• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  • Level: GCSE
  • Subject: ICT
  • Word count: 3072

Legislation protecting people & groups.

Extracts from this document...


LEGISLATION PROTECTING PEOPLE & GROUPS BY Mubarak Umerji Introduction With the advancement of computers and communications in the last thirty years the government has introduced various legislations to protect individuals as well as companies. This coursework details some of these legislations and gives examples of how each legislation protects the computer users and what effects it woul????????d have if the legislation was not introduced. The following lists of legislations are discussed in this coursework: - 1. Data Protection Act (1998) 2. Computer Misuse Act (1990) 3. Copyright Designs and Patents Act (1988) 4. Health and Safety at Work Act (1974) 5. Health and Safety Regulations (1992) 6. Regulation of Investigatory Powers Act (2000) 7. Internet Code of Practice (ICOP) Data Protection Act (1998) As more and more information came to be stored on computers, much of it personal data about individuals, there became the need for some sort of control over the way that it was collected and the way it could be used. The Data Protection Act 1998 replaces the earlier Data Protection Act 1984. The purpose of this Act is to deal with some of the things that weren't around when the older Act was introduced. These new things include the Internet, loyalty cards and use of huge customer databases for marketing purposes. The new Act also covers manually held data not covered by the earlier Act. The Act places obligation on those people who record and process personal data; these people are called the data controllers in the Act. The Data Controllers must be open about their use of the data by telling the Data Protection Commissioner (person who enforces the Act) that they are collecting personal data and how they intend to use it. The Data Protection Act covers personal data, which is stored on a computer. It protects the individual's right to privacy and gives individuals the right to see what data is stored about them and to have it corrected if it is inaccurate. ...read more.


This would lead to companies spending less money on research which would lead to slowdown in world progress. Copyright Designs and Patents Act (1989) The Copyright Designs and Patents Act of 1989 makes it a criminal offence to copy or steal software. Under the act it is an offence to copy or distribute software or any manuals which come with it, without permission or a licence from the copyright owner, who is normally the software developer. It is also an offence to run purchased software covered by copyright on two or more machines at the same time, unless the licence specifically allows it. The Act makes it illegal for an organisation to encourage, allow, compel or pressure its employees to make or distribute copies of illegal software for use by the organisation. It is illegal to copy software, to send copies of software over the Internet, or to use pirated software. It is also illegal to download a copyright sound track or DVD from the Internet. You should not use someone else's work without their permission, or without acknowledging the source of the information. Protection Offered This act is protecting the software developers from illegal copying and distributions of software that may have taken them vast amount of money and several years to develop. In the same way it protects other people of enterprise such as musicians, moviemakers and writers from having their work illegally copied and distributed without payment. If individuals do not see a reward for their hard work (software, music or movie) they will stop developing new and innovative ideas which will slow the advancement of the world. Health and Safety at Work Act (1974) This law imposes a responsibility on the employer to ensure safety at work for all their employees. * Employers have to take reasonable steps to ensure the health, safety and welfare of their employees at work. ...read more.


* Information: Images, audio and video clips should be compressed to keep download times bandwidth requirements to a minimum. Private data (such as e-mail, network and postal addresses, telephone numbers, payment card details etc.) should not be disclosed to third parties without permission of the data subject. Information should not incite or promote illegal acts. * Applets, browser scripts and CGI usage: No programme should consume system resources or network bandwidth unnecessarily. No programme should destroy or damage any data held on the viewer's computer or network. No programme should attempt to access information about the viewers or the viewer's computer system covertly. * Mail and news: When sending an e-mail to more than one person, e-mail is certainly cheaper than using conventional mail; however both parties pay for the communications systems used during upload and download. Sending advertising mail through the post merely costs the sender. Furthermore any kind of unsolicited communication is often considered by the recipient to be unwelcome. Therefore, ICR members agree not to send, encourage, or contribute to chain letters, hoaxers or SPAM. Protection Offered This Internet Code of Practice protects children from looking at indecent material. The ISP's can use special software that can filter out indecent material. It also protects software developers because the ICOP states that copyright laws must be observed and trademarks must be clearly displayed and identified. The ICOP also provides a fair distribution of computer processing power to all users. Some users use up all the bandwidth of the Internet to download images, audio and video clip leaving the other users to suffer slow speeds. The ICOP states that data should be compressed to keep download times and bandwidth requirements to a minimum. Some ISP's have started to limit the amount of data that any individual can download on a daily basis. The ICOP also protects the individual from receiving junk mail which uses up his computer resources such as disk space and it is also time consuming to open/read/delete unwanted e-mails. Applied ICT Coursework UNIT 3 Legislation Protecting People/Group Name: Mubarak Umerji Candidate Number: 9771 Centre Number: 13216 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Assets table - recording the copyright information on the logos and pictures I used.

    was chosen because it appealed to me through its simple showing of the strains that fair trade farmers undergo. Still movie Image with a caption Word doc P N/A A picture of a man growing fruit and a comment next to it I have Cropped the image and then enlarged


    * Cannot use the software on a network unless the licence allows it. * Cannot rent out the software without the permission of the copyright holder. Ways that the law can be broken is in three ways: 1) Using software without the proper license.

  1. The purpose of legislation is to control and regulate the use of ICT

    Act 1995 are guided by the principle of prevention of unfair discrimination on the grounds of sex, including discrimination against persons who have undergone gender reassignment, race or disability.

  2. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    have destroyed my computer using viruses which he legally is not allowed to do. If someone tries to do anything from these acts and doesn't follow them he could get in serious trouble as mentioned above. The Copyright, Design and Patents Act (1989)

  1. The Data Protection Act 1998 - questions and answers

    These include an exception where providing the information to the individual would involve 'a disproportionate effort'.

  2. Car Safety

    For example, one car the Mazda has all these safety precautions in place in case an accident occurs: * Intrusion minimizing brake pedal to help reduce foot and leg injuries in a frontal collision * Front seats designed to minimize whiplash and the chance of neck injury in a rear-end

  1. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    Leak of information Another example is a leak of private information. Leaks can happen when security procedures aren't taken properly and the web server becomes vulnerable or a hacker gives out the information by finding weaknesses in security. Organisations have to make sure, under the Data Protection Act, to maintain strict security procedures.

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    * Data should be produced lawfully. * Processed in line with your rights. * Processed for limited purposes. * Adequate, relevant and not excessive. IMPACT OF LAW UPON ME The data protection act creates an impact upon me because I have been involved and in a position where this specific law had been very effective.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work