• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Different legislations that protect people from the misuse of ICT.

Extracts from this document...

Introduction

Report 3E. Introduction: In this report I am going to talk about 3 different legislations that protect people from the misuse of ICT. The legislations are all laws that are in working progress and all of them can if broken carry a prison sentence or a fine with them. Data Protection Act (1998): The Data Protection Act 1998 sets out to protect the privacy of personal information. It only covers personal information about living individuals, not about businesses. It covers data stored on computer or in a paper-based filing system. It lets people check what data is being held about them. The Data Protection Act 1998 sets out to protect the privacy of personal information. It is run by the Information Commissioner's Office. These are the 8 principles of the Data Protections Act: 1. Fairly and lawfully processed (used) 2. Used for limited purposes 3. Adequate and relevant. Only what is needed may be used 4. Accurate 5. Not kept for longer than is necessary 6. Accessible to the individual and able to be corrected or removed where necessary 7. Secure 8. Not transferred to countries without adequate protectioIn report 3B Dr Pratab used to input his clients personally information such as house address etc in to his computer. ...read more.

Middle

They have to assess the risks and do as much as they can to reduce them. This Act would mainly affect Nikesh Patel in report 3C. Nik was a disabled student and due to the muscle breakdown in his arms he is not able to use them to well and uses the computer most of the time to do his work. He is also unable to use his legs and so is also in a wheelchair most of his time at school. His school needs to ensure that Nik has regular short breaks from the computer screen so that he doesn't get eye restrains and headaches. They also have to make sure that they place him in a suitable place that doesn't get too much glare reflecting of his computer screen from the sun. In addition o this they also have to make sure that he is not at his computer all the time and also gets some exercise. He also needs to have a footrest so that his legs aren't straining too much. Evaluation of the impact of the health and safety act at work (1994): The law really helps Nikesh as this means that when he is at school he will not suffer any more injury alongside his disabilities. ...read more.

Conclusion

file sharing products such as limewire or bearshare to other companies such as apple who charge a small amount to buy the song. Evaluation on the impact of Copyright, Designs and Patents Act (1988/89): If I am found or caught downloading songs illegally it is very rare that someone would prosecute me unless it was a really big crime such as me actually copying the song and illegally selling it to other people and making a profit from it with out the permission of the owner of that product. This is also the same with the copying of coursework as that too can be copyrighted if a student is found doing that then there are much worse consequences such as the student being withdrawal from the course for plagiarism. If I want to use a product than I need to get a license for that product which normally comes with purchasing the product in normally comes in the form of a code that is unique to that specific software only. If I do want to copy the product I need to get the permission of the owner or creator of that product which would come in the form of a license depending on the amount of copies I want to make. ?? ?? ?? ?? Bharat Patel 10N ICT C/W Report 3E ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    CD's on your computer and sharing them on the internet * Viruses - programming and deliberately spreading viruses Evaluation: These are the main computer misuse acts which affect her as for example someone tries to hack her computer without her wanting to he could do anything but because of the

  2. The Data Protection Act 1998 - questions and answers

    The list of names and addresses constitutes personal data. In terms of the 1998 Act it is likely that the shopkeeper would require to register even if he did not keep the information on a computer as, unless all the information were stored randomly in a shoe box, it would form part of a relevant filing system.

  1. Car Safety

    Safety belts Three-point lap and shoulder safety belts are the best means of occupant protection in almost all types of crash. Wearing a safety belt can halve the risk of being injured or killed in a crash. Safety belts offer protection in three key ways: * They prevent or minimise

  2. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    bank account or some other account, their identity can be used to benefit the hacker and leave the original owner with a sum of money to pay. People could use credit cards that didn't belong to them. This was a serious crime and the Data Protection Act as well as the Computer Misuse Act protects against this.

  1. 3E-The legislation that protects individuals and groups from the misuse of ICT

    and not for any other illegal use and as an individual I should comply with them and shall know how and where my data is placed, thus protects my data from misuse. I must also provide organisations that require my details with the complete truth; false details should never be

  2. ICT LEGISLATIONS

    The penalty of this is imprisonment and unlimited amount of fine. * Unauthorized modification of computer material which includes: Intentional destruction of data and software and which is unauthorized, the circulation of infected materials on line and an unauthorized addition of a password to a data file.

  1. Data Protection Act

    There are two means by which a data controller may specify the purpose or purposes for which the personal data are obtained, namely a) in notice given by the data controller to the data subject in accordance with the fair processing requirements or, b)

  2. Critically evaluate the extent to which it can be said that copyright law gives ...

    Say for example if a person were to accidentally create a contemporary art form, would this then be able to gain copyright? What the courts will find is that more problems will occur with changes in time and opinion and to what is considered 'art' in the eyes of society.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work