• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  • Level: GCSE
  • Subject: ICT
  • Word count: 1923

ICT Legislation

Extracts from this document...


Legislation Acts for ICT ICT equipment now have laws which everyone must abide by, they can still use their ICT to their every needs but they cannot exploit this use by accessing areas of information or data which are not meant to be seen by the public eye. This mainly includes things like government data and other people's personal information. The 1998 Data Protection Act The data protection act is basically the "right to privacy" .This is what everyone who has personal details and so forth on their pc expects since you don't want other people accessing your information. The data protection act was made a law in 1984 but it was replaced by a new one, the act in 1998 that included the European Union law. There are 8 principles for personal data: 1. Be processed fairly and lawfully 2. Be obtained for specified and lawful purposes 3. Be adequate relevant and not excessive for the purpose 4. Be accurate and up-to-date 5. Not to be kept longer than necessary 6. Be processed within the rights of data subjects 7. Be kept secure against loss damage and unauthorised and unlawful processing 8. Not be transferred to countries outside the European Economic Area. These are the 8 areas in which the data protection act is in control of. Say for example I had bank account details on my pc and I was exchanging bank details over the internet no one beside me should be able to access that data since it is my personal bank ...read more.


The Computer Misuse Act 1990 The computer misuse act secures all computer material against unauthorised access and modifications. This basically means that a person will not able to access a computer or a file on a computer without having some one else's consent. This act covers these three things: 1. Unauthorised access to computer material 2. Unauthorised access with the intent to commit or facilitates commission of further offences. 3. Unauthorised modification of computer material. These three things basically cover anyone from hacking, computer fraud, blackmail and viruses. This protects me at home mainly since when ever I access the internet and other websites it leaves me open to hackers because accessing a website you need to have an IP (internet protocol). This determines how much information passes between the two systems across the internet. If I entered a site a hacker could automatically get my IP address and using this they can enter my computer. For me to stop this I have to have a firewall this basically stops any unauthorised personal entering my computer with out my permission. If a hacker was able to access my computer they could get access to information like my credit card number and other personal information, since I use my card over the internet to order products from websites and with them hacking in to my computer they can get my credit card number and password. Hackers can also put viruses into my computer this will either cause my computer to crash or cause problems to it. ...read more.


If he does give the person the right to use this information they cannot duplicate it and pass it on it is for that one person and that person only. Stephen Hawking this act would cover over his lectures and his computer, for his lectures he must have a set of information in which he specifically wants his class to know that he knows him self. This is probably his own way of lecturing for someone to obtain this schedule and use it as their own copying Stephen's ideas this is against the copyright act has they are using his material with out his consent. They could obtain this information from his laptop but if this information is published on the net it would have the copyright laws on the same page stating the person can use the information but not pass it on. In the community this act covers copyright of any original information that a person in the community has created or designed from being taken and used as someone else's and sold on. For instance if some one in the community wrote a song or a book which would become famous later on if publish or brought out for sale and someone else took that idea with out authorisation and sold it as their own that is against the copyright act. This would mainly cover over downloading or uploading over the net with out authorisation; with out permission it is against the law to copy it. ?? ?? ?? ?? Parvaaz Ahmed 2001 Leytonstone School 13411 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    community as for example if we take hacking and someone tries to hack the account of a school or even internet cafes and libraries he will be able to destroy the computers and the law would not be able to do anything about it.

  2. Data Protection Act

    Compliance with the second Principle cannot be established simply by notification of the purposes for which personal data are processed. The commissioner takes a strict view of the concept of compatibility of processing of personal data. Part II of Schedule I of the Act provides guidance in interpreting the Second Principle.

  1. The Data Protection Act 1998 - questions and answers

    Following the request, the individual must be told by the data controller whether the data controller is processing personal data and if so to be given a description of the data, the purposes for which they are being processed and a description of those to whom data may be disclosed.

  2. The legislation that protects individuals and groups from the misuse of ICT

    The law is having a massive impact on his working style and his working routines. Everything that Mr. Clements does, he has to take into consideration the law, logging exactly what data is being used and who it is being given to.

  1. 3E-The legislation that protects individuals and groups from the misuse of ICT

    the organisation that has given out my personal information and are using the information for different purposes without my very own intelligence can be sued for carrying out this particular act. In order to abide by the law, I must agree on the condition stated such as my personal information

  2. Privacy and Data Protection: IT Law

    especially seal programs such as TRUSTe or BBBOnline.28 E-commerce legislation is a delicate topic in the US; therefore the administration traditionally concluded that a general regulation would be inappropriate, given how swiftly e-commerce is evolving, and has instead sought to encourage self-regulation in areas such as privacy, in the belief

  1. Assets table - recording the copyright information on the logos and pictures I used.

    I have cropped these image before it went onto my still movie and I have removed the fair trade logo to make it mine and to stop copy rite kicking in Still movie A picture of tea Image S N/A Image that will be used in my still movie I

  2. The impact of ICT on the environment

    One day surgery could no longer be needed for everything it is required for now as they believe it could give way to manipulating DNA and restoring damaged cells. Doctors and biologists decipher levels of complexity never imagined before, thanks to the use of computers.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work