• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  • Level: GCSE
  • Subject: ICT
  • Word count: 3890

Legal Aspects of Using Information Technology

Extracts from this document...


Legal Aspects of Using Information Technology The widespread use of information technology has brought us a number of benefits and problems, too. As information technology has spread, so have computer crime and abuse. For example, the internet is not only used by the innocent members of the public, but also by fraudulent traders, paedophiles, software pirates, hackers and terrorists. Their activities would include: placing computer viruses, software bootlegging, credit card fraud and money laundering schemes. Hackers A hacker is an individual who break codes and passwords to gain unauthorised access to data held on computer systems. When hackers gain unauthorised access to computer systems, they can do a huge amount of damage. Stand-alone computers are safe because, there is no connection for the hackers to break into. However, computers which are connected to networks or modems are at more risk from hacking. The only way of protecting the computer systems from being broken into, is by changing the passwords at regular intervals. Computer Fraud Computer fraud is when computer operators use the computer to their own advantage. It is difficult to track down these offenders for the following possible reasons: * They are often clever * They might be young with no previous criminal records * When fraud is discovered in a business, it is often not publicised, because the news of fraud may damage the image and reputation of the business An example of computer fraud involves a computer operator who found a blank payroll form. The computer operator will complete the form by making up the details of an imaginary person working in the Company. Each month, when the pay cheques are produced from the Company computer, the computer operator will slip the cheque into his pocket, without anyone noticing. Computer Viruses A computer virus is a small computer program, which usually sabotage files or programs. Viruses may be passed onto the computer in various ways. ...read more.


by adjusting the chair Employees also have a responsibility to: * use workstations and equipment correctly, in accordance with training provided by the employers * bring any problems to the attention of their employer immediately and co-operate in the correction of these problems I have included a copy of IKEA Health and Safety policy in the Appendix section. Legal aspects of using the Internet There are number of laws that IKEA needs to be aware of, when using the Internet as a source of information within the organisation. Some of these laws are mentioned below: * Data Protection Act 1984- see pages 140 to 141 * Computer Misuse Act 1990- see page 141 * Copyright, Design and Patent Act 1989- see page 142 * Internet Code of Practice * Regulations of Investigatory Powers Act 2000 Internet Code of Practice (ICOP) The Internet Code of Practice is not a law, but it is an agreement which aims to protect Internet users. Many businesses, such as IKEA have registered on the Internet Content Register (www.internet.org/icop.html) for a small fee. Once IKEA have registered they can display the ICR seal. The ICR seal shows that the site conforms to the code of practice. A summary of the ICOP is given, below: * Audience- the information must be suitable for viewing by its target audience. Any offensive material should have a security mechanism to avoid any accidental access, i.e. particularly by young children. Links to any external sites should be checked for any offensive material * Advertising- any unwanted e-mails and Spam should not be used as an advertising method. According to the Advertising Standards Authority (ASA), advertisement should be, 'legal, decent, honest, truthful and not misleading'. Prices and delivery-date information should be clear and accurate. All advertisement must show the identify of the advertiser and the full contact postal address * Contracts- any standard terms and conditions used should be clearly drawn to the attention of the customer. ...read more.


All users must ensure that their password is kept confidential, not written down, not made up of easily guessed words and is changed at least every three months Write-protection disks All floppy disks and tapes have a write-protect mechanism, which is designed to protect data being accidentally overwritten by a user. Access rights Access rights to a particular collection of data can be set to Read-Only, Read/Write or No Access. This ensures that users within IKEA can only gain access to data which are permitted to see, and can only alter data on the database, if they are authorised to do so. Securing against fraudulent use or malicious damage Businesses, such as IKEA are often exposed to the possibility of fraud, deliberate corruption of data by disgruntled employees or theft of software or data which may fall into the hands of competitors. There are number of ways to reduce the effect of these risks, e.g. * Immediately remove employees, who have been sacked or who hand in their resignation, and cancel all their passwords and authorisations * Stop unauthorised access by employees and other to secure areas, such as computer operation rooms, by means of machine readable cards or badges or other types of locks * Use passwords to gain access to the computer system from terminals * Educate staff to be aware of the possible breach of security and to be alert in stopping them or reporting them Protection against viruses These are the basic steps which can be taken to reduce the risk of suffering damage from different viruses: * Ensure that all purchased software comes in sealed, and tamper-proof packaging * Do not permit floppy disks, USBs or CDs containing software or data to be removed from or brought into the office * Use anti-virus software to check all floppy disks, USBs and CDs before use. This is often called the sheep dip station ?? ?? ?? ?? Unit 15: ICT in Business E6/C3: Created by Baljinder Duhra - 139 - ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Peer reviewed

    The Main Features and Difficulties Regarding the Regulation of E-Commerce

    4 star(s)

    Strict regulation of cryptographic products justifies security concerns. However, such legislation would be hardly active as the cryptographic products are easily accessible via Internet which cannot be controlled. Furthermore, it appears that regulation although being very significant to maintain the security is on the other hand colliding with such internationally recognized human rights as the right to privacy.

  2. Peer reviewed

    Legal issues of e-commerce

    3 star(s)

    One of the first regulations is the necessity of showing full name of trader, VAT number and Trade associations.

  1. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    he can be in serious trouble as mentioned in the law explanation above. The Computer Misuse Act (1990) * Hacking - unauthorized people gaining access to computer networks * Data Misuse and unauthorized transfer or copying - file sharing * Copying and distributing software, music and film - Including copying

  2. Data Protection Act

    There are two means by which a data controller may specify the purpose or purposes for which the personal data are obtained, namely a) in notice given by the data controller to the data subject in accordance with the fair processing requirements or, b)

  1. The Data Protection Act 1998 - questions and answers

    These provisions will be introduced over time and companies should use that time to think about their procedures. Individuals will have the right to request access to new manual files created after 24th October 1998 at once. What rights do individuals have?

  2. The legislation that protects individuals and groups from the misuse of ICT

    to run undercover operations including the placing of CCTV cameras in secret places, without giving prior notice to residents in the area who could leak information to other people and spoil the operation.

  1. 3E-The legislation that protects individuals and groups from the misuse of ICT

    that has recruited her can be sued under the act for making changes of her personal data devoid of her permission. Hence, the legislation protects Maria from the misuse of her personal data at her workplace. The legislation also protects Maria Korelli at home.

  2. Leaflet design for Finding Nemo.

    The appearance of the original poster (number 6) is very well laid out. It is basically one big picture used as the background and the foreground, with a smidgen of writing over the top. At the top of the poster it says "From the creators of Monsters Ink".

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work