• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  • Level: GCSE
  • Subject: ICT
  • Word count: 3890

Legal Aspects of Using Information Technology

Extracts from this document...


Legal Aspects of Using Information Technology The widespread use of information technology has brought us a number of benefits and problems, too. As information technology has spread, so have computer crime and abuse. For example, the internet is not only used by the innocent members of the public, but also by fraudulent traders, paedophiles, software pirates, hackers and terrorists. Their activities would include: placing computer viruses, software bootlegging, credit card fraud and money laundering schemes. Hackers A hacker is an individual who break codes and passwords to gain unauthorised access to data held on computer systems. When hackers gain unauthorised access to computer systems, they can do a huge amount of damage. Stand-alone computers are safe because, there is no connection for the hackers to break into. However, computers which are connected to networks or modems are at more risk from hacking. The only way of protecting the computer systems from being broken into, is by changing the passwords at regular intervals. Computer Fraud Computer fraud is when computer operators use the computer to their own advantage. It is difficult to track down these offenders for the following possible reasons: * They are often clever * They might be young with no previous criminal records * When fraud is discovered in a business, it is often not publicised, because the news of fraud may damage the image and reputation of the business An example of computer fraud involves a computer operator who found a blank payroll form. The computer operator will complete the form by making up the details of an imaginary person working in the Company. Each month, when the pay cheques are produced from the Company computer, the computer operator will slip the cheque into his pocket, without anyone noticing. Computer Viruses A computer virus is a small computer program, which usually sabotage files or programs. Viruses may be passed onto the computer in various ways. ...read more.


by adjusting the chair Employees also have a responsibility to: * use workstations and equipment correctly, in accordance with training provided by the employers * bring any problems to the attention of their employer immediately and co-operate in the correction of these problems I have included a copy of IKEA Health and Safety policy in the Appendix section. Legal aspects of using the Internet There are number of laws that IKEA needs to be aware of, when using the Internet as a source of information within the organisation. Some of these laws are mentioned below: * Data Protection Act 1984- see pages 140 to 141 * Computer Misuse Act 1990- see page 141 * Copyright, Design and Patent Act 1989- see page 142 * Internet Code of Practice * Regulations of Investigatory Powers Act 2000 Internet Code of Practice (ICOP) The Internet Code of Practice is not a law, but it is an agreement which aims to protect Internet users. Many businesses, such as IKEA have registered on the Internet Content Register (www.internet.org/icop.html) for a small fee. Once IKEA have registered they can display the ICR seal. The ICR seal shows that the site conforms to the code of practice. A summary of the ICOP is given, below: * Audience- the information must be suitable for viewing by its target audience. Any offensive material should have a security mechanism to avoid any accidental access, i.e. particularly by young children. Links to any external sites should be checked for any offensive material * Advertising- any unwanted e-mails and Spam should not be used as an advertising method. According to the Advertising Standards Authority (ASA), advertisement should be, 'legal, decent, honest, truthful and not misleading'. Prices and delivery-date information should be clear and accurate. All advertisement must show the identify of the advertiser and the full contact postal address * Contracts- any standard terms and conditions used should be clearly drawn to the attention of the customer. ...read more.


All users must ensure that their password is kept confidential, not written down, not made up of easily guessed words and is changed at least every three months Write-protection disks All floppy disks and tapes have a write-protect mechanism, which is designed to protect data being accidentally overwritten by a user. Access rights Access rights to a particular collection of data can be set to Read-Only, Read/Write or No Access. This ensures that users within IKEA can only gain access to data which are permitted to see, and can only alter data on the database, if they are authorised to do so. Securing against fraudulent use or malicious damage Businesses, such as IKEA are often exposed to the possibility of fraud, deliberate corruption of data by disgruntled employees or theft of software or data which may fall into the hands of competitors. There are number of ways to reduce the effect of these risks, e.g. * Immediately remove employees, who have been sacked or who hand in their resignation, and cancel all their passwords and authorisations * Stop unauthorised access by employees and other to secure areas, such as computer operation rooms, by means of machine readable cards or badges or other types of locks * Use passwords to gain access to the computer system from terminals * Educate staff to be aware of the possible breach of security and to be alert in stopping them or reporting them Protection against viruses These are the basic steps which can be taken to reduce the risk of suffering damage from different viruses: * Ensure that all purchased software comes in sealed, and tamper-proof packaging * Do not permit floppy disks, USBs or CDs containing software or data to be removed from or brought into the office * Use anti-virus software to check all floppy disks, USBs and CDs before use. This is often called the sheep dip station ?? ?? ?? ?? Unit 15: ICT in Business E6/C3: Created by Baljinder Duhra - 139 - ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. The social, legal, moral aspects of I.C.T. In this report, I am going to ...

    * The copyright Design and patience act 1989 This law states that it is illegal to copy files without authorization from the copyright holder. The law can be broken in three ways * Downloading text and images from the internet, by not saying where you got them from.

  2. Assets table - recording the copyright information on the logos and pictures I used.

    This was chosen because it was a good sized fair trade product. Swap advert Boxed vegetables, Random vegetables and packeted vegetables. image s N/A Boxed vegetables I have cropped the image and made it bigger. I have also got rid of a by stander who is not relevant in the context I have used it in.


    It stops me from accessing other peoples files ? Stops me from sending off viruses to damage other peoples computers HOW COMPUTER MISUSE ACT AFFECT THE COMMUNITY: ? Stops the community such as the police, DLR, idea Store from accessing or storing pornographic material ?

  2. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    he can be in serious trouble as mentioned in the law explanation above. The Computer Misuse Act (1990) * Hacking - unauthorized people gaining access to computer networks * Data Misuse and unauthorized transfer or copying - file sharing * Copying and distributing software, music and film - Including copying

  1. The Data Protection Act 1998 - questions and answers

    These include an exception where providing the information to the individual would involve 'a disproportionate effort'.

  2. Car Safety

    Modern vehicles should be built with crumple zones, which absorb crash impact in the front and rear of the vehicle rather than in the passenger compartment. The passenger compartment should keep its shape and there should be side impact protection.

  1. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    Sites usually have an agreement when signing up which you agree to if you sign up to them. These agreements are made essential due to the Data Protection Act. It lets the user see what exactly the site can do with his information and usually keeps Mr Ajaib from knowing what risks he gets into by giving his information out.

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    at her workplace is secured and restricted for the use of other or transfer to other organisation without her individual permission. She can also go back over the information and see if it's correct or not and if she notices some alteration in her personal information then the company (which is the Churchill estate)

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work