• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  • Level: GCSE
  • Subject: ICT
  • Word count: 1923

ICT Legislation

Extracts from this document...


Legislation Acts for ICT ICT equipment now have laws which everyone must abide by, they can still use their ICT to their every needs but they cannot exploit this use by accessing areas of information or data which are not meant to be seen by the public eye. This mainly includes things like government data and other people's personal information. The 1998 Data Protection Act The data protection act is basically the "right to privacy" .This is what everyone who has personal details and so forth on their pc expects since you don't want other people accessing your information. The data protection act was made a law in 1984 but it was replaced by a new one, the act in 1998 that included the European Union law. There are 8 principles for personal data: 1. Be processed fairly and lawfully 2. Be obtained for specified and lawful purposes 3. Be adequate relevant and not excessive for the purpose 4. Be accurate and up-to-date 5. Not to be kept longer than necessary 6. Be processed within the rights of data subjects 7. Be kept secure against loss damage and unauthorised and unlawful processing 8. Not be transferred to countries outside the European Economic Area. These are the 8 areas in which the data protection act is in control of. Say for example I had bank account details on my pc and I was exchanging bank details over the internet no one beside me should be able to access that data since it is my personal bank ...read more.


The Computer Misuse Act 1990 The computer misuse act secures all computer material against unauthorised access and modifications. This basically means that a person will not able to access a computer or a file on a computer without having some one else's consent. This act covers these three things: 1. Unauthorised access to computer material 2. Unauthorised access with the intent to commit or facilitates commission of further offences. 3. Unauthorised modification of computer material. These three things basically cover anyone from hacking, computer fraud, blackmail and viruses. This protects me at home mainly since when ever I access the internet and other websites it leaves me open to hackers because accessing a website you need to have an IP (internet protocol). This determines how much information passes between the two systems across the internet. If I entered a site a hacker could automatically get my IP address and using this they can enter my computer. For me to stop this I have to have a firewall this basically stops any unauthorised personal entering my computer with out my permission. If a hacker was able to access my computer they could get access to information like my credit card number and other personal information, since I use my card over the internet to order products from websites and with them hacking in to my computer they can get my credit card number and password. Hackers can also put viruses into my computer this will either cause my computer to crash or cause problems to it. ...read more.


If he does give the person the right to use this information they cannot duplicate it and pass it on it is for that one person and that person only. Stephen Hawking this act would cover over his lectures and his computer, for his lectures he must have a set of information in which he specifically wants his class to know that he knows him self. This is probably his own way of lecturing for someone to obtain this schedule and use it as their own copying Stephen's ideas this is against the copyright act has they are using his material with out his consent. They could obtain this information from his laptop but if this information is published on the net it would have the copyright laws on the same page stating the person can use the information but not pass it on. In the community this act covers copyright of any original information that a person in the community has created or designed from being taken and used as someone else's and sold on. For instance if some one in the community wrote a song or a book which would become famous later on if publish or brought out for sale and someone else took that idea with out authorisation and sold it as their own that is against the copyright act. This would mainly cover over downloading or uploading over the net with out authorisation; with out permission it is against the law to copy it. ?? ?? ?? ?? Parvaaz Ahmed 2001 Leytonstone School 13411 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Assets table - recording the copyright information on the logos and pictures I used.

    This is good because it shows people all about making a trade. Information point Film 2 video p N/A A file made up of images and text to show how fair trade helps. I have added my own homemade music files to it so that it is more interesting than just being images on their own.

  2. The Data Protection Act 1998 - questions and answers

    Following the request, the individual must be told by the data controller whether the data controller is processing personal data and if so to be given a description of the data, the purposes for which they are being processed and a description of those to whom data may be disclosed.

  1. Data Protection Act

    Compliance with the second Principle cannot be established simply by notification of the purposes for which personal data are processed. The commissioner takes a strict view of the concept of compatibility of processing of personal data. Part II of Schedule I of the Act provides guidance in interpreting the Second Principle.

  2. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    and deception or spreading malicious rumors * Pornography - any material showing illegal acts stored on computers * Identity and financial abuses - Identity theft and misuse of credit cards and even printing counterfeit money * Viruses - programming and deliberately spreading viruses Evaluation: All of these laws affect the

  1. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    Leak of information Another example is a leak of private information. Leaks can happen when security procedures aren't taken properly and the web server becomes vulnerable or a hacker gives out the information by finding weaknesses in security. Organisations have to make sure, under the Data Protection Act, to maintain strict security procedures.

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    * Data should be produced lawfully. * Processed in line with your rights. * Processed for limited purposes. * Adequate, relevant and not excessive. IMPACT OF LAW UPON ME The data protection act creates an impact upon me because I have been involved and in a position where this specific law had been very effective.

  1. The legislation that protects individuals and groups from the misuse of ICT

    the long run it means to an extent that customer will have no unnecessary information stored about them, and it also means that what is stored about them is protected. All files that contain customer information and details are encrypted which means that no unauthorised person can access it, also

  2. Right of privacy under Hong Kong's current laws

    Exemptions under DPO By the virtue of s.61 of the DPO, journalists are also empowered to discover the truth and probably inform the public as they are allowed to be exempted from certain provisions of the DPO for collecting and using data which is involved in "news activity"13, given that

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work