• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  • Level: GCSE
  • Subject: ICT
  • Word count: 1639

ICT LEGISLATIONS

Extracts from this document...

Introduction

ICT LEGISLATIONS THE DATA PROTECTION ACT 1998 The Data Protection Act protects the personal data which is stored about you by different people .The 8 principles of the act are : * Processed fairly and lawfully * Processed for limited purposes * Adequate relevant and not excessive * Accurate * Not kept for longer than necessary * Processed in accordance with the individual's rights * Kept secure * not transferred to countries without adequate protection. Schools have permission from the home office and parents to know every thing about you whether it your mums name or you brothers. The police and the home office also have all our personal information. Teachers and anyone else who has your personal information cannot tell anyone anything about you. There have been many people who have been prosecuted for disobeying the data protection act and here is one example. In 1995 the ODPR brought a case against a manger of the Woolwich Building Society for disclosing personal data to a person not sanctioned by the Woolwich's data protection register entry. This was a case, therefore, of the Woolwich, through one of its staff operating outside the terms of its registration. The manager had been trying to trace a Woolwich customer who was allegedly in arrears with her Woolwich mortgage. ...read more.

Middle

Not a bad hit rate. But not a deterrent in itself. COPYRIGHT, DESIGNS AND PATENTS ACT (1989) The Copyright, Design and Patents Act 1988 came into force on 1 August 1989.The owner of copyright has the right to copy it, issue it to the public in any form. This act is designed to a subsequent amendment to the 1988 Copyright Act confused the issue of lifetime of Copyright by acting retrospectively. This amendment came into effect on 1st January 1996. This meant that some materials that had come out of copyright suddenly gained Copyright again. It increased the term of Copyright (for some works) from 50 to 70 years from 31st December of the year the creator died. For anonymous works then it is 70 years from the end of the year of publication. In all aspects, it is best to refer to the Law in operation at the time the material was created, for example if a photograph was created in 1956, then you have to refer to the 1956 Copyright Act to define the Copyright owner and who to approach for clearance. Law firms are now trying to crackdown on copyright and are now being advised alert clients and there own staff to the dangers of having illegal copyright material on pc's following tougher regulations which have now been introduced. ...read more.

Conclusion

This is one way how this act effects me and socially. The uk national health service makes sure that these regulations are ensured. REGULATION OF INVESTIGATORY POWERS ACT (2000) This act is about defining the powers the government and it's security, intelligence and communications and data. This act allows the government to issue an interception warrant to an ISP (or even a mobile phone company) for some communications data, on vague grounds such as "national security", "preventing or detecting crime" or even "safe guarding the economic well being of the UK". If they do this, the employee(s) the interception warrant is served to must comply with it or face 2 years in jail. They must NEVER tell anyone about it either or face five years in jail. Thus the government could demand all the data that flows to and from your internet account and you would never be allowed to know about it. I think this is not a good act because the act requires of any employee of a company providing a public telecommunications service that they obey interception warrants or face up to 2 years in jail. ?? ?? ?? ?? 1 Hizar nisar 10s m-i-l ict and legislation ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    a lot of laws which need to be followed as well as for example tube stations have laws which also need to be followed as well as the CCTV cameras which also have laws as they may not be allowed to be used in certain areas.

  2. The Data Protection Act 1998 - questions and answers

    It may be that such data should be kept in a file to which a password, known only to selected trustworthy members of staff, was applied. Now, I work for a very large company. Who is legally liable for any infringement of the Data Protection Principles or the Act?

  1. Car Safety

    collision * ISOFIX-compliant child seat anchors with top tether are standard * Soft, impact absorbing interior to help reduce secondary impacts in a collision * Reinforced cabin-trunk bulkhead to prevent luggage intrusion * Improved bonnet construction to reduce injury to pedestrians.

  2. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    The database retains all this information until it is somehow deleted. A librarian can easily access people's phone numbers, address and other details. But more-so than that, librarians can also access people's accounts and can add impending fines, renew or return their books even if they already haven't done so

  1. 3E-The legislation that protects individuals and groups from the misuse of ICT

    to be highly secured and some of them maybe minimally vital, which may need less protection. Highly sophisticated encryption shall be needed for the data which are crucial and important. Therefore not all data will need to be highly secured and is something that should be mentioned in this specific law.

  2. Data Protection Act

    before processing of sensitive personal data can comply with the First Principle: - The processing is necessary for the purposes of exercising or performing any right or obligation which is conferred or imposed by law on the data controller in connection with employment.

  1. Is the UK copyright act of 1988 still an adequate means of protecting intellectual ...

    * Underlying Characteristics of the Internet Caching The Internet, operates on a ubiquitous `copying and transmitting fashion,' i.e. information is accessed by duplicating data stored in binary files before sending it across the globe - a process known as Caching.

  2. The impact of ICT on the environment

    In the future you could carry credit card sized imprints of your whole genetic code. One ethical issue surrounding the use of ICT in health and medicine is the development of cloning. Computers have helped scientists in the cloning process by mapping the DNA.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work