• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Legislation and ICT

Extracts from this document...

Introduction

THE DATA PROTECTION ACT (1998) THE COMPUTER MISUSE ACT (1990) COPYRIGHT, DISIGNS & PATENTS ACT (1989) HEALTH & SAFETY AT WORK ACT (1974) HEALTH & SAFETY REGULATIONS (1992) REGULATION OF INVESTIGATORY POWERS ACT (2000) The Data Protection Act (1998) The Data Protection Act (1998) came into force on 1st March 2000. It sets rules for processing personal information and applies to paper records as well as those held on computers. It was brought out because computers were getting more powerful and easy to use. Companies, government and other organisations began to use them to store large amounts of information about people, such as their customers, clients and staff details. Databases with this information can be quickly set up, searched, edited and accessed and take up less space than paper records. So company's send peoples personal data to one company to the other so that were a danger in case someone tries to access some ones personal details with out permission. The Data Protection Act has 8 principles they are; 1) It must be collected and used fairly with in the law 2) It must only be held and used for the reasons given to the Information Commissioner 3) It can only be used for those registered purposes and only be disclosed to those people mentioned in the register entry. You cannot give it away or sell it unless you said you would on the form 4) ...read more.

Middle

The Computer Misuse Act (1990) The computer Misuse act law was designed because people miss used computers a lot example; Downloading Viruses, Hacking into other peoples computers and networks to gain others personal details, Data misuse and unauthorised transfer or copying, Copying and distributing software, making music and film copies with out permission, Email and chat room abuses, using unsuitable material, Identity and financial abuses and giving threats and blackmailing people. The Computer Misuse Act was passed by Parliament and made three new offences which are: 1) Accessing computer material without permission e.g. looking at someone else's files. 2) Accessing computer material without permission with intent to commit further criminal offences e.g. hacking into the bank's computer and wanting to increase the amount in your account. 3) Altering computer data without permission e.g. writing a virus to destroy someone else's data, or actually changing the money in an account. Copyright, Design and Patents Act (1989) The Copyright, Design & Patents Act (1989) came into force on 1st August 1989. This law comes into action when there is someone that copies someone else's idea (design/product) to make it there own and then to sell it off by making copies with out the original owners permission. Examples music CDs, DVDs, games and etc. This law is designed to a subsequent amendment to the 1988 Copyright Act confused the issue of life time of Copyright by acting retrospectively. ...read more.

Conclusion

The UK (United Kingdom) National Health Service makes sure that these regulations are insured by every organisation. Regulation of Investigatory Powers Act (2000) This Act called Regulation of Investigatory Powers Act is about defining the powers o the governments and its security's intelligence, communications and data handling. This Act allows the government to issue an interception warrant to an ISP or even a mobile company/organisation for some communications data on vague grounds such as ''national Security'', ''preventing or detecting crimes'' or even ''safe guarding the economic well being of the UK''. If they do this, the employee(s) the interception warrant is served to must comply with it or face up to 2 years in jail locked up. They must NEVER tell anyone about it either or face up to five years in jail locked up. The government could demand all the data that flows to and from your Internet account checked with you never knowing about it. From my point of view I think that this is a bad Act because the Act requires of any employee of a company to provide a public telecommunications service which they have to then obey interception warrants weather they like it or not, but if they disobey the Act they will then have to face up to 2 years In jail locked up. This Act is working well as far as I know because all companies/organisations are cooperating with this Act perfectly. ?? ?? ?? ?? LEGISLATION & ICT Unit 3 GCSE ICT COURSEWORK Legisiation & ICT - 1 - ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. The Data Protection Act 1998 - questions and answers

    If the information is encoded in some way then the individual is entitled to be given an explanation of the information. Particular rules apply where the data controller finds itself in the situation that it cannot comply with the subject access request without disclosing information relating to an individual who

  2. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    Data holders should protect the data against loss, theft or corruption - it should not be able to be viewed by just anyone 6. Data must only be obtained and used for the stated purposes Evaluation: These Data protection act affect her as if she decides to do online shopping,

  1. Legal Aspects of Using Information Technology

    Also, no program should try to access information about the viewer or the viewer's computer system * Mail and news- when sending e-mail to more than on individual, it is cheaper than using ordinary mail. When sending an advertising mail through the post, it is very costly to the sender.

  2. Data Protection Act

    It should be noted that observance of these requirements will not ensure fair processing unfair. There is a general duty of fairness, which consists in part of the fair processing requirements of the Act.2 2.1 Second Principle "Personal data shall be obtained only for one or more specified and lawful

  1. Car Safety

    For example, one car the Mazda has all these safety precautions in place in case an accident occurs: * Intrusion minimizing brake pedal to help reduce foot and leg injuries in a frontal collision * Front seats designed to minimize whiplash and the chance of neck injury in a rear-end

  2. Critically evaluate the extent to which it can be said that copyright law gives ...

    is actually needed to constitute a piece of work being considered 'artistic craftsmanship'. In this case a proto-type made for a suite of furniture was held not to be a work of craftsmanship. In order for something to be classed as a work of artistic craftsmanship it must have some 'artistic quality'.

  1. Is the UK copyright act of 1988 still an adequate means of protecting intellectual ...

    Furthermore, it is arguable whether framing can be covered by the scope of the implied licence for linking, since it does not take the end user to the web site, but rather brings the site to the user through another (framing)

  2. Assets table - recording the copyright information on the logos and pictures I used.

    This was chosen because it was a good sized fair trade product. Swap advert Sunflowers, tulips and a pot of flower. image s N/A flowers I have cropped the image and made it bigger this is to make it more visible for the target audience and to get rid of the irrelevant text.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work