• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

ICT LAWS

Extracts from this document...

Introduction

ICT LAWS In order to preserve the confidentiality and to protect our society from the misuse of improving technology and preach of basic privacy, laws and legislations were passed: Data Protection Act 1998: This Act covers information or data store in the computer or an organised paper filing system e.g. filing cabinet or about living people. The eight principals to Data Protection Act are as following: 1. Must be collected and used fairly and inside the law. 2. Must only be held and used for the reasons given to the Information Commissioner. 3. Can only be used for those registered purposes and only be disclosed to those people mentioned in the register entry. You cannot give it away or sell it unless you said you would to begin with. 4. Information held must be adequate (enough), relevant and not excessive (too much) when compared with the purpose stated in the register. So you must have enough detail but not too much for the job that you are doing with the data. 5. Must be accurate and be kept up to date. There is a duty to keep it up to date, for example to change an address when people move. ...read more.

Middle

Accessing computer material without permission e.g. looking at someone else's files. 2. Accessing computer material without permission with intent to commit further criminal offences e.g. hacking into the bank's computer and wanting to increase the amount in your account. 3. Altering computer data without permission e.g. writing a virus to destroy someone else's data, or actually changing the money in an account. This law was passed with a good purpose but is vague in affectivity. Just making something illegal or setting up regulations does not stop it happening, so responsible computer users need to take reasonable steps to keep their data safe. This includes regular backup and sufficient security with passwords. I will now look at how this act affects our society: HOW COMPUTER MISUSE ACT 1990 AFFECTS MR. IRWIN: ? Trying to gain access into another teacher's files by guessing the teacher's passwords. ? Hacking into other computers, whether it belongs to the school where he works or not. ? Altering computer data without permission for example sending or distributing viruses electronically to damage someone else's data/information HOW COMPUTER MISUSE ACT 1990 AFFECTS MR PATEL: ? He cannot use the internet to access or distribute any indecent material otherwise he could be in trouble with the police and may be sacked or convicted if found guilty ? ...read more.

Conclusion

I will now look at how the Copy Right Law affects our society: HOW COPY RIGHT LAW AFFECTS MR. IRWIN: ? It means that Mr. Irwin is not allowed to download illegal music whether it is for him or for his students. ? It means that he cannot photocopy the whole of the text books without permission or that are copyright protected otherwise he would be breaking this law. ? It makes it illegal for him to copy video/ CD's for students. HOW COPY RIGHT LAW AFFECT MR. PATEL: ? He can not copy DVD's and CD's if he is not in a position to do so. ? He cannot copy or download software or music from the internet without permission ? He must have a license for software that he uses to assist in his health HOW COPY RIGHT LAW AFFECT ME AS A STUDENT: ? It stops me from downloading illegal music from the internet ? It stops me from copying and pirating videos and DVDs ? It does not allow me to buy illegal audio and video tapes HOW COPY RIGHT LAW AFFECT THE COMMUNITY: ? It stops idea store from copying copy righted work without permission ? Police cannot download/ copy illegal music ? The Bank cannot use the software's that are not licensed to them GULEED SUDI 10D MR UKPEI UNIT 3E - 1 - ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Marked by a teacher

    Ict and the law

    4 star(s)

    Due to the laws of copyright, you cannot claim you made a file that you didn't originally make, and you cannot use any file/text you have copied in your own work unless you clearly state the origin of the file/text unless told otherwise or if you made the file/text originally.

  2. The Data Protection Act 1998 - questions and answers

    Data controllers will also be required to comply with information notices issued by the Commissioner requesting the data controller to provide certain details in order that the Commissioner can assess whether the provisions of the 1998 Act are being complied with.

  1. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    Here are examples of acts which help the Croydon Community: The employer has a responsibility to * Take reasonable steps to ensure the health, safety and welfare of their employees at work. * They must provide safe premises and systems of work * Employees must be aware of health and

  2. Data Protection Act

    This act provides guidance in interpreting this principle as follows: The Principle is not to be taken as being contravened because of any inaccuracy in personal data which accurately record information obtained by the data controller from the data subject or third party in case where :- a)

  1. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    However, the internet has a lot of mediums through which it can still manage to send viruses despite security. With the internet, I use my e-mail a lot. E-mail can come with attachments but these attachments aren't always safe. A common virus sent through emails is one involving spyware.

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    have altered or used his data for a variety of different reasons I.e. to obtain more income tax from his weekly or monthly wage. This is another feature of the law which benefits Mr. Obrien and ensures that he has control over the usages of his personal data.

  1. The legislation that protects individuals and groups from the misuse of ICT

    Any breaches of copyright are known as 'Copyright infringements'. This particular legislation is most applicable and relevant to me, because on a regular basis I download music tracks from the internet, copy tracks from friends and my own CD's, I also take material from the internet and use it within my own pieces of work.

  2. Right of privacy under Hong Kong's current laws

    Art 308 outlaws any interference with the privacy of people's communications such as mail and telephone calls. The PD(P)O Journalists' jobs have a lot to do with newsgathering and publishing information, these activities are bound by the Personal Data (Privacy)

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work