• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

IT And Legislation

Extracts from this document...

Introduction

Ict And Legislation TABREZ AKHTAR 10E The Data Protection Act (1998) It sets rules for procession of information that you have not given permission for, information about living, identifiable individuals. This means any identifiable data, such as a name or address. Any business storing information must comply with eight principles. These are: * Fairly and lawfully processed * Processed for limited purposes and not any manner incompatible with those purposes * Adequate, relevant and not excessive * Accurate * Not kept for longer than necessary * Processed in line with the data's subject rights * Secure * Not transferred to countries with adequate protection The school ensure they comply with the DPA in dealing with your personal data by letting certain teachers have access to the information. TESCO 'How it can go wrong ' Supermarket Tesco claims to be the biggest dotcom grocer in the world, having taken �146 million in a half-year period between February and August, and making a profit online. In May, Tesco called some of its online customers, asking them to rate its services. Those who reject such contact often refuse to give out a phone number, but Tesco.com will not accept registration without one. ...read more.

Middle

The hacker to launch attacks on other computers to extort cash from firms then uses the infected computer, known as a zombie. The 27-year-old has been charged with a number of offences under the Computer Misuse Act 1990. This law works well because this stops viruses being spread deliberately and damaging the computers. This law applies to my working adult because he uses the computer often and so he must make sure he doesn't misuse it. Copyright, Design and Patents Act (1989) This law needs to exist because it stops people from copying other people. It stops them from taking other peoples design. This law provides legal protection for many public things and without this there will be a lot of counterfeiting. My working adults life is affected by this by him making sure all the information he has on his website is not copyright and to make sure he hasn't copied anyone else's design. Yes I have breached this act in some way. There are some problems with enforcing this act because not many people will know about the law and they may not know which information is copyrightable. This law does not work well because you may not be aware who's taking your information therefore they will not be prosecuted. ...read more.

Conclusion

These regulations are needed so people are aware of what they have to do to keep the workplace safe. The inspectors make sure that the law is enforced and if they fully understand the law. These regulations are effective because it makes the employees aware of what they have to do to keep the workplace safe. This act effects my working adults life because they have to make sure their environment is safe and if it is not then they risk theirs and others healths. Regulations of Investogary Powers Act (2000) This act is about defining the powers the government and its security, intelligence and communications bodies will have to snoop on electronic communications and data. This act might affect my working adults using e-mail at work because the government processes all the e-mail he sends. This act is a good thing and a bad thing because it helps the government have the legal power to read all electrical communications that the public makes and gives him the off chance of catching people committing crimes, however he gets to read all the personal messages sent by the public. This law does not work very well because people still send junk and abusive e-mail. This law applies to me because I send e-mails and I have to make sure it's not abusive and junk because I know it is going to be processed. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Marked by a teacher

    Ict and the law

    4 star(s)

    It means that the data they hold must abide to the 8 principles of the act. Both men also have information stored like I do; this means they have the same rights as me. The CMA helps to protect my user areas at home and school.

  2. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    The Data Protection act 1. Data must not be processed unless there is a specific lawful reason to do so. 2. Data must only be obtained and used for the stated purposes 3. Data should be adequate, relevant and not excessive for the specified use 4.

  1. Data Protection Act

    The public authorities in two ways hold the information: - To adopt and maintain publication schemes, which should have the effect of improving the quality and amount of information routinely made available to the public. - By creating the right to make the request of information (is effective in January 2005).

  2. The Data Protection Act 1998 - questions and answers

    This includes the names and addresses of all my staff and my customers. Am I subject to the Act? Probably yes. It would appear that the information which you are holding falls within the definition of Personal Data in the Act and that, in that you will be able to

  1. The legislation that protects individuals and groups from the misuse of ICT

    Wojcik with all necessary pieces of equipment, i.e. foot rest, height adjustable chair, display screen to cover computer screen to reduce the brightness and contrast. So that Mr. Wojcik is protected by the law he must consider certain points, he knows that a risk assessment must be made for each

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    Obrien's because his personal information/data is stored by the organisation he works at, which is the Lammas secondary school and is an area where this specific law is enforced. The data protection law protects Mr. Obrien's because it ensures that his personal details is safely secured and restricted for the

  1. Leaflet design for Finding Nemo.

    Alternatively, you can click on images so the define your search which makes the google engine only come out with images and not websites. I used this search page by typing in 'Finding Nemo images'. I then clicked on images, so to define my search so it will only show images and not websites.

  2. Privacy and Data Protection: IT Law

    a special law is enacted in the field and even then, they often collide with First Amendment rights33 of the holder and user of the records.34 The legislator often refrains from the enactment of such laws, relying on the self-regulating mechanisms of the free market.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work