• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Legislation and ICT

Extracts from this document...

Introduction

Legislation and ICT Briefly summarise the key points regarding the 4 Acts of Parliament The Health and Safety Act of 1974 was set up as a means to protect employees, the public, management and stop safety hazards at work. This is achieved by enforcing strict guide lines that all it may affect must abide by. Failure to do so can result in punishment and fines. The Copyright, Designs and Patents Act 1989 makes it illegal to copy or steal software in order to protect the designer's prophets. This is done by placing a (c) symbol on all products protected by this act. Breaking this can result in legal action and possible imprisonment. The Data Protection Act of 1998 was developed to give protection and lay down rules about how data about people can be used for example criminal records and other such information. Breach of this act has serious consequences and can again result in imprisonment. The Computer Misuse Act 1990 stops the misuse of computers and communications systems for example: Hacking, Data misuse and unauthorised transfer or copying, Email and chat room abuses, Pornography and Viruses. ...read more.

Middle

Using picture of the internet and other peoples WebPages. This is not aloud according to the act as the person who created the website has not given permission to the person to use the information. I used quotes and texts from websites. This is not allow because it is using other peoples work and using as your own although this is only breach if a prophet is being made from the use of the information Due to the schools security system and policy this law was unable to be breached The local community- The group who might use the Public information System This project was again conducted in school so the two above have the same answer as this. Using pictures of websites without permission. This is wrong because it is using someone else work without permission. On this project this rule was not broken Due to the schools security system and policy this law was unable to be breached not broken Effectiveness of legislation Group Health and Safety at Work Act 1974 Copyright, Designs and Patents Act 1989 Data Protection Act 1998 Computer Misuse Act 1990 The student-You and your web site This had no impact as health and safety rules where not enforced. ...read more.

Conclusion

they have a disability like dyslexia or ADHD even thought they are as capable as everyone else in doing the job This is an extremely important law for people like Steven Hawkins because if a virus or a hacker was to gain access to his wheel chair he would be unable to function as all his speech and movement is determined by an onboard computer built in to his wheel chair The local community- The group who might use the Public information System The health and safety act isn't actually that relevant to this project. The copyright law would help the local community website be protecting the creators from people copying their work and making a prophet from their information. This act is fairly important to the public information system because personal information may be posted on this website for view for local residents only and a hacker could gain this information and use it for malicious purposes. This act would be important because if a hacker was able to gain access and change the information that was held on this website this may cause distress to people who relay on this website for local information. ?? ?? ?? ?? ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    and transfers her videos or coursework's without her wanting to she would also be able to deal with the issue because of the act or even if someone tries to share her personal stuff such as pictures or videos without asking for permission she could also deal with the issue.

  2. Data Protection Act

    Updating is only qualified where necessary. 5.1 Fifth Principle "Personal data processed for any purpose or purposes shall not kept for longer than is necessary for that purpose or those purposes". The data controller will need to review their personal data regularly and to delete the information which is no longer required for their purposes.

  1. The Data Protection Act 1998 - questions and answers

    If the organisation commits an offence in terms of the Act - the processing of Data other than in accordance with the organisation's registration - or in contravention of one of the Data Protection Principles, and, having been served with an enforcement notice, an information notice, or a special information

  2. The legislation that protects individuals and groups from the misuse of ICT

    This Act has now existed for 18 years, but has over this period been updated to cover electronic communications, ensuring that people who make their material available over the internet are protected. Any breaches of copyright are known as 'Copyright infringements'.

  1. 3E-The legislation that protects individuals and groups from the misuse of ICT

    This law also keeps a confidentiality of my personal information and precludes misuse of my personal data. However, there are also a few drawbacks of the law upon me. The data access being poorly secured by an organisation will enable easy access for hackers or even employees in a workplace who have the bad intention of ruining the working environment.

  2. Privacy and Data Protection: IT Law

    online activities, educational records, motor vehicle registrations, and telemarketing. 38 There is also a variety of sectional legislation on the state level that may give additional protections to citizens of individual states.39The tort of privacy was first adopted in 1905 and 48 of the 50 states recognise a civil right of action for invasion of privacy in their laws.40 3.)

  1. Assets table - recording the copyright information on the logos and pictures I used.

    I have cropped the image and the enlarged it so that the image is visible and not distorted. This image was chosen because it shows that if people pull together then we can create a strong foundation to live off in all countries.

  2. The impact of ICT on the environment

    One example that I have come across in which information is still printed of, where you would think it had been abolished is UCAS electronic applications. 1000's of applications are processed through UCAS and this prevents universities printing out 1000's of 3 or 4 sided application forms, yet now applicants

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work