• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

IT And Legislation

Extracts from this document...

Introduction

Ict And Legislation TABREZ AKHTAR 10E The Data Protection Act (1998) It sets rules for procession of information that you have not given permission for, information about living, identifiable individuals. This means any identifiable data, such as a name or address. Any business storing information must comply with eight principles. These are: * Fairly and lawfully processed * Processed for limited purposes and not any manner incompatible with those purposes * Adequate, relevant and not excessive * Accurate * Not kept for longer than necessary * Processed in line with the data's subject rights * Secure * Not transferred to countries with adequate protection The school ensure they comply with the DPA in dealing with your personal data by letting certain teachers have access to the information. TESCO 'How it can go wrong ' Supermarket Tesco claims to be the biggest dotcom grocer in the world, having taken �146 million in a half-year period between February and August, and making a profit online. In May, Tesco called some of its online customers, asking them to rate its services. Those who reject such contact often refuse to give out a phone number, but Tesco.com will not accept registration without one. ...read more.

Middle

The hacker to launch attacks on other computers to extort cash from firms then uses the infected computer, known as a zombie. The 27-year-old has been charged with a number of offences under the Computer Misuse Act 1990. This law works well because this stops viruses being spread deliberately and damaging the computers. This law applies to my working adult because he uses the computer often and so he must make sure he doesn't misuse it. Copyright, Design and Patents Act (1989) This law needs to exist because it stops people from copying other people. It stops them from taking other peoples design. This law provides legal protection for many public things and without this there will be a lot of counterfeiting. My working adults life is affected by this by him making sure all the information he has on his website is not copyright and to make sure he hasn't copied anyone else's design. Yes I have breached this act in some way. There are some problems with enforcing this act because not many people will know about the law and they may not know which information is copyrightable. This law does not work well because you may not be aware who's taking your information therefore they will not be prosecuted. ...read more.

Conclusion

These regulations are needed so people are aware of what they have to do to keep the workplace safe. The inspectors make sure that the law is enforced and if they fully understand the law. These regulations are effective because it makes the employees aware of what they have to do to keep the workplace safe. This act effects my working adults life because they have to make sure their environment is safe and if it is not then they risk theirs and others healths. Regulations of Investogary Powers Act (2000) This act is about defining the powers the government and its security, intelligence and communications bodies will have to snoop on electronic communications and data. This act might affect my working adults using e-mail at work because the government processes all the e-mail he sends. This act is a good thing and a bad thing because it helps the government have the legal power to read all electrical communications that the public makes and gives him the off chance of catching people committing crimes, however he gets to read all the personal messages sent by the public. This law does not work very well because people still send junk and abusive e-mail. This law applies to me because I send e-mails and I have to make sure it's not abusive and junk because I know it is going to be processed. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Marked by a teacher

    Ict and the law

    4 star(s)

    It means that people should not attempt to access my areas and try and change my files on there. It also means that people should not try to add viruses or Trojans onto my user areas to try and gain information about me that could be used for fraud or blackmail.

  2. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    The Data Protection act 1. Data must not be processed unless there is a specific lawful reason to do so. 2. Data must only be obtained and used for the stated purposes 3. Data should be adequate, relevant and not excessive for the specified use 4.

  1. The Data Protection Act 1998 - questions and answers

    You should ensure that your organisation's systems ensure that any notices from the Data Protection Commissioner are received by you and not some other part of the organisation. My organisation does not use databases but I keep copies of all my correspondence on my computer.

  2. Car Safety

    The safety cage should include strong pillars to stop the roof from collapsing in rollover crashes, as well as barriers to prevent the wheels, bonnet or engine intruding into the occupant compartment. Door locks and hinges also form part of the safety cage and should remain intact so occupants are not thrown from the vehicle.

  1. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    An example would be a certain constable misusing confidential police records to check personal data on workmates for reasons unrelated to work. Geraldine Tabor worked as a Dorset Police Constable and used the police records to look into personal information of people she knew, completely unrelated to work purposes.

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    With the data protection act, I wouldn't need to feel tensed about giving my personal details to organisation because I no the data protection act ensures confidentiality of my personal information and if I find any flaws on my data, I can easily take the matter up in court as clearly stated by the law.

  1. Data Protection Act

    If personal data have been recorded because of a relationship between the data controller and the data subject the need to keep the information should be considered when the relationship ceases to exist. The act provides that personal data processed only for historical, statistical or research purposes in compliance with

  2. Critically evaluate the extent to which it can be said that copyright law gives ...

    The problem with any 'contemporary' piece of art is where to draw the line and label the work into a certain area or statutory provision. This is what the courts are continually debating and have done so in previous case law.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work