• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Legislation and ICT

Extracts from this document...

Introduction

Legislation and ICT Briefly summarise the key points regarding the 4 Acts of Parliament The Health and Safety Act of 1974 was set up as a means to protect employees, the public, management and stop safety hazards at work. This is achieved by enforcing strict guide lines that all it may affect must abide by. Failure to do so can result in punishment and fines. The Copyright, Designs and Patents Act 1989 makes it illegal to copy or steal software in order to protect the designer's prophets. This is done by placing a (c) symbol on all products protected by this act. Breaking this can result in legal action and possible imprisonment. The Data Protection Act of 1998 was developed to give protection and lay down rules about how data about people can be used for example criminal records and other such information. Breach of this act has serious consequences and can again result in imprisonment. The Computer Misuse Act 1990 stops the misuse of computers and communications systems for example: Hacking, Data misuse and unauthorised transfer or copying, Email and chat room abuses, Pornography and Viruses. ...read more.

Middle

Using picture of the internet and other peoples WebPages. This is not aloud according to the act as the person who created the website has not given permission to the person to use the information. I used quotes and texts from websites. This is not allow because it is using other peoples work and using as your own although this is only breach if a prophet is being made from the use of the information Due to the schools security system and policy this law was unable to be breached The local community- The group who might use the Public information System This project was again conducted in school so the two above have the same answer as this. Using pictures of websites without permission. This is wrong because it is using someone else work without permission. On this project this rule was not broken Due to the schools security system and policy this law was unable to be breached not broken Effectiveness of legislation Group Health and Safety at Work Act 1974 Copyright, Designs and Patents Act 1989 Data Protection Act 1998 Computer Misuse Act 1990 The student-You and your web site This had no impact as health and safety rules where not enforced. ...read more.

Conclusion

they have a disability like dyslexia or ADHD even thought they are as capable as everyone else in doing the job This is an extremely important law for people like Steven Hawkins because if a virus or a hacker was to gain access to his wheel chair he would be unable to function as all his speech and movement is determined by an onboard computer built in to his wheel chair The local community- The group who might use the Public information System The health and safety act isn't actually that relevant to this project. The copyright law would help the local community website be protecting the creators from people copying their work and making a prophet from their information. This act is fairly important to the public information system because personal information may be posted on this website for view for local residents only and a hacker could gain this information and use it for malicious purposes. This act would be important because if a hacker was able to gain access and change the information that was held on this website this may cause distress to people who relay on this website for local information. ?? ?? ?? ?? ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. The impact of ICT on the environment

    and development and employment issues it can make a difference and in some areas its been used to encourage working nearer to home and travel reduction, it works to encourage teleworking. Teleworking has many advantages; people who live in remote locations all over the world can now work as long as they own a computer with an Internet.

  2. The Data Protection Act 1998 - questions and answers

    If the organisation commits an offence in terms of the Act - the processing of Data other than in accordance with the organisation's registration - or in contravention of one of the Data Protection Principles, and, having been served with an enforcement notice, an information notice, or a special information

  1. Privacy and Data Protection: IT Law

    Some states have passed privacy laws similar to European standards, for example Minnesota enacted a bill requiring Internet Service Providers to obtain user authorisation before using personal information for secondary purposes and North Dakota established opt-in protections for financial information.53 6.)

  2. Data Protection Act

    Updating is only qualified where necessary. 5.1 Fifth Principle "Personal data processed for any purpose or purposes shall not kept for longer than is necessary for that purpose or those purposes". The data controller will need to review their personal data regularly and to delete the information which is no longer required for their purposes.

  1. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    act he is not lawfully allowed to do this and if he does not follow the law he could be caught. The Data Misuse act also affects her as if I have my coursework on my computer and don't want to share it and someone and someone hacks her computer

  2. Legal Aspects of Using Information Technology

    Any kind of unwanted communication is often considered unwelcome to the recipient. As a result, the ICR members should agree not to send, encourage, or contribute to chain letter, or Spam Regulations of Investigatory Powers Act 2000 The regulations of Investigatory Powers Act 2000, defines the powers the government has

  1. The main purposes of legislation covering working with and using ICT.

    Illegal copying of software reduces the income of software companies. Having invested money in designing and producing software these companies need to earn income from software sales to recover these costs and make a profit. Without this income software companies will go out of business and the range of new software that is developed will be reduced.

  2. Right of privacy under Hong Kong's current laws

    image of the mirror of society will be, and the less freedom of press will be enjoyed by the Hong Kong society as a whole. (1943 words) 1 MingPao Article "Privacy and the obligation to keep secrets" (2005-06-15) 2 The Dean of the Faculty of Law of HKU 3 BL/A27:

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work