• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  • Level: GCSE
  • Subject: ICT
  • Word count: 3890

Legal Aspects of Using Information Technology

Extracts from this document...

Introduction

Legal Aspects of Using Information Technology The widespread use of information technology has brought us a number of benefits and problems, too. As information technology has spread, so have computer crime and abuse. For example, the internet is not only used by the innocent members of the public, but also by fraudulent traders, paedophiles, software pirates, hackers and terrorists. Their activities would include: placing computer viruses, software bootlegging, credit card fraud and money laundering schemes. Hackers A hacker is an individual who break codes and passwords to gain unauthorised access to data held on computer systems. When hackers gain unauthorised access to computer systems, they can do a huge amount of damage. Stand-alone computers are safe because, there is no connection for the hackers to break into. However, computers which are connected to networks or modems are at more risk from hacking. The only way of protecting the computer systems from being broken into, is by changing the passwords at regular intervals. Computer Fraud Computer fraud is when computer operators use the computer to their own advantage. It is difficult to track down these offenders for the following possible reasons: * They are often clever * They might be young with no previous criminal records * When fraud is discovered in a business, it is often not publicised, because the news of fraud may damage the image and reputation of the business An example of computer fraud involves a computer operator who found a blank payroll form. The computer operator will complete the form by making up the details of an imaginary person working in the Company. Each month, when the pay cheques are produced from the Company computer, the computer operator will slip the cheque into his pocket, without anyone noticing. Computer Viruses A computer virus is a small computer program, which usually sabotage files or programs. Viruses may be passed onto the computer in various ways. ...read more.

Middle

by adjusting the chair Employees also have a responsibility to: * use workstations and equipment correctly, in accordance with training provided by the employers * bring any problems to the attention of their employer immediately and co-operate in the correction of these problems I have included a copy of IKEA Health and Safety policy in the Appendix section. Legal aspects of using the Internet There are number of laws that IKEA needs to be aware of, when using the Internet as a source of information within the organisation. Some of these laws are mentioned below: * Data Protection Act 1984- see pages 140 to 141 * Computer Misuse Act 1990- see page 141 * Copyright, Design and Patent Act 1989- see page 142 * Internet Code of Practice * Regulations of Investigatory Powers Act 2000 Internet Code of Practice (ICOP) The Internet Code of Practice is not a law, but it is an agreement which aims to protect Internet users. Many businesses, such as IKEA have registered on the Internet Content Register (www.internet.org/icop.html) for a small fee. Once IKEA have registered they can display the ICR seal. The ICR seal shows that the site conforms to the code of practice. A summary of the ICOP is given, below: * Audience- the information must be suitable for viewing by its target audience. Any offensive material should have a security mechanism to avoid any accidental access, i.e. particularly by young children. Links to any external sites should be checked for any offensive material * Advertising- any unwanted e-mails and Spam should not be used as an advertising method. According to the Advertising Standards Authority (ASA), advertisement should be, 'legal, decent, honest, truthful and not misleading'. Prices and delivery-date information should be clear and accurate. All advertisement must show the identify of the advertiser and the full contact postal address * Contracts- any standard terms and conditions used should be clearly drawn to the attention of the customer. ...read more.

Conclusion

All users must ensure that their password is kept confidential, not written down, not made up of easily guessed words and is changed at least every three months Write-protection disks All floppy disks and tapes have a write-protect mechanism, which is designed to protect data being accidentally overwritten by a user. Access rights Access rights to a particular collection of data can be set to Read-Only, Read/Write or No Access. This ensures that users within IKEA can only gain access to data which are permitted to see, and can only alter data on the database, if they are authorised to do so. Securing against fraudulent use or malicious damage Businesses, such as IKEA are often exposed to the possibility of fraud, deliberate corruption of data by disgruntled employees or theft of software or data which may fall into the hands of competitors. There are number of ways to reduce the effect of these risks, e.g. * Immediately remove employees, who have been sacked or who hand in their resignation, and cancel all their passwords and authorisations * Stop unauthorised access by employees and other to secure areas, such as computer operation rooms, by means of machine readable cards or badges or other types of locks * Use passwords to gain access to the computer system from terminals * Educate staff to be aware of the possible breach of security and to be alert in stopping them or reporting them Protection against viruses These are the basic steps which can be taken to reduce the risk of suffering damage from different viruses: * Ensure that all purchased software comes in sealed, and tamper-proof packaging * Do not permit floppy disks, USBs or CDs containing software or data to be removed from or brought into the office * Use anti-virus software to check all floppy disks, USBs and CDs before use. This is often called the sheep dip station ?? ?? ?? ?? Unit 15: ICT in Business E6/C3: Created by Baljinder Duhra - 139 - ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Assets table - recording the copyright information on the logos and pictures I used.

    This was chosen because it was a good sized fair trade product. Swap advert Boxed vegetables, Random vegetables and packeted vegetables. image s N/A Boxed vegetables I have cropped the image and made it bigger. I have also got rid of a by stander who is not relevant in the context I have used it in.

  2. ICT LAWS

    It stops me from accessing other peoples files ? Stops me from sending off viruses to damage other peoples computers HOW COMPUTER MISUSE ACT AFFECT THE COMMUNITY: ? Stops the community such as the police, DLR, idea Store from accessing or storing pornographic material ?

  1. The social, legal, moral aspects of I.C.T. In this report, I am going to ...

    * The copyright Design and patience act 1989 This law states that it is illegal to copy files without authorization from the copyright holder. The law can be broken in three ways * Downloading text and images from the internet, by not saying where you got them from.

  2. The Data Protection Act 1998 - questions and answers

    These provisions will be introduced over time and companies should use that time to think about their procedures. Individuals will have the right to request access to new manual files created after 24th October 1998 at once. What rights do individuals have?

  1. Data Protection Act

    There are two means by which a data controller may specify the purpose or purposes for which the personal data are obtained, namely a) in notice given by the data controller to the data subject in accordance with the fair processing requirements or, b)

  2. Car Safety

    For example, one car the Mazda has all these safety precautions in place in case an accident occurs: * Intrusion minimizing brake pedal to help reduce foot and leg injuries in a frontal collision * Front seats designed to minimize whiplash and the chance of neck injury in a rear-end

  1. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    If she gives away the data for a different purpose and it gets used for a different purpose which data had not been given for it would also have affected her. Because of these reasons it is important that these acts are followed by anyone and if someone breaks them

  2. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    MSN, Skype etc. He can also purchase things online through sites such as eBay, PayPal and Amazon. This is where the Data Protection Act is extremely important. Signing up to lots of different sites means that a whole load of places hold his information.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work