• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Different legislations that protect people from the misuse of ICT.

Extracts from this document...

Introduction

Report 3E. Introduction: In this report I am going to talk about 3 different legislations that protect people from the misuse of ICT. The legislations are all laws that are in working progress and all of them can if broken carry a prison sentence or a fine with them. Data Protection Act (1998): The Data Protection Act 1998 sets out to protect the privacy of personal information. It only covers personal information about living individuals, not about businesses. It covers data stored on computer or in a paper-based filing system. It lets people check what data is being held about them. The Data Protection Act 1998 sets out to protect the privacy of personal information. It is run by the Information Commissioner's Office. These are the 8 principles of the Data Protections Act: 1. Fairly and lawfully processed (used) 2. Used for limited purposes 3. Adequate and relevant. Only what is needed may be used 4. Accurate 5. Not kept for longer than is necessary 6. Accessible to the individual and able to be corrected or removed where necessary 7. Secure 8. Not transferred to countries without adequate protectioIn report 3B Dr Pratab used to input his clients personally information such as house address etc in to his computer. ...read more.

Middle

They have to assess the risks and do as much as they can to reduce them. This Act would mainly affect Nikesh Patel in report 3C. Nik was a disabled student and due to the muscle breakdown in his arms he is not able to use them to well and uses the computer most of the time to do his work. He is also unable to use his legs and so is also in a wheelchair most of his time at school. His school needs to ensure that Nik has regular short breaks from the computer screen so that he doesn't get eye restrains and headaches. They also have to make sure that they place him in a suitable place that doesn't get too much glare reflecting of his computer screen from the sun. In addition o this they also have to make sure that he is not at his computer all the time and also gets some exercise. He also needs to have a footrest so that his legs aren't straining too much. Evaluation of the impact of the health and safety act at work (1994): The law really helps Nikesh as this means that when he is at school he will not suffer any more injury alongside his disabilities. ...read more.

Conclusion

file sharing products such as limewire or bearshare to other companies such as apple who charge a small amount to buy the song. Evaluation on the impact of Copyright, Designs and Patents Act (1988/89): If I am found or caught downloading songs illegally it is very rare that someone would prosecute me unless it was a really big crime such as me actually copying the song and illegally selling it to other people and making a profit from it with out the permission of the owner of that product. This is also the same with the copying of coursework as that too can be copyrighted if a student is found doing that then there are much worse consequences such as the student being withdrawal from the course for plagiarism. If I want to use a product than I need to get a license for that product which normally comes with purchasing the product in normally comes in the form of a code that is unique to that specific software only. If I do want to copy the product I need to get the permission of the owner or creator of that product which would come in the form of a license depending on the amount of copies I want to make. ?? ?? ?? ?? Bharat Patel 10N ICT C/W Report 3E ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. The impact of ICT on the environment

    You can now prepare documents in draft form and place them in computer storage. If the documents need to be changed, it can be retrieved, edited, and saved again or printed without retyping. Though all the above is true people still like to have information on paper.

  2. The Data Protection Act 1998 - questions and answers

    The way in which the shopkeeper will require to control access to the information will depend on its nature. If all that is stored is names, addresses and account details, it may be sufficient that the computer is kept securely in the premises and that they are lockfast.

  1. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    CD's on your computer and sharing them on the internet * Viruses - programming and deliberately spreading viruses Evaluation: These are the main computer misuse acts which affect her as for example someone tries to hack her computer without her wanting to he could do anything but because of the

  2. Data Protection Act

    It provides that a level of protection is one which is adequate in all the circumstances of the case having regard in particular to: - the nature of the personal data, law in force in the country or territory if final destination of that information.

  1. Car Safety

    the 'second impact' in a crash - the impact of the occupants against the vehicle interior and each other. It is this second impact that causes injuries and fatalities. * They stop the wearer from being thrown from the vehicle.

  2. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    But a lot of computers are still unprotected and vulnerable to hacking. Thousands of computers used to be hacked all the time. Hacking was quite simple, then. People could simply send viruses which would plant a bug. A bug could do numerous things, record the tasks, act as a key logger etc.

  1. 3E-The legislation that protects individuals and groups from the misuse of ICT

    the organisation that has given out my personal information and are using the information for different purposes without my very own intelligence can be sued for carrying out this particular act. In order to abide by the law, I must agree on the condition stated such as my personal information

  2. The legislation that protects individuals and groups from the misuse of ICT

    that their information is kept secure, the law means that any breach if the law would either result in hefty fines or imprisonment, however the extent that individuals or holders of information are protect is often limited, even with the law in place it is often difficult for somebody to

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work