ICT LEGISLATIONS

Authors Avatar

ICT LEGISLATIONS

THE DATA PROTECTION ACT 1998

The Data Protection Act protects the personal data which is stored about you by different people .The 8 principles of the act are :

  • Processed fairly and lawfully
  • Processed for limited purposes
  • Adequate relevant and not excessive
  • Accurate
  • Not kept for longer than necessary
  • Processed in accordance with the individual's rights
  • Kept secure
  • not transferred to countries without adequate protection.

        Schools have permission from the home office and parents to know every thing about you whether it your mums name or you brothers. The police and the home office also have all our personal information. Teachers and anyone else who has your personal information cannot tell anyone anything about you.

There have been many people who have been prosecuted for disobeying the data protection act and here is one example. In 1995 the ODPR brought a case against a manger of the Woolwich Building Society for disclosing personal data to a person not sanctioned by the Woolwich's data protection register entry. This was a case, therefore, of the Woolwich, through one of its staff operating outside the terms of its registration. The manager had been trying to trace a Woolwich customer who was allegedly in arrears with her Woolwich mortgage. In doing so the manager disclosed to a tenant of the customer that she was in arrears. The manager was successfully prosecuted for the unauthorized disclosure. On the basis that the prosecution had jeopardized the manager’s career the Court dealt with the matter relatively leniently by imposing a conditional discharge.

The data protection act has now been in force for a long period of time and many organizations are finding it hard to abide by. Many companies still are not aware of the obligations under it. This act is particularly aimed at people with business.  

THE COMPUTER MISUSE ACT(1990)

The computer misuse act is designed to secure computers and data against unauthorized access or modification and covers a number of offences such as:

Join now!

  • Unauthorized access to computer material (basic hacking) including the illicit copying of software held in any computer. The penalty for this is up to six months imprisonment or up to a 5,000-pound fine.

  • Unauthorized access with intent to commit or facilitate commission of further offences, which covers more serious cases of hacking. The penalty of this is imprisonment and unlimited amount of fine.

  • Unauthorized modification of computer material which includes:

        Intentional destruction of data and software and which is unauthorized, the circulation of infected materials on line and an unauthorized addition of a password to a ...

This is a preview of the whole essay