• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

GCSE: Legislation & The Legal Framework

Browse by
Rating:
4 star+ (3)
3 star+ (8)
Document length:
fewer than 1000 words (26)
1000-1999 words (30)
2000-2999 words (8)
3000+ words (16)
Submitted within:
last 3 months (2)
last 6 months (2)
last 12 months (2)

Meet our team of inspirational teachers

find out about the team

Get help from 80+ teachers and hundreds of thousands of student written documents

  • Marked by Teachers essays 1
  • Peer Reviewed essays 7
  1. 1
  2. 2
  3. 3
  4. 4
  1. Marked by a teacher

    Ict and the law

    4 star(s)

    What if someone had added one or more offences to your criminal record? This is why the DPA exists. This law covers both digital and written information which is covered from the moment it is created until the moment it is erased. The law lets the Data Controller (the owning company) of the data to allow or disallow access, viewing and/or editing of the information about various data subjects (the person who has data about them stored outside their direct control)

    • Length: 1725 words
  2. Peer reviewed

    The Data Protection Act

    4 star(s)

    kept no longer than necessary * processed within the rights of the data subjects * kept secure * not transferred to other countries without protection We have much information held about us in many places. Without the Data Protection Act, personal information could be misused and shared with anyone, however the Data Protection Act ensures that the companies and government which holds this information will not breach anyone's right to privacy. The act benefits a number of people. It benefits me, people at work, and also the community.

    • Length: 872 words
  3. Peer reviewed

    The Main Features and Difficulties Regarding the Regulation of E-Commerce

    4 star(s)

    2 Nevertheless, the need for regulation is clearly visible as the success of electronic transactions is dependant on the knowledge of legal system controlling them. Non-existence of universal jurisdiction over e-commerce transactions might raise few problems. Each participant will be forced to gain knowledge of every legal system which concerns e-commerce throughout the world. This will hinder the development of e-commerce. Therefore, different countries and organizations tried to come up with some form of regulation although not a strict one which could constitute slow development of e-commerce.

    • Length: 1471 words
  4. Peer reviewed

    E-Commerce is the buying and selling of products using an electronic service. Discuss.

    3 star(s)

    Amazon, EBay but also upgrading an account from a standard to a premium account such as Megavideo. This type of E-Commerce is called "business to consumer", whereby the business is selling to the public instead of a certain business. Some common applications related to electronic commerce are the following: * Email * Enterprise content management * Instant messaging * Newsgroups * Online shopping and order tracking * Online banking * Online office suites * Domestic and international payment systems * Shopping cart software * Teleconferencing They way E-Commerce works is simple.

    • Length: 497 words
  5. Peer reviewed

    E-commerce - the legal considerations

    3 star(s)

    Website terms and conditions The site must have comprehensive terms and conditions and you will need to link to these wherever applicable (eg if you are selling there should be a check box that the consumer ticks to say "I have read the terms and conditions etc etc". Things the terms and conditions should contain include: * Data protection act considerations (as explained above) * Terms and conditions of use including copyright notice, general disclaimer, liabilities (or non-liabilities - especially in terms of credit card fraud)

    • Length: 1373 words
  6. Peer reviewed

    Legal issues of e-commerce

    3 star(s)

    Legal Issues Data protection considerations The Data Protection Act lays puts down a serious of rules that M&S must obey under their co-operation. Therefore as a successful trader any personal data that the company collects from its customers, such as name, address and billing information such as credit card details must be protected from fraud. Therefore M&S must deal fairly with the info they receive from consumers and tell the customer what data the have collected, upon that they must tell them what you are going to do with that information, and consult with the customers before taking any actions.

    • Length: 852 words
  7. Peer reviewed

    Managing Research and Information: Data Protection Act

    3 star(s)

    It is fairly to exchange the data. Furthermore, their privacy details are protected by the law. Also the company must keep them securely. 2. Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with those purposes.

    • Length: 486 words
  8. Peer reviewed

    The Data Protection Act.

    3 star(s)

    It was created to protect everyone's civil rights and the information that is kept on them by organisations. Principles of Data Protection The rules Anyone processing personal data must comply with the eight enforceable principles of good practice. They say that data must be: * Fairly and lawfully processed; * Processed for limited purposes; * Adequate, relevant and not excessive; * Accurate; * Not kept longer than necessary; * Processed in accordance with the data subject's rights; * Secure; * Not transferred to countries without adequate protection.

    • Length: 465 words
  9. Assets table - recording the copyright information on the logos and pictures I used.

    Mediator 9 A picture of me image p N/A A picture of me I cropped the picture so that it only shows the relevant image that I have chosen for this task, it is to also show the audience that I have took time to make sure it is relevant to my work. I have also used a picture of me to personalise my mediator file. Mediator 9 Fair trade planet picture image s N/A A picture of the world painted on someone's face showing the world as one.

    • Length: 2189 words
  10. The Legislation That Protects Individuals and Groups using IT. Use of It by myself and an adult in employment.

    This includes the right to see what personal information of theirs has been stored. The act also requires each respective organisation to protect the data that is stored from loss, theft or corruption. The act instils its law by convicting any who break the act to be fined and required to pay compensation to the data. In other serious cases, e.g. regarding a corrupt organisation, a jail sentence can be applied. Brief history of the Data Protection Act The Data Protection Act 1998 was a replacement and consolidation of the earlier Data Protection Act 1984 and the Access to Personal Files Act 1987.

    • Length: 6079 words
  11. The social, legal, moral aspects of I.C.T. In this report, I am going to discuss some of the positive and negative effects of ICT in view of its social, economic, legal and moral implications.

    The internet changing how we react * More people are shopping online and are communicating via email making people lazy. * Internet communication may make people lose their personal communication sills. 3. over reliance on technology * People rely too much on computers for the smooth running of society. 4. impact on literacy * People spend more time on the computer games and the consequences less time for reading and improving literacy skills. * Educations concentration may drop. 5.

    • Length: 1125 words
  12. Ict and the law

    It was brought in because more and more organisations were starting to hold people's personal information on computers. This was a problem because nobody knew who was holding their information. Data users must register all their purposes on a national register held by a Date Protection Commissioner and the data can only be used for that purpose. The second act was brought in after more people began to use the internet to collect information. This makes the community safer from identity theft and gives the thief a fine if he/she does wrongly. Data must only be used for the purposes that have been registered.

    • Length: 997 words
  13. Piracy. Many people have problems with piracy, some of them are the singers themselves and they claim that if you listen to their songs for free, then you should be providing some service for them too

    All of them have their own opinions, but the more annoying ones try to take action against piracy. First time I came to England in 2005 and before that, I didn't even know that licensed software is so expensive, I had very sincere opinion of my own that all those people who buy licensed software are just so stupid that it's unbelievable... it's just like throwing money out of the window and look at how wind carries them away. Until the age of 14, I haven't bought a DVD or CD game or film for more expensive than 5$, average

    • Length: 583 words
  14. 3E-The legislation that protects individuals and groups from the misuse of ICT

    One of the many examples of technologies used by her will be an electronic wheelchair. The technology has provided exciting opportunities to her because it has make certain that she is able to move about at will and carry out a number of task on a daily basis via the wheelchair i.e. shopping. Additionally, I have also written a report on the many technologies used by the community I live in. The technology used in Leyton has been very useful for the society living in this particular area including me. For instance, CCTV cameras being operated in the area has ensured the prevention of criminal proceedings for peace and safeness in the area.

    • Length: 12524 words
  15. The impact of ICT on the environment

    An increase has been seen in the amount of people studying ICT in their own time, on online courses or at night school. People now realise the need for ICT skills to succeed anywhere in society, there is one main benefit to this; individual levels of training and education are constantly increasing. One way to overcome this problem of unskilled workers is to start people learning ICT skills at an early age. Team working, problem solving and ICT skills are helping people to play a full role in society and exercise their rights and duties as citizens and are therefore are important to learn.

    • Length: 2079 words
  16. Free essay

    HEALTH AND SEF

    also damage hand if done excessively Someone may break a bone or risk some other injury Things you found out - from books or the web What I found out Why you must/must not do it The law states that an employer must provide or ensure: 1. Tilt-able screens 2.

    • Length: 502 words
  17. Health and Safety

    Tightness, aching and stiffness in arms, neck and shoulders Numbness, coldness or tingling in arm and hands. Loss of strength in hands. Preventing RSI Ergonomic Keyboards Raising the keyboard Wrist Supports Take Regular Breaks Use keyboard shortcuts instead of mouse. Exercise fingers and hands. 3) Eye Strain The eyes can become strained after staring at a monitor particularly if working in bad light or a flickering screen. This can also lead to headaches. Glare from the screen and poor quality images on old monitors make it hard for the eyes to focus Preventing Eye Strain Take Regular Breaks Work in a well lit room Reduce glare on Screen/Sun Adjust the contrast on screen.

    • Length: 630 words
  18. ICT in Business and Commerce

    You can read what other people thought of the product before you buy. Amazon allows customers to listen to a sample of each track on the CD before they decide to buy Businesses have fewer overheads and these savings should be passed on to the customer. Drawbacks of Online Commerce: * Some people actually enjoy going out shopping * Security concerns (credit card fraud, bogus companies etc.) * Waiting for goods to arrive (or the wrong goods arriving) * Technological Underclass (the poorest people in society have the least access to the new technology)

    • Length: 631 words
  19. ICT - Data Protection

    For example, a database could be searched to find all customers living in a particular area, to target them for "special offer" advertising. Searches of databases like this are much faster with computers and, in particular, information can be matched from one database to another far more than if it is stored on paper. The Database section has more on searching. Communications networks Storing information about people on computers which are linked to communications networks like the Internet or private company networks has also become important.

    • Length: 1345 words
  20. The legislation that protects individuals and groups from the misuse of ICT

    - Data is not to be transferred to countries outside the European Economic Area. The above principles are in place to protect the British Public, the government passed the law with the interest of the public at heart, after rising concern when there was an increase in the amount of data that was stored about people. This particular legislation is most applicable and relevant to Mr. Clements, the person I studied in Unit 3B, because he is responsible for a vast amount of data stored about clients, this data includes a range of things from home address to telephone number and from occupation to bank account details.

    • Length: 3293 words
  21. ICT LAWS

    It must not be kept longer than is necessary for the registered purpose. It is alright to keep information for certain lengths of time but not indefinitely. This rule means that it would be wrong to keep information about past customers longer than a few years at most. 7. The information must be kept safe and secure. This includes keeping the information backed up and away from any unauthorised access. It would be wrong to leave personal data open to be viewed by just anyone.

    • Length: 1625 words
  22. ICT AND SOCIETY

    Companies, government and other organisations began to use them to store large amounts of information about people, such as their customers, clients and staff .Database with this information can be quickly set up, searched, edited and accessed and take up less space than paper records. In recent day's organisations aren't allowed to keep data longer than until it is of any use to them, now you need permission and acknowledgement of the specific person for their details and you must explain to them the reasons you're asking for their personal details, how long the data is going to be kept

    • Length: 9617 words
  23. Data Protection Act

    They say that any data held about a person must be: 1. fairly and lawfully processed; 2. processed for limited purposes; 3. adequate, relevant and not excessive; 4. accurate; 5. not kept for longer than is necessary; 6. processed in line with your rights; 7. secure; 8. not transferred to countries without adequate protection. How a school abides by the rules The data that is supplied to the school is given in on a sheet that is filled out by the parents. It is them give to the school computers. The sheets that have been handed out should then be destroyed because of act 7 which says that all data must be secure and it is more secure on a computer than on a piece of paper that can be lost.

    • Length: 1713 words
  24. The computer misuse act

    The Act introduced three new offences: 1. Accessing computer material without permission (e.g. viewing someone else's files) 2. Accessing computer material without permission with intent to commit further criminal offences (e.g. hacking into a bank's computer as a result of wanting to increase the amount in your account) 3. Altering computer data without permission (e.g. writing a virus to destroy someone else's data) A breach of the 1990 Computer Misuse Act would be if a student hacked into the school database, and altered information without permission. This is unauthorised modification.

    • Length: 823 words
  25. The legislations that protects individuals and groups from the misuse of ICT

    processed within the rights of the data subjects 7. kept secure 8. kept only within the EEC. This basically means that it however sensitive the information held by a company is about a person, that information must only be used for the reason it was collected. This law applies to all businesses and organizations and all the records that ate kept. Unfortunately there are some exemptions for this ACT. If you process data for personal, family or recreational use you are exempt from the ACT. Exemptions could include birthday lists, personal appointments for the family or information on hobbies.

    • Length: 930 words

Marked by a teacher

This document has been marked by one of our great teachers. You can read the full teachers notes when you download the document.

Peer reviewed

This document has been reviewed by one of our specialist student essay reviewing squad. Read the full review on the document page.

Peer reviewed

This document has been reviewed by one of our specialist student document reviewing squad. Read the full review under the document preview on this page.