• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  • Level: GCSE
  • Subject: ICT
  • Word count: 3890

Legal Aspects of Using Information Technology

Extracts from this document...


Legal Aspects of Using Information Technology The widespread use of information technology has brought us a number of benefits and problems, too. As information technology has spread, so have computer crime and abuse. For example, the internet is not only used by the innocent members of the public, but also by fraudulent traders, paedophiles, software pirates, hackers and terrorists. Their activities would include: placing computer viruses, software bootlegging, credit card fraud and money laundering schemes. Hackers A hacker is an individual who break codes and passwords to gain unauthorised access to data held on computer systems. When hackers gain unauthorised access to computer systems, they can do a huge amount of damage. Stand-alone computers are safe because, there is no connection for the hackers to break into. However, computers which are connected to networks or modems are at more risk from hacking. The only way of protecting the computer systems from being broken into, is by changing the passwords at regular intervals. Computer Fraud Computer fraud is when computer operators use the computer to their own advantage. It is difficult to track down these offenders for the following possible reasons: * They are often clever * They might be young with no previous criminal records * When fraud is discovered in a business, it is often not publicised, because the news of fraud may damage the image and reputation of the business An example of computer fraud involves a computer operator who found a blank payroll form. The computer operator will complete the form by making up the details of an imaginary person working in the Company. Each month, when the pay cheques are produced from the Company computer, the computer operator will slip the cheque into his pocket, without anyone noticing. Computer Viruses A computer virus is a small computer program, which usually sabotage files or programs. Viruses may be passed onto the computer in various ways. ...read more.


by adjusting the chair Employees also have a responsibility to: * use workstations and equipment correctly, in accordance with training provided by the employers * bring any problems to the attention of their employer immediately and co-operate in the correction of these problems I have included a copy of IKEA Health and Safety policy in the Appendix section. Legal aspects of using the Internet There are number of laws that IKEA needs to be aware of, when using the Internet as a source of information within the organisation. Some of these laws are mentioned below: * Data Protection Act 1984- see pages 140 to 141 * Computer Misuse Act 1990- see page 141 * Copyright, Design and Patent Act 1989- see page 142 * Internet Code of Practice * Regulations of Investigatory Powers Act 2000 Internet Code of Practice (ICOP) The Internet Code of Practice is not a law, but it is an agreement which aims to protect Internet users. Many businesses, such as IKEA have registered on the Internet Content Register (www.internet.org/icop.html) for a small fee. Once IKEA have registered they can display the ICR seal. The ICR seal shows that the site conforms to the code of practice. A summary of the ICOP is given, below: * Audience- the information must be suitable for viewing by its target audience. Any offensive material should have a security mechanism to avoid any accidental access, i.e. particularly by young children. Links to any external sites should be checked for any offensive material * Advertising- any unwanted e-mails and Spam should not be used as an advertising method. According to the Advertising Standards Authority (ASA), advertisement should be, 'legal, decent, honest, truthful and not misleading'. Prices and delivery-date information should be clear and accurate. All advertisement must show the identify of the advertiser and the full contact postal address * Contracts- any standard terms and conditions used should be clearly drawn to the attention of the customer. ...read more.


All users must ensure that their password is kept confidential, not written down, not made up of easily guessed words and is changed at least every three months Write-protection disks All floppy disks and tapes have a write-protect mechanism, which is designed to protect data being accidentally overwritten by a user. Access rights Access rights to a particular collection of data can be set to Read-Only, Read/Write or No Access. This ensures that users within IKEA can only gain access to data which are permitted to see, and can only alter data on the database, if they are authorised to do so. Securing against fraudulent use or malicious damage Businesses, such as IKEA are often exposed to the possibility of fraud, deliberate corruption of data by disgruntled employees or theft of software or data which may fall into the hands of competitors. There are number of ways to reduce the effect of these risks, e.g. * Immediately remove employees, who have been sacked or who hand in their resignation, and cancel all their passwords and authorisations * Stop unauthorised access by employees and other to secure areas, such as computer operation rooms, by means of machine readable cards or badges or other types of locks * Use passwords to gain access to the computer system from terminals * Educate staff to be aware of the possible breach of security and to be alert in stopping them or reporting them Protection against viruses These are the basic steps which can be taken to reduce the risk of suffering damage from different viruses: * Ensure that all purchased software comes in sealed, and tamper-proof packaging * Do not permit floppy disks, USBs or CDs containing software or data to be removed from or brought into the office * Use anti-virus software to check all floppy disks, USBs and CDs before use. This is often called the sheep dip station ?? ?? ?? ?? Unit 15: ICT in Business E6/C3: Created by Baljinder Duhra - 139 - ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. The social, legal, moral aspects of I.C.T. In this report, I am going to ...

    * The copyright Design and patience act 1989 This law states that it is illegal to copy files without authorization from the copyright holder. The law can be broken in three ways * Downloading text and images from the internet, by not saying where you got them from.

  2. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    he can be in serious trouble as mentioned in the law explanation above. The Computer Misuse Act (1990) * Hacking - unauthorized people gaining access to computer networks * Data Misuse and unauthorized transfer or copying - file sharing * Copying and distributing software, music and film - Including copying

  1. The following report will compare differences between internal and external information sources relevant to ...

    Financial data may be processed within a computerised system and used to plan future activities within the business, like for e.g. whether or not the organisation can afford the financial burden of a new project, or to buy new equipment etc.

  2. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    Breaking this agreement usually also breaks the Data Protection Act and they can face very serious charges. Mr Ajaib can sue and take the companies to court. But some sites take advantage of long drawn-out agreements. They usually take advantage of those signing up by making them agree to allow their data to be used for the company's own needs.

  1. 3E-The legislation that protects individuals and groups from the misuse of ICT

    The legislation also protects Maria Korelli at home. This is because she has installed an anti virus software which in accordance to the act, keeps her personal data away form the access and use of the numerous quantity of hackers. The software is licensed and a trademark of AVG company.

  2. Leaflet design for Finding Nemo.

    This is very useful, as people can identify the makers of the film, and anyone who enjoyed 'Monsters Ink', will be encouraged to see Finding Nemo as it's made by the same people so should be just as good. The ratio of graphics to text is 1:4, as there is

  1. Critically evaluate the extent to which it can be said that copyright law gives ...

    it may have expired or it is not a work of copyright at all. The extent by which a work may be considered original is also equated with the degree of "skill, labour and judgement" then went into the creation of the work.6 This test was also used as a

  2. Is the UK copyright act of 1988 still an adequate means of protecting intellectual ...

    Furthermore, it is arguable whether framing can be covered by the scope of the implied licence for linking, since it does not take the end user to the web site, but rather brings the site to the user through another (framing)

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work