• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

ICT - Data Protection

Extracts from this document...

Introduction

DATA PROTECTION The Data Protection Act (DPA) is a law designed to protect personal data stored on computers. The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give legal rights to people who have information stored about them. The power of the computer During the second half of the 20th century computers were getting more powerful and easy to use. Companies, government and other organisations began to use them to store large amounts of information about people, such as their customers, clients and staff. Databases with this information can be quickly set up, searched, edited and accessed and take up less space than paper records. Personal data on computer Instead of paper records, computers were also being used routinely to keep personal data about people. This information included:- * names * addresses * financial information * medical records * criminal records * employment history For example, being a member of a sports club would mean that your name, age, medical details and payment record would be stored on a computer file. Ease of access to the information The information stored could be far more easily and flexibly used than if it was stored on paper. ...read more.

Middle

If someone who is not entitled to see these details can obtain access without permission it is unauthorised access. The Data Protection Act sets up rules to prevent this kind of unauthorised access to personal data and information. The Act sets up two types of personal data:- Personal data is about living people and could be:- - their name - address - medical details or banking details 'Sensitive' personal data is also about living people, but it includes one or more details of a data subject's: - racial or ethnic origin - political opinions - religion - membership of a trade union - health - criminal activity. There are more safeguards about sensitive data than ordinary personal data. Usually, a person must be asked specifically if sensitive data can be kept. The rights of data subjects People whose personal data is stored are called data subjects. The Act sets up rights for people who have data kept about them. You need to know these rights for the exam. They are: A Right of Subject Access A data subject has a right to be supplied by a data controller with the personal data held about him or her. The data controller can charge for this: usually a few pounds. ...read more.

Conclusion

It's great - because it saves a lot of time and effort! Text Message Alerts Alert services give information such as updates on the latest news headlines, sport scores and share prices. So they could be a newsflash or a football goal alert! Other alerts might be your daily horoscope and information services covering everything from music news to the latest stock market quotes. Normally you will 'sign up' to receive such a service by dialling a premium rate telephone number to cover the cost to the company of sending you the messages. Or, by sending a simple text message to a mobile number with a keyword such as 'START'. If you have not paid for the messages as part of the registration you will probably be charged for each text alert message you receive. So, it's really important to remember that nothing in this world is for free and to read all the small print. Logos and Ring tones Some of the more popular mobile phone handsets allow simple customisation. Using SMS technology you can receive short musical ringtones or small pictures to replace the operator logo on the main screen of your phone. But beware! Most of these services are now charged for, and often you have to use a premium rate telephone number to pay for the ringtone or logo. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    AS for example if the premises would not be safe enough to work in this would increase the number of accidents as mentioned above and people may even decide to leave the work for that reason in this case

  2. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    Bots can be made to do a certain task, to spam people and to bombard websites. That's why the Computer Misuse Act is vital in preventing these from happening. Hackers can be fined and charged up-to 5 years in jail.

  1. 3E-The legislation that protects individuals and groups from the misuse of ICT

    that the software shall keep everything secured before she had installed the software. Additionally, if she gives her credit car details when she is purchasing items via the internet or to gain access to her bank account, she knows her data will be kept confidential and away from the access

  2. Assets table - recording the copyright information on the logos and pictures I used.

    The purpose of it is because it was a perfect sized picture of fruit that I was able to use on my information point. Information point My logo Flash video P N/A A flash video that I have created for this project and used as my logo The design of

  1. Data Protection Act

    This law applies to all the workers of blockbuster. This is so that people that apply don't have to be worried that there details will not be misused. To make sure that no extra data can be collected blockbuster can only get the following information. 1. Name 2. Phone Number 3.

  2. The Legislation that protects individuals and groups from the misuse of ICT

    The owner(s) or the administrator(s) of the cyber cafes can install silent programmes such as keyloggers to store the keys that were pressed by the users of the cafe, so they can gain access to bank accounts, paypal accounts, e-mail, etc to transfer money to their own bank accounts without permission.

  1. You have to explain how you have looked after the equipment and ensured its ...

    Someone can easily be able to copy your work if you enable worldwide access. Viruses Viruses are programs whose purpose is to disrupt the sensible use of computers. Many viruses do little more then display messages on a screen, but some are designed to act after a certain period of

  2. Legal Aspects of Using Information Technology

    To fully understand the Act, businesses such as IKEA need to understand the meaning of the following definitions: * Data controller- this is a party that determines the purposes for and the way in which personal data are processed * Data processor- this is a person, other than an employee

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work