• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  • Level: GCSE
  • Subject: ICT
  • Word count: 9617

ICT AND SOCIETY

Extracts from this document...

Introduction

ICT AND SOCIETY Introduction In this coursework I will be describing the different Acts designed for different purposes to protect individuals, the community, people with special needs and the working adult. I will be talking about the Data Protection Act 1984 later changed to 1998, The Computer Misuse Act 1990, The Freedom of Information Act 2000 and The Copyright Design and Patterns Act 1989. All these Acts are deigned for the benefit of individuals as it restricts them from breaking some of the laws which is illegal. Task1 The Data Protection Act 1998 The Data Protection Act was developed to give protection and lay down rules about how data about people can be used. Usually this data is stored on a computer. The Data protection Act(DPA) is a United Kingdom Act of parliament that provides a legal basis and allowing for the privacy and protection of data of individuals in the UK. The act places restrictions on organisations which collect or hold data which can identify a living person. The Act does not apply to domestic use e.g. keeping a personal address book. Data collected by any person or organisation may only be used for the specific purposes for which they were collected. Personal data may only be kept for an appropriate length of time and must not be disclosed to other parties without the consent of the data owner, unless there is legislation or other overriding legitimate reason to share the information on former pupils for no longer than ten years. The act is overseen by an independent government authority, the Office of the information Commissioner. Individuals and organisations which store personal data must register with the Information Commissioner. Why was it introduced? It was introduced for the safety of the general people, to organize the way data was handled on computers and to give legal rights to the people who information stored about them. ...read more.

Middle

It restricts people from making copies and distributing those copies to other people else without the permission of the original owner. If the owner becomes aware of it than he can sue that specific person and that person will face certain consequences such as: being arrested, prison for a certain time limit and you can also get charged for it. This legislation pretty much affects everyone as it affects any person in employment or anyone unemployed. This original Copyright, Designs and Patents Act was in existence long before computers were invented and it has since been widened to include computer software in order to prohibit the making of illegal copies. How the legislation is used by the groups or individuals described in other unit 3 assignments? Why was it introduced? The Act was originally set up to protect the work of authors, artists and composers from being reproduced or copied without permission. The original Copyright, Designs and Patents Act was existence long before computers invented and since it has widened to include computer software on one computer and one notebook. The Positive Effect of this legislation are that it affects the individuals such as me a lot as the work they do is secured and if anyone who try to use or make a copy of their work than they will face certain consequences which could lead them to paying fines up to 5,000 or even being jailed for a certain amount of time this is if the original owner of that software or document becomes aware of it so this is effecting individuals a lot as the work they have created is less likely to be distributed without their permission. It also helps them as when the document created by the owner is safe of hackers and copyrighters which are very beneficial for the original owner. It furthermore affects the person in employment such as: Mark because a lot since the detail he has of his work is confidential and shouldn't be discussed with any people apart from the staff working with him. ...read more.

Conclusion

Others acts stop hacking, copying and allow people to know the information held of them by the organisation. It furthermore affects the person in employment such as: Mark because it again stops his employment organisation from distributing his personal data without his permission and Mark has the right to see his personal details whenever he wants although he has to pay to see but if knows the details held of him by the organisation are incorrect than he can tell them and if he is correct there is a chance of him receiving some capital. Others acts stop hacking, copying and allow people to know the information held of them by the organisation. Moreover it affects those with special needs such as: Mary as she is blind and uses special modern day technologies to help her through everyday lifestyle and working style so her data needs to be kept extra confidential because if her data is hacked, distributed or published she will have so many difficulties e.g. if she wanted a life insurance and the life insurance companies acknowledged about her disability they might refuse her application. Others acts stop hacking, copying and allow people to know the information held of them by the organisation. Finally it effects the Community (Southall) because the people in my society have lots of different type of personal data stored in different organisations e.g. NHS they cannot under no circumstances of the law of this act can tell an unknown person about a specific person who might be suffering from an illness such as: Cancer because again life insurance companies won't accept that specific person's application because if they knew that person will soon be dieing they would have to pay compensation to the person's family. Others acts stop hacking, copying and allow people to know the information held of them by the organisation. Bakhtawar Naveed 10MR Unit 3 ICT and Society Coursework 3E Page 1 of 18 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. ICT LAWS

    He cannot hack into a computer ? cannot send out viruses to other computers because if found out he could face prosecution HOW COMPUTER MISUSE ACT AFFECTS ME AS A STUDENT: ? Prevents chat room abuse- stops me from advertising illegal things on the internet through email ?

  2. The social, legal, moral aspects of I.C.T. In this report, I am going to ...

    Some of which are listed below:- * The data protection Act 1998 This presents the data themes with its right.

  1. The impact of ICT on the environment

    they can gather people for protests and campaigns by advertising them on the Internet. This can be seen as an advantage to the campaigners and supporters of greenpeace but a huge disadvantage to the companies and organisations that they are protesting against.

  2. The Data Protection Act 1998 - questions and answers

    If not, the Commissioner may take enforcement action. What amounts to consent? If the individual gives consent to the processing then the processing may be carried out. Unfortunately 'consent' is not defined in the Act. The Commissioner has issued guidelines which state that consent must be assessed in light of the facts.

  1. Car Safety

    An air bag will not block the driver's vision in a crash - it inflates and deflates in approximately one tenth of a second. Nor are air bags like soft pillows - to provide protection in a crash they must inflate incredibly quickly, which means the front of an air

  2. The following report will compare differences between internal and external information sources relevant to ...

    be locked or at the hands of a few chosen individuals, it is now under threat. Security Requirements Computer Misuse A threat is something that may damage the confidentiality, integrity or availability of a computer system. Although the event causing damage may never occur, the threat exists if there is a possibility that such an event might arise.

  1. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    The Copyright, Design and Patents Act (1989) * Using software without a proper licence * Copying music * Sharing music files that you have copied Evaluation: These are the main acts which affect me as if I decide to buy a pirated cd because it is cheaper it will be copied and I and the person who sold it to me could be in trouble.

  2. Legal Aspects of Using Information Technology

    The sixth principle states that the personal data must be processed in accordance with the rights of data subjects. Some of theses rights include the data subject's right to: * find out what data is being processed about them, in what manner and why * find out if data is

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work