• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

IT And Legislation

Extracts from this document...

Introduction

Ict And Legislation TABREZ AKHTAR 10E The Data Protection Act (1998) It sets rules for procession of information that you have not given permission for, information about living, identifiable individuals. This means any identifiable data, such as a name or address. Any business storing information must comply with eight principles. These are: * Fairly and lawfully processed * Processed for limited purposes and not any manner incompatible with those purposes * Adequate, relevant and not excessive * Accurate * Not kept for longer than necessary * Processed in line with the data's subject rights * Secure * Not transferred to countries with adequate protection The school ensure they comply with the DPA in dealing with your personal data by letting certain teachers have access to the information. TESCO 'How it can go wrong ' Supermarket Tesco claims to be the biggest dotcom grocer in the world, having taken �146 million in a half-year period between February and August, and making a profit online. In May, Tesco called some of its online customers, asking them to rate its services. Those who reject such contact often refuse to give out a phone number, but Tesco.com will not accept registration without one. ...read more.

Middle

The hacker to launch attacks on other computers to extort cash from firms then uses the infected computer, known as a zombie. The 27-year-old has been charged with a number of offences under the Computer Misuse Act 1990. This law works well because this stops viruses being spread deliberately and damaging the computers. This law applies to my working adult because he uses the computer often and so he must make sure he doesn't misuse it. Copyright, Design and Patents Act (1989) This law needs to exist because it stops people from copying other people. It stops them from taking other peoples design. This law provides legal protection for many public things and without this there will be a lot of counterfeiting. My working adults life is affected by this by him making sure all the information he has on his website is not copyright and to make sure he hasn't copied anyone else's design. Yes I have breached this act in some way. There are some problems with enforcing this act because not many people will know about the law and they may not know which information is copyrightable. This law does not work well because you may not be aware who's taking your information therefore they will not be prosecuted. ...read more.

Conclusion

These regulations are needed so people are aware of what they have to do to keep the workplace safe. The inspectors make sure that the law is enforced and if they fully understand the law. These regulations are effective because it makes the employees aware of what they have to do to keep the workplace safe. This act effects my working adults life because they have to make sure their environment is safe and if it is not then they risk theirs and others healths. Regulations of Investogary Powers Act (2000) This act is about defining the powers the government and its security, intelligence and communications bodies will have to snoop on electronic communications and data. This act might affect my working adults using e-mail at work because the government processes all the e-mail he sends. This act is a good thing and a bad thing because it helps the government have the legal power to read all electrical communications that the public makes and gives him the off chance of catching people committing crimes, however he gets to read all the personal messages sent by the public. This law does not work very well because people still send junk and abusive e-mail. This law applies to me because I send e-mails and I have to make sure it's not abusive and junk because I know it is going to be processed. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Marked by a teacher

    Ict and the law

    4 star(s)

    It means that people should not attempt to access my areas and try and change my files on there. It also means that people should not try to add viruses or Trojans onto my user areas to try and gain information about me that could be used for fraud or blackmail.

  2. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    The Data Protection act 1. Data must not be processed unless there is a specific lawful reason to do so. 2. Data must only be obtained and used for the stated purposes 3. Data should be adequate, relevant and not excessive for the specified use 4.

  1. Data Protection Act

    The public authorities in two ways hold the information: - To adopt and maintain publication schemes, which should have the effect of improving the quality and amount of information routinely made available to the public. - By creating the right to make the request of information (is effective in January 2005).

  2. The Data Protection Act 1998 - questions and answers

    This includes the names and addresses of all my staff and my customers. Am I subject to the Act? Probably yes. It would appear that the information which you are holding falls within the definition of Personal Data in the Act and that, in that you will be able to

  1. The legislation that protects individuals and groups from the misuse of ICT

    Even today with the many safety risks accounted for there are still jobs which include hazardous operations carried out in the workplace, however this act means that any such thing should still be carried out and undertaken as safely as possible or if not, not at all.

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    With the data protection act, I wouldn't need to feel tensed about giving my personal details to organisation because I no the data protection act ensures confidentiality of my personal information and if I find any flaws on my data, I can easily take the matter up in court as clearly stated by the law.

  1. Leaflet design for Finding Nemo.

    Alternatively, you can click on images so the define your search which makes the google engine only come out with images and not websites. I used this search page by typing in 'Finding Nemo images'. I then clicked on images, so to define my search so it will only show images and not websites.

  2. Privacy and Data Protection: IT Law

    These principles are actually quite similar to the principles incorporated into the 1995 directive: Transparency, Finality, Access security, Data quality and Limits on Data collection. 37 Then again, sectoral laws include the protection of financial records, health information, credit reports, video rentals, cable television, children's (under age thirteen)

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work