• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

IT And Legislation

Extracts from this document...

Introduction

Ict And Legislation TABREZ AKHTAR 10E The Data Protection Act (1998) It sets rules for procession of information that you have not given permission for, information about living, identifiable individuals. This means any identifiable data, such as a name or address. Any business storing information must comply with eight principles. These are: * Fairly and lawfully processed * Processed for limited purposes and not any manner incompatible with those purposes * Adequate, relevant and not excessive * Accurate * Not kept for longer than necessary * Processed in line with the data's subject rights * Secure * Not transferred to countries with adequate protection The school ensure they comply with the DPA in dealing with your personal data by letting certain teachers have access to the information. TESCO 'How it can go wrong ' Supermarket Tesco claims to be the biggest dotcom grocer in the world, having taken �146 million in a half-year period between February and August, and making a profit online. In May, Tesco called some of its online customers, asking them to rate its services. Those who reject such contact often refuse to give out a phone number, but Tesco.com will not accept registration without one. ...read more.

Middle

The hacker to launch attacks on other computers to extort cash from firms then uses the infected computer, known as a zombie. The 27-year-old has been charged with a number of offences under the Computer Misuse Act 1990. This law works well because this stops viruses being spread deliberately and damaging the computers. This law applies to my working adult because he uses the computer often and so he must make sure he doesn't misuse it. Copyright, Design and Patents Act (1989) This law needs to exist because it stops people from copying other people. It stops them from taking other peoples design. This law provides legal protection for many public things and without this there will be a lot of counterfeiting. My working adults life is affected by this by him making sure all the information he has on his website is not copyright and to make sure he hasn't copied anyone else's design. Yes I have breached this act in some way. There are some problems with enforcing this act because not many people will know about the law and they may not know which information is copyrightable. This law does not work well because you may not be aware who's taking your information therefore they will not be prosecuted. ...read more.

Conclusion

These regulations are needed so people are aware of what they have to do to keep the workplace safe. The inspectors make sure that the law is enforced and if they fully understand the law. These regulations are effective because it makes the employees aware of what they have to do to keep the workplace safe. This act effects my working adults life because they have to make sure their environment is safe and if it is not then they risk theirs and others healths. Regulations of Investogary Powers Act (2000) This act is about defining the powers the government and its security, intelligence and communications bodies will have to snoop on electronic communications and data. This act might affect my working adults using e-mail at work because the government processes all the e-mail he sends. This act is a good thing and a bad thing because it helps the government have the legal power to read all electrical communications that the public makes and gives him the off chance of catching people committing crimes, however he gets to read all the personal messages sent by the public. This law does not work very well because people still send junk and abusive e-mail. This law applies to me because I send e-mails and I have to make sure it's not abusive and junk because I know it is going to be processed. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Marked by a teacher

    Ict and the law

    4 star(s)

    It means that people should not attempt to access my areas and try and change my files on there. It also means that people should not try to add viruses or Trojans onto my user areas to try and gain information about me that could be used for fraud or blackmail.

  2. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    The Data Protection act 1. Data must not be processed unless there is a specific lawful reason to do so. 2. Data must only be obtained and used for the stated purposes 3. Data should be adequate, relevant and not excessive for the specified use 4.

  1. The Data Protection Act 1998 - questions and answers

    This includes the names and addresses of all my staff and my customers. Am I subject to the Act? Probably yes. It would appear that the information which you are holding falls within the definition of Personal Data in the Act and that, in that you will be able to

  2. Car Safety

    The safety cage should include strong pillars to stop the roof from collapsing in rollover crashes, as well as barriers to prevent the wheels, bonnet or engine intruding into the occupant compartment. Door locks and hinges also form part of the safety cage and should remain intact so occupants are not thrown from the vehicle.

  1. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    An example would be a certain constable misusing confidential police records to check personal data on workmates for reasons unrelated to work. Geraldine Tabor worked as a Dorset Police Constable and used the police records to look into personal information of people she knew, completely unrelated to work purposes.

  2. Data Protection Act

    Schedule 4 of the Act provides for circumstances in which the Eighth Principle does not apply to a transfer. Personal data shall not be transferred to a country or territory outside the European economic area, unless that the country or territory ensures as adequate level protection for the rights and

  1. 3E-The legislation that protects individuals and groups from the misuse of ICT

    given as this creates flaws for organisation who wish to contact me or use my information for future reference, also is an illegal act to pursue. The data protection act can be substantially beneficial to me because it keeps my personal data which I have given to a particular organisation safe and secured i.e.

  2. The impact of ICT on the environment

    Another use of computers in health and medicine is the fact that pharmacists can test patient's medication for drugs compatibility. One example of how this is used is when you suffer from a cold. At the moment there is no cure for the common cold but thanks to the use

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work