of satisfactory quality', at all time of delivery to the customer * Copyright and information ownership- the international rights to all site content must be secured or owned by the publisher, before its release on the internet.

  2. Data Protection Issues – Compliance Within Computing Organisations, The Causes, Effects and Consequences.

    The unlawful access or theft of private and personal data or statistics must at no times be allowed to compromise the ethics of business through accidental loss, destruction, damage or amendment to personal data. viii. Personal data will not be transferred to Countries without adequate protection In particular, Countries outside

  1. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    Data processing should meet the legal rights of the data subjects 7. Data holders should protect the data against loss, theft or corruption - it should not be able to be viewed by just anyone 8. Data should not be transferred outside the EU unless the country has adequate data

  2. You have to explain how you have looked after the equipment and ensured its ...

    Fireproof doors help contain fires. Smoke detectors should be used to detect fires at an early stage. Gas flooding systems are used in large computer installations and are preferred to water ones because the damage done by water is often greater than that by fire.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work