• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

GCSE: Legislation & The Legal Framework

Browse by
4 star+ (3)
3 star+ (8)
Word count:
fewer than 1000 (26)
1000-1999 (30)
2000-2999 (8)
3000+ (16)

Meet our team of inspirational teachers

find out about the team

Get help from 80+ teachers and hundreds of thousands of student written documents

  1. 1
  2. 2
  3. 3
  4. 4
  1. Right of privacy under Hong Kong's current laws

    It's noteworthy that no legal assistance is available to persons seeking compensation under section 66 of the PD(P)O or defamation action. Many tragedy victims or families in grief, who have their privacy infringed, are deterred to seek remedies based on the tort law by the high legal cost proceedings, because the Legal restrictions applied to journalists Notwithstanding there is not legal protection as a whole against privacy infringement in Hong Kong, journalists are restricted in certain aspects by the BL, the statutes and the common law.

    • Word count: 2707
  2. Data protection act

    The computer misuse act also lets you view data about your self, and if you want to you can request to have it deleted. The computer misuse act protects people's network from being hacked into. For example peoples passwords being found out. This also prevents hackers (people who get into a network with out being authorized. Even though hackers hack into peoples computers today most of them are frighten that they might get caught and will have to suffer the penalties of the computer misuse act.

    • Word count: 975
  3. The Legislation that protects individuals and groups from the misuse of ICT.

    The results are published in the report An Update on ICT Fraud and Abuse 2004. Since the last survey in 2001, the new report points to some improvement in ICT security, with security policies in place at 96 per cent of organizations. It also recorded a fall in the incidence of 'business disruption' (viruses or other deliberate acts aimed at denying users access to systems), making up only 20 per cent of cases in the 2004 survey compared with 39 per cent in 2001. Data Protection Act (1998) The Data Protection Act (DPA) is a United Kingdom Act of Parliament that provides a legal basis and allowing for the privacy and protection of data of individuals in the UK.

    • Word count: 1549
  4. The Legislation that protects individuals and groups from the misuse of ICT

    Only what is needed may be used * be accurate * be not kept longer than necessary * be accessible to the individual and able to be corrected or removed when necessary * be secure * not transferred to countries without adequate protection As with most rules and regulations, there are some exemptions in Data Protection Act. Here are a few of them: * National Security - no one is allowed to see their personal data if the National Security is at stake * Police Investigations - information used to prevent crime is not covered * Examination Results - the examination results cannot be shown to anyone until they are published by the examination board.

    • Word count: 2327
  5. Effect of Legislation on the Internet

    These Principles are known as the eight data protection principles. Personal Data must be; * Processed fairly and lawfully * Processed only for one or more specified and lawful purpose * Adequate, relevant and non excessive of those purposes * Accurate and kept up to date * Kept for no longer than it is necessary for the purposes it is processed * Processed in line with the rights of individuals * Secured against accidental loss, destruction or damage and against unauthorised or unlawful processing.

    • Word count: 719
  6. Legislation unit 3 part E

    This act is there to protect the privacy of ordinary people. Another part of this act stops information from being passed onto other companies without the person's knowledge. This act links up with Thomas Davies the GP that I researched about in The Impact of I.C.T in adult in employment. This is because he has a lot of data stored on his laptop, the data stored has information on his patients, and he is not to let anyone have access to this data, apart from himself, so therefore he has set passwords on the data so that the data is kept safe and secure.

    • Word count: 1580
  7. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work act, Health & Safety.

    The way legislation affects me: Legislation affects me in many ways as it prevents people from using something I have produced or I do not want them to use. Otherwise it helps me in online shopping as if I buy something online and pay for it and someone try' to hack my account I am able to go to the court and deal with the issue using the act. Here are examples of act which help me: Data Protection act 1.

    • Word count: 3215
  8. Different legislations that protect people from the misuse of ICT.

    He has to make sure that no one else could get into his computer and that he kept his log in name and password secure and to himself meaning no intruders could get that information. He would also have to make sure that he did not pass on his client's personal information to other companies such as pharmaceutical companies so that they don't target that particular client. He has to make sure that the information given to him is used by him or his colleagues only and no one else.

    • Word count: 1672
  9. You have to explain how you have looked after the equipment and ensured its safety. You have shown how you have back up information. I have looked up my computer by starting it up

    These will help your computer run more efficiently. * Always use the Shut Down button to end your computer session. Just turning your PC off may, at the very least, lose or corrupt data in your files. Sitting Right and staying comfortable Sitting in a hunched or slouched manner wile using a computer may eventually lead to muscle, joint and back pain. Avoid these problems by remembering to sit correctly. Adjust the chair so that: * Your lower back is supported.

    • Word count: 3588
  10. Legal Aspects of Using Information Technology

    Viruses may be passed onto the computer in various ways. It may be passed onto the user's computer through the Internet, e.g. downloading an e-mail attachment and saving it to the user's hard disk. It may be passed onto the user's computer through the sharing of floppy disks from one computer to another. There are number of different viruses which are activated in various ways. Some may be activated by the internal clock and may start on a particular day, e.g. Friday 13th. Others may be activated when a series of conditions becomes true, e.g.

    • Word count: 3890
  11. IT And Legislation

    The firm says this is so it can call if a delivery is delayed or an item is unavailable. In one case, a 15-minute conversation with a customer who made it clear he was annoyed at being called ended with the researcher asking: "I guess you'll be saying no to the next question, but would you mind being contacted by Tesco about special offers in future?" After a complaint, and more than a month spent finding the cause, one of Tesco's head office staff called the customer to apologise and explain.

    • Word count: 1642
  12. The Legislation Protecting Individuals and Groups from the Misuse of ICT

    The act also has financial implications on a corporation in the community as they have to pay for the first �100 of any details to be provided free of charge to the individual that wants them. The freedom of Information therefore affects the local businesses and individuals within the community of Leek and has a positive impact on the community in general. The Act is effective in maintaining a healthy balance with the public and local corporations regarding information and stops people holding excessive information on specific individuals within the community of Leek.

    • Word count: 1247

    The manager had been trying to trace a Woolwich customer who was allegedly in arrears with her Woolwich mortgage. In doing so the manager disclosed to a tenant of the customer that she was in arrears. The manager was successfully prosecuted for the unauthorized disclosure. On the basis that the prosecution had jeopardized the manager's career the Court dealt with the matter relatively leniently by imposing a conditional discharge. The data protection act has now been in force for a long period of time and many organizations are finding it hard to abide by. Many companies still are not aware of the obligations under it.

    • Word count: 1639
  14. Legislation and ICT

    Obviously this act is computer based so it is enforced by means of blocking and monitoring certain websites for breaches of the act. Doing so can result in a fine or imprisonment. How each Act protects each group Group Health and Safety at Work Act 1974 Copyright, Designs and Patents Act 1989 Data Protection Act 1998 Computer Misuse Act 1990 The student-You and your web site Prolonged periods looking at computer screen. This may cause damage to the eye and the act advises ten minute breaks are taken every hour when using a computer Copying logos of websites which is forbidden by this act to protect the creator's profits.

    • Word count: 1202
  15. The data protection act

    Personal data shall be accurate and, where necessary, kept up to date; 5. Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes; 6. Personal data shall be processed in accordance with the rights of data subjects under the Act; 7. Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data; 8.

    • Word count: 1696
  16. The Legislations That Protect Individuals and Groups Form Misuse of ICT

    Schools, for example, may keep information on former pupils for no longer than ten years. How It Affects Me As I am reaching the last months of my high school career I have accumulated a large amount of data in my personal records, which is kept in the schools database. I have accumulated both medical, social behaviour, and certificates of achievements. The data protection act insures that after a certain period of time the school will no longer hold this information.

    • Word count: 1810
  17. The data protection act

    The main problems are caused by viruses, they hack into your data and the hacker gathers your information (Trojan) and controls your computer. There are many different viruses for different purposes, and they all are very harmful to your privacy. People try to stop viruses with a thing called "firewall" to protect their CD-ROM and personalised data stored on their computer. Firewall is effective but sometime the viruses leak through which is why a thing called "real-time" can stop this incident and quarantine the virus to its original location.

    • Word count: 2599
  18. ICT Legislation

    account, but if someone managed to access that data and changed anything under my personal account they would be breaking the law of data protection. This law can also be broken if someone sent on my personal data to another source without consulting me or asking for my permission for it to be sent on it would be breaking the law of data protection. Data protection normally only stands for personal details but if it was statistical data which was collected there is no problem in having that passed on since surveys never normally involve a person writing their names so it is ok.

    • Word count: 1923
  19. The purpose of legislation is to control and regulate the use of ICT

    Unauthorised access to computer material. 2. Unauthorised access with intent to commit or facilitate commission of further offences. 3. Unauthorised modification of computer material. -Copyright, designs and patents act in 1989 The act gives the creators of literary, dramatic, musical and artistic works the right to control the ways in which their material may be used. The rights cover: broadcast and public performance, copying, adapting, issuing, renting and lending copies to the public. In many cases, the creator of the piece will also have the right to be identified as the author and to object to distortions and mutilations of his work.

    • Word count: 1484
  20. Legislation and ICT

    You cannot give it away or sell it unless you said you would on the form 4) The information held must be adequate (enough), relevant and not excessive (too much) when compared with the purpose stated in the register. So you must have enough detail but not too much for the job that you are doing with the data. 5) It must be accurate and be kept up to date. There is a duty to keep it up to date, for example to change an address when you move. 6) It must not be kept longer than is necessary for the registered purpose.

    • Word count: 1907
  21. Assess the likelihood of Sid and Kenny avoiding personal liability for the debts of the company

    This act makes it a legal requirement that health and social care agencies keep clients details confidential. The data act allows clients to these rights: * To see what information is held about them and correct the information if necessary. * The right to refuse or give information. * The data stored must be correct and up to date. * The data must only be kept for as long as it is needed. * The information given should not be available to unauthorised people For my work placement I went to St Marks Rainbows.

    • Word count: 793
  22. Data Protection Act

    Regulation 2003 came into force 11th December 2003. The Information Commissioner's office mission how does he intend the directive to operate to work in UK. The completion of the report needs to be produced and handed in by Friday 30th April 2004. Executive Summary In this report It will cover all aspects of freedom if information and the need of security covering the Data Protection Act 1998 and the eight essential principles. By promoting good information handling practice and enforcing data protection and freedom legislation and by seeking the influences national and international thinking on privacy of information on medical records.

    • Word count: 7021
  23. The Data Protection Act, 1998

    If any person, organisation, company or business wishes to hold personal information about people, they must register with the Office of the Data Protection Commissioner. The Data Protection Act contains eight basic principles. A summary of these: 1. be processed fairly and lawfuuly 2. be obtained for specified and lawful purposes 3. be adequate, relevant and not excessive for the purpose 4. be accurate and up-to-date 5. not be kept longer than necessary 6. be processed within the rights of data subjects 7.

    • Word count: 527
  24. As described

    This covers for example, the appearance and finish of the goods, their safety and their durability. Goods must be free from defects - even minor ones unless the product is sold as perfect, it must have no faults. It the customer is not able to inspect the goods on the premises, they are entitled to a refund, if the item is flawed or faulty. The customer is not obliged to accept a credit note or replacement goods. For example if the customer brought a value packet of crisps only to find that half of them are open, the customer can then get a refund or their money back.

    • Word count: 1209
  25. ICT and Legislation

    time * Kept for only relevant and lawful purposes * Processed fairly and in accordance with the rights of the subject data * protected against loss, damage and unlawful processing Health and Safety at work act (1974) This legislation makes sure that all people at work have a safe working environment and that employer's make there workers aware of the safety issues including: * fire exits must be kept clear * fire doors must be kept shut * any obstacles must be positions so there is no danger of tripping over * plug sockets can not be overload and paper

    • Word count: 871

Marked by a teacher

This document has been marked by one of our great teachers. You can read the full teachers notes when you download the document.

Peer reviewed

This document has been reviewed by one of our specialist student essay reviewing squad. Read the full review on the document page.

Peer reviewed

This document has been reviewed by one of our specialist student document reviewing squad. Read the full review under the document preview on this page.