• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Legislation and ICT

Extracts from this document...


THE DATA PROTECTION ACT (1998) THE COMPUTER MISUSE ACT (1990) COPYRIGHT, DISIGNS & PATENTS ACT (1989) HEALTH & SAFETY AT WORK ACT (1974) HEALTH & SAFETY REGULATIONS (1992) REGULATION OF INVESTIGATORY POWERS ACT (2000) The Data Protection Act (1998) The Data Protection Act (1998) came into force on 1st March 2000. It sets rules for processing personal information and applies to paper records as well as those held on computers. It was brought out because computers were getting more powerful and easy to use. Companies, government and other organisations began to use them to store large amounts of information about people, such as their customers, clients and staff details. Databases with this information can be quickly set up, searched, edited and accessed and take up less space than paper records. So company's send peoples personal data to one company to the other so that were a danger in case someone tries to access some ones personal details with out permission. The Data Protection Act has 8 principles they are; 1) It must be collected and used fairly with in the law 2) It must only be held and used for the reasons given to the Information Commissioner 3) It can only be used for those registered purposes and only be disclosed to those people mentioned in the register entry. You cannot give it away or sell it unless you said you would on the form 4) ...read more.


The Computer Misuse Act (1990) The computer Misuse act law was designed because people miss used computers a lot example; Downloading Viruses, Hacking into other peoples computers and networks to gain others personal details, Data misuse and unauthorised transfer or copying, Copying and distributing software, making music and film copies with out permission, Email and chat room abuses, using unsuitable material, Identity and financial abuses and giving threats and blackmailing people. The Computer Misuse Act was passed by Parliament and made three new offences which are: 1) Accessing computer material without permission e.g. looking at someone else's files. 2) Accessing computer material without permission with intent to commit further criminal offences e.g. hacking into the bank's computer and wanting to increase the amount in your account. 3) Altering computer data without permission e.g. writing a virus to destroy someone else's data, or actually changing the money in an account. Copyright, Design and Patents Act (1989) The Copyright, Design & Patents Act (1989) came into force on 1st August 1989. This law comes into action when there is someone that copies someone else's idea (design/product) to make it there own and then to sell it off by making copies with out the original owners permission. Examples music CDs, DVDs, games and etc. This law is designed to a subsequent amendment to the 1988 Copyright Act confused the issue of life time of Copyright by acting retrospectively. ...read more.


The UK (United Kingdom) National Health Service makes sure that these regulations are insured by every organisation. Regulation of Investigatory Powers Act (2000) This Act called Regulation of Investigatory Powers Act is about defining the powers o the governments and its security's intelligence, communications and data handling. This Act allows the government to issue an interception warrant to an ISP or even a mobile company/organisation for some communications data on vague grounds such as ''national Security'', ''preventing or detecting crimes'' or even ''safe guarding the economic well being of the UK''. If they do this, the employee(s) the interception warrant is served to must comply with it or face up to 2 years in jail locked up. They must NEVER tell anyone about it either or face up to five years in jail locked up. The government could demand all the data that flows to and from your Internet account checked with you never knowing about it. From my point of view I think that this is a bad Act because the Act requires of any employee of a company to provide a public telecommunications service which they have to then obey interception warrants weather they like it or not, but if they disobey the Act they will then have to face up to 2 years In jail locked up. This Act is working well as far as I know because all companies/organisations are cooperating with this Act perfectly. ?? ?? ?? ?? LEGISLATION & ICT Unit 3 GCSE ICT COURSEWORK Legisiation & ICT - 1 - ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Assets table - recording the copyright information on the logos and pictures I used.

    have Cropped the image and then enlarged it to make it more visible to my audience and the picture of tea was chosen for its simplicity and how good it was compared to the rest of them. Still movie several pictures of ale Image S N/A Image that will be

  2. The purpose of legislation is to control and regulate the use of ICT

    The application of the 1988 Act to electronic copying is even stricter than its application to photocopying, since the fair dealing arrangements that usually apply to libraries do not exist for computerised materials. -Data Protection and Freedom of Information The Data Protection Act 1998 concerns the processing of information about living individuals.

  1. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    she will usually have to enter the credit and debit card details so if for example the company saves the details for longer then necessary it may be end up stolen or get corrupted. Even if the data gets shared the details could be used by anyone which also would affect her.

  2. The Data Protection Act 1998 - questions and answers

    If the information is encoded in some way then the individual is entitled to be given an explanation of the information. Particular rules apply where the data controller finds itself in the situation that it cannot comply with the subject access request without disclosing information relating to an individual who

  1. Car Safety

    The aluminium bonnet has cone-type construction to absorb and cushion impacts in the event of a car-pedestrian accident. Crash worthiness is particularly sound at the vehicle's sides, which, in spite of the absence of centre pillars, exhibit crash safety on a par with traditional four-door sedans.

  2. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    However, the act does impose the companies to not hide this information in any way. They have to make sure it is noticeable to any users signing up. The act also makes sure that those aiming to use this agreement maliciously, i.e.

  1. 3E-The legislation that protects individuals and groups from the misuse of ICT

    that I am linked with, to contact me encase of an emergency or to keep me alert of a particular event i.e. health related appointment. My personal data will need to be regularly updated to ensure that it is correct.

  2. Data Protection Act

    - The processing is necessary to comply with any legal obligation to which the data controller is subject, other than an obligation imposed by contract. - The processing is necessary in order to protect the vital interests of the data subject.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work