• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Legislation and ICT

Extracts from this document...


THE DATA PROTECTION ACT (1998) THE COMPUTER MISUSE ACT (1990) COPYRIGHT, DISIGNS & PATENTS ACT (1989) HEALTH & SAFETY AT WORK ACT (1974) HEALTH & SAFETY REGULATIONS (1992) REGULATION OF INVESTIGATORY POWERS ACT (2000) The Data Protection Act (1998) The Data Protection Act (1998) came into force on 1st March 2000. It sets rules for processing personal information and applies to paper records as well as those held on computers. It was brought out because computers were getting more powerful and easy to use. Companies, government and other organisations began to use them to store large amounts of information about people, such as their customers, clients and staff details. Databases with this information can be quickly set up, searched, edited and accessed and take up less space than paper records. So company's send peoples personal data to one company to the other so that were a danger in case someone tries to access some ones personal details with out permission. The Data Protection Act has 8 principles they are; 1) It must be collected and used fairly with in the law 2) It must only be held and used for the reasons given to the Information Commissioner 3) It can only be used for those registered purposes and only be disclosed to those people mentioned in the register entry. You cannot give it away or sell it unless you said you would on the form 4) ...read more.


The Computer Misuse Act (1990) The computer Misuse act law was designed because people miss used computers a lot example; Downloading Viruses, Hacking into other peoples computers and networks to gain others personal details, Data misuse and unauthorised transfer or copying, Copying and distributing software, making music and film copies with out permission, Email and chat room abuses, using unsuitable material, Identity and financial abuses and giving threats and blackmailing people. The Computer Misuse Act was passed by Parliament and made three new offences which are: 1) Accessing computer material without permission e.g. looking at someone else's files. 2) Accessing computer material without permission with intent to commit further criminal offences e.g. hacking into the bank's computer and wanting to increase the amount in your account. 3) Altering computer data without permission e.g. writing a virus to destroy someone else's data, or actually changing the money in an account. Copyright, Design and Patents Act (1989) The Copyright, Design & Patents Act (1989) came into force on 1st August 1989. This law comes into action when there is someone that copies someone else's idea (design/product) to make it there own and then to sell it off by making copies with out the original owners permission. Examples music CDs, DVDs, games and etc. This law is designed to a subsequent amendment to the 1988 Copyright Act confused the issue of life time of Copyright by acting retrospectively. ...read more.


The UK (United Kingdom) National Health Service makes sure that these regulations are insured by every organisation. Regulation of Investigatory Powers Act (2000) This Act called Regulation of Investigatory Powers Act is about defining the powers o the governments and its security's intelligence, communications and data handling. This Act allows the government to issue an interception warrant to an ISP or even a mobile company/organisation for some communications data on vague grounds such as ''national Security'', ''preventing or detecting crimes'' or even ''safe guarding the economic well being of the UK''. If they do this, the employee(s) the interception warrant is served to must comply with it or face up to 2 years in jail locked up. They must NEVER tell anyone about it either or face up to five years in jail locked up. The government could demand all the data that flows to and from your Internet account checked with you never knowing about it. From my point of view I think that this is a bad Act because the Act requires of any employee of a company to provide a public telecommunications service which they have to then obey interception warrants weather they like it or not, but if they disobey the Act they will then have to face up to 2 years In jail locked up. This Act is working well as far as I know because all companies/organisations are cooperating with this Act perfectly. ?? ?? ?? ?? LEGISLATION & ICT Unit 3 GCSE ICT COURSEWORK Legisiation & ICT - 1 - ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Marked by a teacher

    Ict and the law

    4 star(s)

    It means that people should not attempt to access my areas and try and change my files on there. It also means that people should not try to add viruses or Trojans onto my user areas to try and gain information about me that could be used for fraud or blackmail.

  2. Assets table - recording the copyright information on the logos and pictures I used.

    used in my still movie I have Cropped theses images and then enlarged them so that the people watching this movie can easily see the relevant and main images, there purpose it to show people more options than just regular beer/ale.

  1. The Data Protection Act 1998 - questions and answers

    If the information is encoded in some way then the individual is entitled to be given an explanation of the information. Particular rules apply where the data controller finds itself in the situation that it cannot comply with the subject access request without disclosing information relating to an individual who

  2. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    Data holders should protect the data against loss, theft or corruption - it should not be able to be viewed by just anyone 6. Data must only be obtained and used for the stated purposes Evaluation: These Data protection act affect her as if she decides to do online shopping,

  1. Data Protection Act

    Data controller should seek to identify the minimum amount of information that is required in order properly to fulfil their purpose and this will be a question of fact in each case. To hold additional information about certain individuals, such information should only be collected and recorded in those cases.

  2. Car Safety

    The aluminium bonnet has cone-type construction to absorb and cushion impacts in the event of a car-pedestrian accident. Crash worthiness is particularly sound at the vehicle's sides, which, in spite of the absence of centre pillars, exhibit crash safety on a par with traditional four-door sedans.

  1. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    This is where the Data Protection Act comes into play. While it stops sites from giving his e-mail and home address to sale companies and such which send junk mail, it more importantly stops sites from performing credit card fraud.

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    school, dentist etc. The data protection act ensures that my personal information is kept safe and restricts other people from gaining access to the data. Ultimately, my data is secured and is only used according to my permission and for emergency events.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work