• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  • Level: GCSE
  • Subject: ICT
  • Word count: 1639


Extracts from this document...


ICT LEGISLATIONS THE DATA PROTECTION ACT 1998 The Data Protection Act protects the personal data which is stored about you by different people .The 8 principles of the act are : * Processed fairly and lawfully * Processed for limited purposes * Adequate relevant and not excessive * Accurate * Not kept for longer than necessary * Processed in accordance with the individual's rights * Kept secure * not transferred to countries without adequate protection. Schools have permission from the home office and parents to know every thing about you whether it your mums name or you brothers. The police and the home office also have all our personal information. Teachers and anyone else who has your personal information cannot tell anyone anything about you. There have been many people who have been prosecuted for disobeying the data protection act and here is one example. In 1995 the ODPR brought a case against a manger of the Woolwich Building Society for disclosing personal data to a person not sanctioned by the Woolwich's data protection register entry. This was a case, therefore, of the Woolwich, through one of its staff operating outside the terms of its registration. The manager had been trying to trace a Woolwich customer who was allegedly in arrears with her Woolwich mortgage. ...read more.


Not a bad hit rate. But not a deterrent in itself. COPYRIGHT, DESIGNS AND PATENTS ACT (1989) The Copyright, Design and Patents Act 1988 came into force on 1 August 1989.The owner of copyright has the right to copy it, issue it to the public in any form. This act is designed to a subsequent amendment to the 1988 Copyright Act confused the issue of lifetime of Copyright by acting retrospectively. This amendment came into effect on 1st January 1996. This meant that some materials that had come out of copyright suddenly gained Copyright again. It increased the term of Copyright (for some works) from 50 to 70 years from 31st December of the year the creator died. For anonymous works then it is 70 years from the end of the year of publication. In all aspects, it is best to refer to the Law in operation at the time the material was created, for example if a photograph was created in 1956, then you have to refer to the 1956 Copyright Act to define the Copyright owner and who to approach for clearance. Law firms are now trying to crackdown on copyright and are now being advised alert clients and there own staff to the dangers of having illegal copyright material on pc's following tougher regulations which have now been introduced. ...read more.


This is one way how this act effects me and socially. The uk national health service makes sure that these regulations are ensured. REGULATION OF INVESTIGATORY POWERS ACT (2000) This act is about defining the powers the government and it's security, intelligence and communications and data. This act allows the government to issue an interception warrant to an ISP (or even a mobile phone company) for some communications data, on vague grounds such as "national security", "preventing or detecting crime" or even "safe guarding the economic well being of the UK". If they do this, the employee(s) the interception warrant is served to must comply with it or face 2 years in jail. They must NEVER tell anyone about it either or face five years in jail. Thus the government could demand all the data that flows to and from your internet account and you would never be allowed to know about it. I think this is not a good act because the act requires of any employee of a company providing a public telecommunications service that they obey interception warrants or face up to 2 years in jail. ?? ?? ?? ?? 1 Hizar nisar 10s m-i-l ict and legislation ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. The Data Protection Act 1998 - questions and answers

    It may be that such data should be kept in a file to which a password, known only to selected trustworthy members of staff, was applied. Now, I work for a very large company. Who is legally liable for any infringement of the Data Protection Principles or the Act?

  2. Data Protection Act

    Taking in account of he purpose or purposes for which the data were obtained and further processed the data controller has taken reasonable steps to ensure the accuracy of the data and b) If the data subject has notified the data controller of the data subject's view that there inaccurate the data indicate that fact.

  1. Car Safety

    The aluminium bonnet has cone-type construction to absorb and cushion impacts in the event of a car-pedestrian accident. Crash worthiness is particularly sound at the vehicle's sides, which, in spite of the absence of centre pillars, exhibit crash safety on a par with traditional four-door sedans.

  2. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    If the Employer does not take care of all these laws and decides not to follow them he could be in serious trouble. How legislation affects Croydon Community Laws and acts affect the Croydon Community in many ways such as Croydon Community has a library which is also protected by

  1. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    Facebook can also retain data of its users and users will have no control over what information of them stays on the internet and what goes. While the Data Protection Act in this case imposes a limit, it cannot protect the whole user-base.

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    This law also keeps a confidentiality of my personal information and precludes misuse of my personal data. However, there are also a few drawbacks of the law upon me. The data access being poorly secured by an organisation will enable easy access for hackers or even employees in a workplace who have the bad intention of ruining the working environment.

  1. The legislation that protects individuals and groups from the misuse of ICT

    To improve the overall impact and effect of the Data protection act there is a need for tighter protocols to be introduced and for easier ways of tracking that criminal offences have been committed. A way that the impact could be improved is through a means of logging data movement,

  2. Right of privacy under Hong Kong's current laws

    In many circumstances, both the number of legal factors and information subjects can be very large. Those contemplations and inquiries would be not only hard, but impractical, not to mention the application of consent for future personal defence required under the proposal.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work