• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Laws and Legislations (ICT)

Extracts from this document...

Introduction

Laws and Legislations Laws and legislations were introduced due to the fact that ICT was growing and since the uses of large computerized databases as they became quite useful for sensitive personal data to be stored without the individual's knowledge. Employers, credit card companies or insurance companies, could access this confidential data. Therefore personal privacy is important as it is our human right to not want personal information on age, religious beliefs, family circumstances or academic qualifications to be accessed by others without permission. An Individual User An individual user would use various software applications in everyday life throughout ICT. The main uses of ICT software are: > E-mail > Internet > Mail merge > Excel > FrontPage > Access Due to the increased of the amount of information available particularly on the Internet it has been a concern for the interest taken by hackers into and stealing data therefore the government had to produce may different legislations to prevent this from occurring. Legislations were also created for the misuse of data and viruses as well. ...read more.

Middle

It also protects the users of the data and the producer of the data. The criminal offences associated with this act are: 1. Hacking 2. The sending of viruses 3. Unauthorized modification of computer material This act protects an individual user very well because it makes people more reluctant from hacking and creating viruses due to the risks involved. It was designed to protect the individual user and their rights and I think they have achieved quite a high standard of protection. Advantages * Hackers would be more couscous by being caught and will be hesitant to try to hack in the future. * Viruses can be traced back to the person responsible for create it. Law enforcements can discipline them in a suitable fashion, causing them to give up on creating other viruses. Disadvantages * The legislation cannot stop hackers from trying to steal or corrupt information, as a professional hacker tends not to leave traces. Only hackers who have been caught doing it can be prosecuted. ...read more.

Conclusion

* If the act was not in place the cost of legal software would go up, as more money is need to stop people producing illegal software copyrighting as copying software is cheaper than buying illegal products. Disadvantages * The shutting down of illegal operations is not an initial process it takes court cases to settle the disagreements which is takes time along with lost of legal cost to win cases. * Although the legislation is present it seems to have little effect already as a lot of pirate copies of software is still being produced and sold. Improvements that can be made As soon as the illegal operations have been found on computers they should be shut down immediately. Software producers should include copyright protect with all of their products to ensure that copying of any software cannot take place. Summary The copyright act is beginning to become very ineffective, more modern laws need to be introduced to sustain a solid legislation. Overall the legislation is ok but with more restrictions there will be less hassle with the production of pirate software, as shutdowns on illegal operations would make the software useless. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. ICT LAWS

    Must not sell students name or address. ? He needs to keep information safe. HOW THE DATA PROTECTION ACT AFFECT MR PATEL: ? This law gives Mr Patel the right to challenge or have access to any information held about him on the computer or filing cabinet ?

  2. Data Protection Act

    Privacy and Electronic Communication Regulation 2003 came into force on 11th December 2003. The Privacy and Electronic Communication Regulation 2003 is responsible for both enforcing both the 2003 and the 1999 regulations. The Privacy and Electronic Communication Regulation 2003 supersedes the Telecommunication (Data Protection and Privacy)

  1. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    This affects users who do not read the whole agreement and sign up anyhow. That's why it is extremely important for Mr Ajaib to make sure he knows what he's agreeing to and be wary of what he signs up to as the Data Protection Act can't exactly help if the user agreed to his data being used.

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    given as this creates flaws for organisation who wish to contact me or use my information for future reference, also is an illegal act to pursue. The data protection act can be substantially beneficial to me because it keeps my personal data which I have given to a particular organisation safe and secured i.e.

  1. The legislation that protects individuals and groups from the misuse of ICT

    prove that a breach has occurred, an example of this would be selling data to a 3rd party without the owners consent, yes the company has broken the law, but is often hard for the person who has had their information sold to realise this has happened, and it is

  2. Right of privacy under Hong Kong's current laws

    Articles 28, 29 and 30 in the BL5 address individual privacy. Art 286 protect personal privacy. Journalists will be prosecuted if they collect information by means of unlawful bodily search, arrest, detention or imprisonment. Unlawful search of one's home is also not allowed under the Art 297.

  1. The Legislation that protects individuals and groups from the misuse of ICT.

    The act places restrictions on organisations which collect or hold data which can identify a living person. The Act does not apply to domestic use[1], for example keeping a personal address book. Data collected by any person or organisation may only be used for the specific purposes for which they were collected.

  2. The Legislation that protects individuals and groups from the misuse of ICT

    In Report 3B, Dr. Kumar is a neurosurgeon who works in a privately owned hospital in Sussex called St. Richard's Hospital. He does not collect his patients' data himself, but he uses the data stored on the hospital's computer network to view their detail.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work