• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Laws and Legislations (ICT)

Extracts from this document...


Laws and Legislations Laws and legislations were introduced due to the fact that ICT was growing and since the uses of large computerized databases as they became quite useful for sensitive personal data to be stored without the individual's knowledge. Employers, credit card companies or insurance companies, could access this confidential data. Therefore personal privacy is important as it is our human right to not want personal information on age, religious beliefs, family circumstances or academic qualifications to be accessed by others without permission. An Individual User An individual user would use various software applications in everyday life throughout ICT. The main uses of ICT software are: > E-mail > Internet > Mail merge > Excel > FrontPage > Access Due to the increased of the amount of information available particularly on the Internet it has been a concern for the interest taken by hackers into and stealing data therefore the government had to produce may different legislations to prevent this from occurring. Legislations were also created for the misuse of data and viruses as well. ...read more.


It also protects the users of the data and the producer of the data. The criminal offences associated with this act are: 1. Hacking 2. The sending of viruses 3. Unauthorized modification of computer material This act protects an individual user very well because it makes people more reluctant from hacking and creating viruses due to the risks involved. It was designed to protect the individual user and their rights and I think they have achieved quite a high standard of protection. Advantages * Hackers would be more couscous by being caught and will be hesitant to try to hack in the future. * Viruses can be traced back to the person responsible for create it. Law enforcements can discipline them in a suitable fashion, causing them to give up on creating other viruses. Disadvantages * The legislation cannot stop hackers from trying to steal or corrupt information, as a professional hacker tends not to leave traces. Only hackers who have been caught doing it can be prosecuted. ...read more.


* If the act was not in place the cost of legal software would go up, as more money is need to stop people producing illegal software copyrighting as copying software is cheaper than buying illegal products. Disadvantages * The shutting down of illegal operations is not an initial process it takes court cases to settle the disagreements which is takes time along with lost of legal cost to win cases. * Although the legislation is present it seems to have little effect already as a lot of pirate copies of software is still being produced and sold. Improvements that can be made As soon as the illegal operations have been found on computers they should be shut down immediately. Software producers should include copyright protect with all of their products to ensure that copying of any software cannot take place. Summary The copyright act is beginning to become very ineffective, more modern laws need to be introduced to sustain a solid legislation. Overall the legislation is ok but with more restrictions there will be less hassle with the production of pirate software, as shutdowns on illegal operations would make the software useless. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Data Protection Act

    Privacy and Electronic Communication Regulation 2003 came into force on 11th December 2003. The Privacy and Electronic Communication Regulation 2003 is responsible for both enforcing both the 2003 and the 1999 regulations. The Privacy and Electronic Communication Regulation 2003 supersedes the Telecommunication (Data Protection and Privacy)

  2. The legislation that protects individuals and groups from the misuse of ICT

    If I follow these guidelines I can be assured that I stay within the law. Although there are certain guidelines for using and copying other peoples work, it is often the case that the law does not give full protection to the individual who owns it, often people ignore these

  1. 3E-The legislation that protects individuals and groups from the misuse of ICT

    There are a few improvements that can be made to the specific law. The main improvement which I personally think is the act should state the protection type needed for all the different data types that can be stored. Some of these data may be highly crucial, which may need

  2. Privacy and Data Protection: IT Law

    Directive.63 In its negotiations with a third country, the Commission must also consult with the "Article 31 Committee" which is composed of representatives of the member states and chaired by the Commission. If Commission and Committee disagree, the Council will become involved.


    including the illicit copying of software held in any computer. The penalty for this is up to six months imprisonment or up to a 5,000-pound fine. * Unauthorized access with intent to commit or facilitate commission of further offences, which covers more serious cases of hacking.

  2. The impact of ICT on the environment

    of ICT, computers have been able to map, the structure of a human cold virus. Computers are also used to monitor patients. They can be used to monitor anything from weight loss to heart rates. Scientists predict a revolution in medical care in the future.

  1. Legal Aspects of Using Information Technology

    update a written policy of the company and pass this to all employees * allow for the appointment of safety representatives selected by a recognised trade union Under the Health and Safety Act 1974, all employees have to: * take reasonable care of their own health and safety and that

  2. Computer Legislation.

    A person can be place guilty of an offence if the person that causes a computer to perform any function with intent to secure access to any program or data held in any computer, the access the person intends to secure is unauthorised; and knows at the time when he

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work