Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  • Level: GCSE
  • Subject: ICT
  • Document length: 1182 words

Computers and the Law.

Extracts from this document...

Introduction

Computers and the Law Piracy Software piracy is the illegal copying of software either to sell or to use without permission. Copyright law makes it illegal to copy software without permission. Software companies suffer a great deal from piracy. A large amount of money is needed to research and develop new software and losing money due to piracy makes it harder for companies to develop new software. It also drives up the cost of software to the end-user to allow the companies to get back their development money. Software manufacturers often put a code which must be entered before the software can be used. This means that simply copying the disc is not enough, the unlock code also needs to be copied. While this is not foolproof it does put another obstacle in the way for the would be pirate. Some software also requires that the CD-ROM be in the CD drive when it is being used rather than installing the software on a number of computers from one disk. Back to Menu Hacking Hacking is the illegal access to other peoples computers. ...read more.

Middle

processed fairly and lawfully; 2. processed for limited purposes; 3. adequate, relevant and not excessive; 4. accurate; 5. not kept for longer than necessary; 6. processed in accordance with the individual's rights; 7. kept secure; 8. not transferred to countries without adequate protection. Rights for the Individual The individual can find out what information is held about them by writing to the person or organisation for a copy of the data held and a description of why it is processed and who it may be passed onto or seen by. There are exceptions to data access however. If providing the information would be likely to affect: * The way a crime is detected or prevented; * Catching or prosecuting offenders; * Accessing or collecting taxes or duty; * The rights to see certain health and social work details may also be limited. A person or organisation has 40 days to respond to a request for the data and must be given after sufficient proof of identity has been given and where necessary a fee of no more than £10. There are exceptions to the Data Protection Act. ...read more.

Conclusion

* Adjust the height and position of your chair, keyboard and screen so that they are right for you. Think in particular of your wrists, neck and eyes. If you are copying from a document it also should be placed carefully. * Readjust things regularly so that you do not remain for too long in the same posture. * Make sure that your back and wrists are adequately supported, and use a footrest if necessary. * Remember that even small movements such as keystrokes or turning the head to look from document to screen can cause strain if repeated with great frequency. You should stop work regularly and try to relax the muscles in your neck, wrists and fingers. * Adjust the brightness of your screen and avoid having light from lamps or windows reflected from your screen. Under some conditions, an anti-glare filter may be a suitable option to reduce glare and reflections from your screen. * Clean your screen regularly - and immediately if it becomes smeared. Proprietary cleaners are available, suitable for cleaning such screens. * Do not work with a faulty screen. Report faults as soon as they appear, however trivial they may seem. Even a slight flicker or distortion can aggravate eyestrain. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Marked by a teacher

    Ict and the law

    4 star(s)

    Due to the laws of copyright, you cannot claim you made a file that you didn't originally make, and you cannot use any file/text you have copied in your own work unless you clearly state the origin of the file/text unless told otherwise or if you made the file/text originally.

  2. Data Protection Act

    They may be able to withhold information because an exemption in the Act applies. In most cases exemptions the authority will have to go on to consider the public interest in disclosure.6 1.3 Question 3: Privacy and Electronic Communication Regulation 2003 (EC Directives)

  1. Privacy and Data Protection: IT Law

    Regarding Data retention, member states may withdraw data protection to allow criminal investigations or safeguard national security, defence and public security, but only where it constitutes a "necessary, appropriate and proportionate measure within a democratic society." (Art. 15 (1))

  2. Is the UK copyright act of 1988 still an adequate means of protecting intellectual ...

    of the Cyberspace Law Institute (CLI), a new on-line tribunal not bound by territorial borders. The project is carried out by eight "magistrates" (usually with an in-depth knowledge of technical as well as legal matters) who conduct arbitration via e-mail and publish their decisions on the institute's web site.

  1. 3E-The legislation that protects individuals and groups from the misuse of ICT

    The main improvement which I personally think is the act should state the protection type needed for all the different data types that can be stored. Some of these data may be highly crucial, which may need to be highly secured and some of them maybe minimally vital, which may need less protection.

  2. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    Sites usually require an email, a name, data of birth and other personal data, sometimes even including an address. These aren't too harmless when breaking the Data Protection Act. For example, the most that can happen would be that Mr Ajaib's e-mail address would be given out to the sponsors

  1. Car Safety

    This is achieved with innovative door reinforcements and locking mechanisms that form built-in pillars when the doors are locked in position. Also, side impact bars are optimally positioned to efficiently distribute impact energy. Active Safety measures include: - To help maximize stopping performance it is equipped with four-wheel anti-lock brakes (4W-ABS)

  2. Legislation protecting people & groups.

    * Copying computer programs illegally (i.e. software piracy). * Hacking into someone's system with a view to seeing the information or altering it. * Using a computer for various frauds; people have been known to put fictitious employees a payroll program and use false banks accounts open in the name of these employees to steal money.

  • Over 180,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work

Marked by a teacher

This essay has been marked by one of our great teachers. You can read the full teachers notes when you download the essay.

Peer reviewed

This essay has been reviewed by one of our specialist student essay reviewing squad. Read the full review on the essay page.

Peer reviewed

This essay has been reviewed by one of our specialist student essay reviewing squad. Read the full review under the essay preview on this page.