• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Ict and the law

Extracts from this document...

Introduction

ICT and the Law In this piece of coursework I will be talking about various laws and how they affect myself, Mr James (An Adult with a disability) and Mr Hulse (An adult in employment. There are 4 laws I will be concentrating on: * The DPA * Health and Safety * The CMA * The Copyright, Design and Patents Act DPA (1998) The DPA (Data Protection Act) is a law which enforces how data is collected and stored. It stops it from being misused and transported to countries who do not have similar protection of data. For instance, if a school had the personal data of a student and sold it to someone or gave it away, or pinned it up on a notice board or a wall somewhere, they would be prosecuted by the DPA for misuse of data. The DPA ensures all personal information digitally stored is not used in any other way than necessary, and are not viewed and changed when there is no need to. How would you feel if you applied for a job and someone had changed your GCSE results to a very poor standard, making it near impossible to get the job, or if someone had made all the results really good, you would be given a position and expected to do more work than you can possibly accomplish. ...read more.

Middle

Another form of virus is a Trojan, these are more advanced viruses that enter a persons computer hiding inside another file such as a harmless bmp image file or an mp3, since these are more advanced they cause more harm and may be harder to find and remove, since they have the ability to run from the inside of a file. The next form of virus I will explain about is called a 'worm', the worm itself is harmless and is not usually found as a virus, but it creates viruses, and recreates them if they are deleted, making the viruses it creates near impossible to remove without removing the worm first. Some very advanced viruses called polymorph viruses have the ability to change their own programming to maximize stealth, infection and destruction. Most viruses nowadays are able to hide inside a file, infect other files, and in some cases they are a group of 2 or more worms that all create viruses and the other worms, these are almost impossible to find and remove and can be very frustrating and damaging. The CMA works to prevent such files from entering the internet and harming personal files. Copyright Everyone in the community must follow the laws of copyright, which state that whoever made a file (whoever recorded a video or took a picture) ...read more.

Conclusion

It means that there should not be tripping hazards or objects on the stairs that I could fall down. It means that the wires in the computer room are out of the way. It also means that I should take regular breaks every twenty minutes so I do not get eye strain. The monitors have to have the ability to change the brightness and contrast. As well as being safe at school Mr Hulse is responsible for the safety of the children in his care. This means he should constantly check if there is anything in the room that is dangerous and if so do all he can to remove the danger. The copyright designs and patent act affects me when I am completing my coursework for school. It means I cannot go onto the internet and copy pictures and text and saying that the work is mine. If I should use pictures and text from the internet I should reference where I have got this information from. This law also means that I cannot go onto the internet and use peer two peer sites such as piratebay to download movies and music without paying for them. If I want to download music I should go to sites such as Itunes and pay for the download or subscribe to a monthly contract. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a teacher thought of this essay

4 star(s)

Summary

This document gives the reader a good breadth of information covering the main points of the legislation mentioned in the title. There are some good examples in each section and this helps to demonstrate the understanding the student has of the principles of each piece of legislation.

Overall the document would benefit from clarity. This is in terms of the structure of the writing and also the way the legislation is portrayed as "law". It would help overall if there could be some clarification of what is law and what is not.

This piece of work is four stars overall.

Marked by teacher Ad Son 04/09/2013

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Peer reviewed

    The Data Protection Act

    4 star(s)

    It also affects another adult at work. It affects Joanne at work (a music teacher). She keeps many records of information of her students and staff. Due to this she must comply with this Act and make sure she keeps the information protected and kept unreachable to any unauthorised persons.

  2. The social, legal, moral aspects of I.C.T. In this report, I am going to ...

    There is little control on what can be downloaded or posted on the internet. 2. computers are replacing people at work * People are losing their jobs because the computers are machineries do their jobs. 3. easy to copy files * copying computer files is very easy.

  1. Assets table - recording the copyright information on the logos and pictures I used.

    I have photo shopped the image to say fair deal instead of fair trade. This image has been chosen by me because I saw it and it has shown me that fair trade should be worldwide not just in some parts of the world.

  2. The purpose of legislation is to control and regulate the use of ICT

    Copyright rises when an individual or organisation creates a work, and a work is subject to it if it is regarded as original, and must an exhibit a degree of labour, skill or judgement. Interpretation is related to the independent creation rather than the idea behind the creation.

  1. ICT LAWS

    The files may not be transferred outside of the European Economic Area (that's the EU plus some small European countries) unless the country that the data is being sent to has a suitable data protection law. This part of the Act has led to some countries passing similar laws to allow computer centres to be located in their area.

  2. The Child Protection Act.

    The Temporary assessment order, the Court Assessment order and Child protection order. In this assignment it is the Child protection order being discussed. In Queensland Protection orders are made under state or territory laws that provide a quick method of obtaining legal protection from physical abuse, sexual abuse or psychological abuse.

  1. Health and Safety

    Deep Vein Thrombosis (DVT) Formation of blood clots in the veins Typical on long flights, most commonly in the legs Can occur from sitting at a computer for too long Symptoms include pain, swelling and redness in the legs. Preventing DVT Take Regular breaks Keep legs moving while working.

  2. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    she will usually have to enter the credit and debit card details so if for example the company saves the details for longer then necessary it may be end up stolen or get corrupted. Even if the data gets shared the details could be used by anyone which also would affect her.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work