• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Legislation and ICT

Extracts from this document...

Introduction

THE DATA PROTECTION ACT (1998) THE COMPUTER MISUSE ACT (1990) COPYRIGHT, DISIGNS & PATENTS ACT (1989) HEALTH & SAFETY AT WORK ACT (1974) HEALTH & SAFETY REGULATIONS (1992) REGULATION OF INVESTIGATORY POWERS ACT (2000) The Data Protection Act (1998) The Data Protection Act (1998) came into force on 1st March 2000. It sets rules for processing personal information and applies to paper records as well as those held on computers. It was brought out because computers were getting more powerful and easy to use. Companies, government and other organisations began to use them to store large amounts of information about people, such as their customers, clients and staff details. Databases with this information can be quickly set up, searched, edited and accessed and take up less space than paper records. So company's send peoples personal data to one company to the other so that were a danger in case someone tries to access some ones personal details with out permission. The Data Protection Act has 8 principles they are; 1) It must be collected and used fairly with in the law 2) It must only be held and used for the reasons given to the Information Commissioner 3) It can only be used for those registered purposes and only be disclosed to those people mentioned in the register entry. You cannot give it away or sell it unless you said you would on the form 4) ...read more.

Middle

The Computer Misuse Act (1990) The computer Misuse act law was designed because people miss used computers a lot example; Downloading Viruses, Hacking into other peoples computers and networks to gain others personal details, Data misuse and unauthorised transfer or copying, Copying and distributing software, making music and film copies with out permission, Email and chat room abuses, using unsuitable material, Identity and financial abuses and giving threats and blackmailing people. The Computer Misuse Act was passed by Parliament and made three new offences which are: 1) Accessing computer material without permission e.g. looking at someone else's files. 2) Accessing computer material without permission with intent to commit further criminal offences e.g. hacking into the bank's computer and wanting to increase the amount in your account. 3) Altering computer data without permission e.g. writing a virus to destroy someone else's data, or actually changing the money in an account. Copyright, Design and Patents Act (1989) The Copyright, Design & Patents Act (1989) came into force on 1st August 1989. This law comes into action when there is someone that copies someone else's idea (design/product) to make it there own and then to sell it off by making copies with out the original owners permission. Examples music CDs, DVDs, games and etc. This law is designed to a subsequent amendment to the 1988 Copyright Act confused the issue of life time of Copyright by acting retrospectively. ...read more.

Conclusion

The UK (United Kingdom) National Health Service makes sure that these regulations are insured by every organisation. Regulation of Investigatory Powers Act (2000) This Act called Regulation of Investigatory Powers Act is about defining the powers o the governments and its security's intelligence, communications and data handling. This Act allows the government to issue an interception warrant to an ISP or even a mobile company/organisation for some communications data on vague grounds such as ''national Security'', ''preventing or detecting crimes'' or even ''safe guarding the economic well being of the UK''. If they do this, the employee(s) the interception warrant is served to must comply with it or face up to 2 years in jail locked up. They must NEVER tell anyone about it either or face up to five years in jail locked up. The government could demand all the data that flows to and from your Internet account checked with you never knowing about it. From my point of view I think that this is a bad Act because the Act requires of any employee of a company to provide a public telecommunications service which they have to then obey interception warrants weather they like it or not, but if they disobey the Act they will then have to face up to 2 years In jail locked up. This Act is working well as far as I know because all companies/organisations are cooperating with this Act perfectly. ?? ?? ?? ?? LEGISLATION & ICT Unit 3 GCSE ICT COURSEWORK Legisiation & ICT - 1 - ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    she will usually have to enter the credit and debit card details so if for example the company saves the details for longer then necessary it may be end up stolen or get corrupted. Even if the data gets shared the details could be used by anyone which also would affect her.

  2. Data Protection Act

    Data controller should seek to identify the minimum amount of information that is required in order properly to fulfil their purpose and this will be a question of fact in each case. To hold additional information about certain individuals, such information should only be collected and recorded in those cases.

  1. The Data Protection Act 1998 - questions and answers

    If the information is encoded in some way then the individual is entitled to be given an explanation of the information. Particular rules apply where the data controller finds itself in the situation that it cannot comply with the subject access request without disclosing information relating to an individual who

  2. The legislation that protects individuals and groups from the misuse of ICT

    the work, for this reason it is apparent that individuals who own the copyrights for pieces of work are not protected to a full extent. To improve the overall impact and effect of the Copyright, designs and Patent Act, certain improvements need to be made to

  1. 3E-The legislation that protects individuals and groups from the misuse of ICT

    to be highly secured and some of them maybe minimally vital, which may need less protection. Highly sophisticated encryption shall be needed for the data which are crucial and important. Therefore not all data will need to be highly secured and is something that should be mentioned in this specific law.

  2. Leaflet design for Finding Nemo.

    The appearance of the original poster (number 6) is very well laid out. It is basically one big picture used as the background and the foreground, with a smidgen of writing over the top. At the top of the poster it says "From the creators of Monsters Ink".

  1. Privacy and Data Protection: IT Law

    The overall policy objectives going beyond mere free movement, aiming to provide a level playing field for economic operators in different member states, to simplify the regulatory environment in the interests of both good governance and competitiveness and to encourage cross-border activity within the EU is not fulfilled.

  2. Assets table - recording the copyright information on the logos and pictures I used.

    This was chosen because it was a good sized fair trade product. Swap advert Two brothers next to each other with a smile and someone with clean water with a smile on their face. image s N/A Two happy African boys I have cropped the image and made it bigger

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work