• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

IT And Legislation

Extracts from this document...

Introduction

Ict And Legislation TABREZ AKHTAR 10E The Data Protection Act (1998) It sets rules for procession of information that you have not given permission for, information about living, identifiable individuals. This means any identifiable data, such as a name or address. Any business storing information must comply with eight principles. These are: * Fairly and lawfully processed * Processed for limited purposes and not any manner incompatible with those purposes * Adequate, relevant and not excessive * Accurate * Not kept for longer than necessary * Processed in line with the data's subject rights * Secure * Not transferred to countries with adequate protection The school ensure they comply with the DPA in dealing with your personal data by letting certain teachers have access to the information. TESCO 'How it can go wrong ' Supermarket Tesco claims to be the biggest dotcom grocer in the world, having taken �146 million in a half-year period between February and August, and making a profit online. In May, Tesco called some of its online customers, asking them to rate its services. Those who reject such contact often refuse to give out a phone number, but Tesco.com will not accept registration without one. ...read more.

Middle

The hacker to launch attacks on other computers to extort cash from firms then uses the infected computer, known as a zombie. The 27-year-old has been charged with a number of offences under the Computer Misuse Act 1990. This law works well because this stops viruses being spread deliberately and damaging the computers. This law applies to my working adult because he uses the computer often and so he must make sure he doesn't misuse it. Copyright, Design and Patents Act (1989) This law needs to exist because it stops people from copying other people. It stops them from taking other peoples design. This law provides legal protection for many public things and without this there will be a lot of counterfeiting. My working adults life is affected by this by him making sure all the information he has on his website is not copyright and to make sure he hasn't copied anyone else's design. Yes I have breached this act in some way. There are some problems with enforcing this act because not many people will know about the law and they may not know which information is copyrightable. This law does not work well because you may not be aware who's taking your information therefore they will not be prosecuted. ...read more.

Conclusion

These regulations are needed so people are aware of what they have to do to keep the workplace safe. The inspectors make sure that the law is enforced and if they fully understand the law. These regulations are effective because it makes the employees aware of what they have to do to keep the workplace safe. This act effects my working adults life because they have to make sure their environment is safe and if it is not then they risk theirs and others healths. Regulations of Investogary Powers Act (2000) This act is about defining the powers the government and its security, intelligence and communications bodies will have to snoop on electronic communications and data. This act might affect my working adults using e-mail at work because the government processes all the e-mail he sends. This act is a good thing and a bad thing because it helps the government have the legal power to read all electrical communications that the public makes and gives him the off chance of catching people committing crimes, however he gets to read all the personal messages sent by the public. This law does not work very well because people still send junk and abusive e-mail. This law applies to me because I send e-mails and I have to make sure it's not abusive and junk because I know it is going to be processed. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. The impact of ICT on the environment

    ICT has helped raise awareness of issues that effect the environment; be these good or bad. Most organisations or societies now have there own website and email allowing easier communication between them and any supporters. Organisations such as greenpeace have their own website including information about any issues and also

  2. The Data Protection Act 1998 - questions and answers

    This includes the names and addresses of all my staff and my customers. Am I subject to the Act? Probably yes. It would appear that the information which you are holding falls within the definition of Personal Data in the Act and that, in that you will be able to

  1. Privacy and Data Protection: IT Law

    The academic world is of course divided.51 The Congress is trying hard to improve privacy: since January 2001, by introducing Bill after Bill to the House and the Senate.52 On a state law level, Massachusetts and Hawaii have considered privacy bills for the private sector.

  2. Data Protection Act

    The public authorities in two ways hold the information: - To adopt and maintain publication schemes, which should have the effect of improving the quality and amount of information routinely made available to the public. - By creating the right to make the request of information (is effective in January 2005).

  1. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    a lot of laws which need to be followed as well as for example tube stations have laws which also need to be followed as well as the CCTV cameras which also have laws as they may not be allowed to be used in certain areas.

  2. Legal Aspects of Using Information Technology

    IKEA can prevent the misuse of the Internet is, by getting their co-workers to sign a code of conduct of conduct. It is important that IKEA to get its co-workers to sign a computer code of conduct, to make it clear what the co-workers are allowed to do and what is not permitted.

  1. Computer Crime and the Law.

    The Computer Misuse Act 1990 This act covers three main crimes: > Hacking > Planting of viruses > Computer Fraud Section 1 A person is guilty of an offence if: 1. he/she causes a computer to perform any function with intent to secure access to any program or data held in any computer 2.

  2. The Legislation that protects individuals and groups from the misuse of ICT

    Firewall Firewall is a software or hardware that permits or denies access to another network or a personal computer. Firewall first emerged in the 1980's when the internet was fairly new and there were many cases of security breaches, even in NASA.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work