• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  • Level: GCSE
  • Subject: ICT
  • Word count: 1923

ICT Legislation

Extracts from this document...


Legislation Acts for ICT ICT equipment now have laws which everyone must abide by, they can still use their ICT to their every needs but they cannot exploit this use by accessing areas of information or data which are not meant to be seen by the public eye. This mainly includes things like government data and other people's personal information. The 1998 Data Protection Act The data protection act is basically the "right to privacy" .This is what everyone who has personal details and so forth on their pc expects since you don't want other people accessing your information. The data protection act was made a law in 1984 but it was replaced by a new one, the act in 1998 that included the European Union law. There are 8 principles for personal data: 1. Be processed fairly and lawfully 2. Be obtained for specified and lawful purposes 3. Be adequate relevant and not excessive for the purpose 4. Be accurate and up-to-date 5. Not to be kept longer than necessary 6. Be processed within the rights of data subjects 7. Be kept secure against loss damage and unauthorised and unlawful processing 8. Not be transferred to countries outside the European Economic Area. These are the 8 areas in which the data protection act is in control of. Say for example I had bank account details on my pc and I was exchanging bank details over the internet no one beside me should be able to access that data since it is my personal bank ...read more.


The Computer Misuse Act 1990 The computer misuse act secures all computer material against unauthorised access and modifications. This basically means that a person will not able to access a computer or a file on a computer without having some one else's consent. This act covers these three things: 1. Unauthorised access to computer material 2. Unauthorised access with the intent to commit or facilitates commission of further offences. 3. Unauthorised modification of computer material. These three things basically cover anyone from hacking, computer fraud, blackmail and viruses. This protects me at home mainly since when ever I access the internet and other websites it leaves me open to hackers because accessing a website you need to have an IP (internet protocol). This determines how much information passes between the two systems across the internet. If I entered a site a hacker could automatically get my IP address and using this they can enter my computer. For me to stop this I have to have a firewall this basically stops any unauthorised personal entering my computer with out my permission. If a hacker was able to access my computer they could get access to information like my credit card number and other personal information, since I use my card over the internet to order products from websites and with them hacking in to my computer they can get my credit card number and password. Hackers can also put viruses into my computer this will either cause my computer to crash or cause problems to it. ...read more.


If he does give the person the right to use this information they cannot duplicate it and pass it on it is for that one person and that person only. Stephen Hawking this act would cover over his lectures and his computer, for his lectures he must have a set of information in which he specifically wants his class to know that he knows him self. This is probably his own way of lecturing for someone to obtain this schedule and use it as their own copying Stephen's ideas this is against the copyright act has they are using his material with out his consent. They could obtain this information from his laptop but if this information is published on the net it would have the copyright laws on the same page stating the person can use the information but not pass it on. In the community this act covers copyright of any original information that a person in the community has created or designed from being taken and used as someone else's and sold on. For instance if some one in the community wrote a song or a book which would become famous later on if publish or brought out for sale and someone else took that idea with out authorisation and sold it as their own that is against the copyright act. This would mainly cover over downloading or uploading over the net with out authorisation; with out permission it is against the law to copy it. ?? ?? ?? ?? Parvaaz Ahmed 2001 Leytonstone School 13411 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Assets table - recording the copyright information on the logos and pictures I used.

    Information point Film 1 video P N/A A file made up of images and text to show how fair trade helps. I have added my own homemade music files to it so that it is more interesting than just being images on their own.

  2. The purpose of legislation is to control and regulate the use of ICT

    last principal director, author or composer dies, or the work is made available to the public. -Health and safety at work act in 1974 This Act provides that every employer must conduct his undertaking in such a way as to ensure, so far as is reasonably practicable, that persons not

  1. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    and deception or spreading malicious rumors * Pornography - any material showing illegal acts stored on computers * Identity and financial abuses - Identity theft and misuse of credit cards and even printing counterfeit money * Viruses - programming and deliberately spreading viruses Evaluation: All of these laws affect the

  2. The Data Protection Act 1998 - questions and answers

    How do I make a request to see the information? An individual is required to make a request to see the information in writing and to pay a fee to the data controller. This fee is currently a maximum of �10 and this is likely to stay the same under the 1998 Act.

  1. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    A leak enabling people to access customer's strictly private data directly goes against the Data Protection Act. That's why it is important to keep up security in an organisation. An example of this would be the Cahoot breach. Cahoot is an internet bank that, as a bank, naturally holds personal data of all its customers.

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    When registering to be a member of the secondary school I am currently studying at, my personal details were stored on the school database. I had received a letter confirming the fact that the information shall be kept confidential and away from the use of others without my very own knowledge and consent.

  1. Data Protection Act

    relevant exemption applies):- - The data subject has given his consent to the processing - The processing is necessary - a) For the performance of a contract to which the data subject is a party; or b) For the taking of steps at the request of the data subject with a view to entering into a contract.

  2. Is the UK copyright act of 1988 still an adequate means of protecting intellectual ...

    * Jurisdiction Issues Perhaps the greatest shortcoming of the UK copyright Act of 1988 is that it only implies to the United Kingdom and thus what maybe considered against the law and breaking copyright agreements in the UK may be perfectly legal in the United States.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work