• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Legislation and ICT

Extracts from this document...

Introduction

Legislation and ICT Briefly summarise the key points regarding the 4 Acts of Parliament The Health and Safety Act of 1974 was set up as a means to protect employees, the public, management and stop safety hazards at work. This is achieved by enforcing strict guide lines that all it may affect must abide by. Failure to do so can result in punishment and fines. The Copyright, Designs and Patents Act 1989 makes it illegal to copy or steal software in order to protect the designer's prophets. This is done by placing a (c) symbol on all products protected by this act. Breaking this can result in legal action and possible imprisonment. The Data Protection Act of 1998 was developed to give protection and lay down rules about how data about people can be used for example criminal records and other such information. Breach of this act has serious consequences and can again result in imprisonment. The Computer Misuse Act 1990 stops the misuse of computers and communications systems for example: Hacking, Data misuse and unauthorised transfer or copying, Email and chat room abuses, Pornography and Viruses. ...read more.

Middle

Using picture of the internet and other peoples WebPages. This is not aloud according to the act as the person who created the website has not given permission to the person to use the information. I used quotes and texts from websites. This is not allow because it is using other peoples work and using as your own although this is only breach if a prophet is being made from the use of the information Due to the schools security system and policy this law was unable to be breached The local community- The group who might use the Public information System This project was again conducted in school so the two above have the same answer as this. Using pictures of websites without permission. This is wrong because it is using someone else work without permission. On this project this rule was not broken Due to the schools security system and policy this law was unable to be breached not broken Effectiveness of legislation Group Health and Safety at Work Act 1974 Copyright, Designs and Patents Act 1989 Data Protection Act 1998 Computer Misuse Act 1990 The student-You and your web site This had no impact as health and safety rules where not enforced. ...read more.

Conclusion

they have a disability like dyslexia or ADHD even thought they are as capable as everyone else in doing the job This is an extremely important law for people like Steven Hawkins because if a virus or a hacker was to gain access to his wheel chair he would be unable to function as all his speech and movement is determined by an onboard computer built in to his wheel chair The local community- The group who might use the Public information System The health and safety act isn't actually that relevant to this project. The copyright law would help the local community website be protecting the creators from people copying their work and making a prophet from their information. This act is fairly important to the public information system because personal information may be posted on this website for view for local residents only and a hacker could gain this information and use it for malicious purposes. This act would be important because if a hacker was able to gain access and change the information that was held on this website this may cause distress to people who relay on this website for local information. ?? ?? ?? ?? ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. The impact of ICT on the environment

    and development and employment issues it can make a difference and in some areas its been used to encourage working nearer to home and travel reduction, it works to encourage teleworking. Teleworking has many advantages; people who live in remote locations all over the world can now work as long as they own a computer with an Internet.

  2. The Data Protection Act 1998 - questions and answers

    If the organisation commits an offence in terms of the Act - the processing of Data other than in accordance with the organisation's registration - or in contravention of one of the Data Protection Principles, and, having been served with an enforcement notice, an information notice, or a special information

  1. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    act he is not lawfully allowed to do this and if he does not follow the law he could be caught. The Data Misuse act also affects her as if I have my coursework on my computer and don't want to share it and someone and someone hacks her computer

  2. Legal Aspects of Using Information Technology

    co-workers need to become aware of when using the e-mail within the organisation. They are: * Data Protection Act 1984- see pages 140 to 141 * Directive on Privacy and Electronic Communications 2002- this Act of Parliament focuses on the specific information on e-mail marketing Legal aspects of using e-commerce

  1. Data Protection Act

    an employer holds details of blood groups of employees engaged in hazardous occupations. Data controller should continually monitor compliance with this principle which has obvious with the Fourth and Fifth Principles. Changes in circumstances or failure to keep the information up to date may mean that the information that was originally adequate becomes inadequate.

  2. Car Safety

    The aluminium bonnet has cone-type construction to absorb and cushion impacts in the event of a car-pedestrian accident. Crash worthiness is particularly sound at the vehicle's sides, which, in spite of the absence of centre pillars, exhibit crash safety on a par with traditional four-door sedans.

  1. Assets table - recording the copyright information on the logos and pictures I used.

    I have cropped the image and the enlarged it so that the image is visible and not distorted. This image was chosen because it shows that if people pull together then we can create a strong foundation to live off in all countries.

  2. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    Data processing should meet the legal rights of the data subjects 7. Data holders should protect the data against loss, theft or corruption - it should not be able to be viewed by just anyone 8. Data should not be transferred outside the EU unless the country has adequate data

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work