• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Legislation and ICT

Extracts from this document...

Introduction

THE DATA PROTECTION ACT (1998) THE COMPUTER MISUSE ACT (1990) COPYRIGHT, DISIGNS & PATENTS ACT (1989) HEALTH & SAFETY AT WORK ACT (1974) HEALTH & SAFETY REGULATIONS (1992) REGULATION OF INVESTIGATORY POWERS ACT (2000) The Data Protection Act (1998) The Data Protection Act (1998) came into force on 1st March 2000. It sets rules for processing personal information and applies to paper records as well as those held on computers. It was brought out because computers were getting more powerful and easy to use. Companies, government and other organisations began to use them to store large amounts of information about people, such as their customers, clients and staff details. Databases with this information can be quickly set up, searched, edited and accessed and take up less space than paper records. So company's send peoples personal data to one company to the other so that were a danger in case someone tries to access some ones personal details with out permission. The Data Protection Act has 8 principles they are; 1) It must be collected and used fairly with in the law 2) It must only be held and used for the reasons given to the Information Commissioner 3) It can only be used for those registered purposes and only be disclosed to those people mentioned in the register entry. You cannot give it away or sell it unless you said you would on the form 4) ...read more.

Middle

The Computer Misuse Act (1990) The computer Misuse act law was designed because people miss used computers a lot example; Downloading Viruses, Hacking into other peoples computers and networks to gain others personal details, Data misuse and unauthorised transfer or copying, Copying and distributing software, making music and film copies with out permission, Email and chat room abuses, using unsuitable material, Identity and financial abuses and giving threats and blackmailing people. The Computer Misuse Act was passed by Parliament and made three new offences which are: 1) Accessing computer material without permission e.g. looking at someone else's files. 2) Accessing computer material without permission with intent to commit further criminal offences e.g. hacking into the bank's computer and wanting to increase the amount in your account. 3) Altering computer data without permission e.g. writing a virus to destroy someone else's data, or actually changing the money in an account. Copyright, Design and Patents Act (1989) The Copyright, Design & Patents Act (1989) came into force on 1st August 1989. This law comes into action when there is someone that copies someone else's idea (design/product) to make it there own and then to sell it off by making copies with out the original owners permission. Examples music CDs, DVDs, games and etc. This law is designed to a subsequent amendment to the 1988 Copyright Act confused the issue of life time of Copyright by acting retrospectively. ...read more.

Conclusion

The UK (United Kingdom) National Health Service makes sure that these regulations are insured by every organisation. Regulation of Investigatory Powers Act (2000) This Act called Regulation of Investigatory Powers Act is about defining the powers o the governments and its security's intelligence, communications and data handling. This Act allows the government to issue an interception warrant to an ISP or even a mobile company/organisation for some communications data on vague grounds such as ''national Security'', ''preventing or detecting crimes'' or even ''safe guarding the economic well being of the UK''. If they do this, the employee(s) the interception warrant is served to must comply with it or face up to 2 years in jail locked up. They must NEVER tell anyone about it either or face up to five years in jail locked up. The government could demand all the data that flows to and from your Internet account checked with you never knowing about it. From my point of view I think that this is a bad Act because the Act requires of any employee of a company to provide a public telecommunications service which they have to then obey interception warrants weather they like it or not, but if they disobey the Act they will then have to face up to 2 years In jail locked up. This Act is working well as far as I know because all companies/organisations are cooperating with this Act perfectly. ?? ?? ?? ?? LEGISLATION & ICT Unit 3 GCSE ICT COURSEWORK Legisiation & ICT - 1 - ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Assets table - recording the copyright information on the logos and pictures I used.

    have Cropped the image and then enlarged it to make it more visible to my audience and the picture of tea was chosen for its simplicity and how good it was compared to the rest of them. Still movie several pictures of ale Image S N/A Image that will be

  2. The Data Protection Act 1998 - questions and answers

    If the information is encoded in some way then the individual is entitled to be given an explanation of the information. Particular rules apply where the data controller finds itself in the situation that it cannot comply with the subject access request without disclosing information relating to an individual who

  1. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    she will usually have to enter the credit and debit card details so if for example the company saves the details for longer then necessary it may be end up stolen or get corrupted. Even if the data gets shared the details could be used by anyone which also would affect her.

  2. Car Safety

    This is achieved with innovative door reinforcements and locking mechanisms that form built-in pillars when the doors are locked in position. Also, side impact bars are optimally positioned to efficiently distribute impact energy. Active Safety measures include: - To help maximize stopping performance it is equipped with four-wheel anti-lock brakes (4W-ABS)

  1. Legal Aspects of Using Information Technology

    should be compressed to keep download times and bandwidth requirements to a minimum. Private data (this includes e-mail, network and postal addresses, telephone numbers, payment card details, etc) should not be disclosed to third parties, without the permission of the data subject.

  2. Data Protection Act

    before processing of sensitive personal data can comply with the First Principle: - The processing is necessary for the purposes of exercising or performing any right or obligation which is conferred or imposed by law on the data controller in connection with employment.

  1. Critically evaluate the extent to which it can be said that copyright law gives ...

    an economic purpose and that will probably contribute to the selling of the album cannot gain copyright protection. Because of the ever changing contemporary art world some pieces of work will inevitably be very hard to place a definition upon, thus causing a problem when trying to protect the work.

  2. Is the UK copyright act of 1988 still an adequate means of protecting intellectual ...

    So far, there has been only one dispute arising from inlining. It involved the comic strip `Dilbert' and has settled out of court with removal of the materials involved (2). Framing Introduced in 1996 by Netscape Communications Corporation as a feature of their web browser, the <FRAME> tag allows the viewer screen to split into multiple scrollable sections (`frames')

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work