• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

GCSE: Legislation & The Legal Framework

Browse by

Currently browsing by:

4 star+ (2)
3 star+ (3)

Meet our team of inspirational teachers

find out about the team

Get help from 80+ teachers and hundreds of thousands of student written documents

  1. 1
  2. 2
  1. Computers and the Law.

    Back to Menu Hacking Hacking is the illegal access to other peoples computers. It is usually done via telephone networks like the Internet which can allow hackers to get access to computers anywhere in the world. Some hackers break into other peoples computer systems just for the pleasure of achieving something which is hard to do. Most hackers though do it for malicious reasons and set out to cause havoc. Hackers may steal information, change or even delete information. They may plant Trojan horse software which sends things like passwords back to the hacker. Hacking is a serious worry for many businesses. It could mean that trades secrets could be sold to competitors.

    • Word count: 1182
  2. The Child Protection Act.

    The current legislation The current legislation is much like the old legislation except that there are some reforms that have been put into place. The Child protection Act of 1999 states that there are new rights of people reporting the suspected abuse and that there is a charter of rights for child care. When an investigation is being conducted and the investigator believes that it is important that the child does not return home until the end of the investigation due to there being a threat of possible harm, three types of orders can be applied for.

    • Word count: 1112
  3. Computer Legislation Assignment

    Viruses A computer virus is simply defined as a self-replicating automated program. However, as well as doing this, most viruses carry a payload which makes them either display annoying messages or graphics on the screen or destroy your files (programs and data). Several thousands of viruses are detected and prevented by most secure machines which have anti-virus software installed (such as AVG, Norton etc). However some viruses do manage to evade virus protection software and infect systems. Some viruses are so harmful that they can damage sensitive programs which a business may need in order to carry out operations.

    • Word count: 1272
  4. The Data Protection Act

    who processes the data on behalf of the data controller; "data subject" means an individual who is the subject of personal data; "personal data" means data which relate to a living individual who can be identified- (a) from those data, or (b) from those data and other information which is in the possession of, or is likely to come into the possession of, the data controller, and includes any expression of opinion about the individual and any indication of the intentions of the data controller or any other person in respect of the individual; "processing", in relation to information or

    • Word count: 1991

Marked by a teacher

This document has been marked by one of our great teachers. You can read the full teachers notes when you download the document.

Peer reviewed

This document has been reviewed by one of our specialist student essay reviewing squad. Read the full review on the document page.

Peer reviewed

This document has been reviewed by one of our specialist student document reviewing squad. Read the full review under the document preview on this page.