• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  • Level: GCSE
  • Subject: ICT
  • Word count: 3072

Legislation protecting people & groups.

Extracts from this document...


LEGISLATION PROTECTING PEOPLE & GROUPS BY Mubarak Umerji Introduction With the advancement of computers and communications in the last thirty years the government has introduced various legislations to protect individuals as well as companies. This coursework details some of these legislations and gives examples of how each legislation protects the computer users and what effects it woul????????d have if the legislation was not introduced. The following lists of legislations are discussed in this coursework: - 1. Data Protection Act (1998) 2. Computer Misuse Act (1990) 3. Copyright Designs and Patents Act (1988) 4. Health and Safety at Work Act (1974) 5. Health and Safety Regulations (1992) 6. Regulation of Investigatory Powers Act (2000) 7. Internet Code of Practice (ICOP) Data Protection Act (1998) As more and more information came to be stored on computers, much of it personal data about individuals, there became the need for some sort of control over the way that it was collected and the way it could be used. The Data Protection Act 1998 replaces the earlier Data Protection Act 1984. The purpose of this Act is to deal with some of the things that weren't around when the older Act was introduced. These new things include the Internet, loyalty cards and use of huge customer databases for marketing purposes. The new Act also covers manually held data not covered by the earlier Act. The Act places obligation on those people who record and process personal data; these people are called the data controllers in the Act. The Data Controllers must be open about their use of the data by telling the Data Protection Commissioner (person who enforces the Act) that they are collecting personal data and how they intend to use it. The Data Protection Act covers personal data, which is stored on a computer. It protects the individual's right to privacy and gives individuals the right to see what data is stored about them and to have it corrected if it is inaccurate. ...read more.


This would lead to companies spending less money on research which would lead to slowdown in world progress. Copyright Designs and Patents Act (1989) The Copyright Designs and Patents Act of 1989 makes it a criminal offence to copy or steal software. Under the act it is an offence to copy or distribute software or any manuals which come with it, without permission or a licence from the copyright owner, who is normally the software developer. It is also an offence to run purchased software covered by copyright on two or more machines at the same time, unless the licence specifically allows it. The Act makes it illegal for an organisation to encourage, allow, compel or pressure its employees to make or distribute copies of illegal software for use by the organisation. It is illegal to copy software, to send copies of software over the Internet, or to use pirated software. It is also illegal to download a copyright sound track or DVD from the Internet. You should not use someone else's work without their permission, or without acknowledging the source of the information. Protection Offered This act is protecting the software developers from illegal copying and distributions of software that may have taken them vast amount of money and several years to develop. In the same way it protects other people of enterprise such as musicians, moviemakers and writers from having their work illegally copied and distributed without payment. If individuals do not see a reward for their hard work (software, music or movie) they will stop developing new and innovative ideas which will slow the advancement of the world. Health and Safety at Work Act (1974) This law imposes a responsibility on the employer to ensure safety at work for all their employees. * Employers have to take reasonable steps to ensure the health, safety and welfare of their employees at work. ...read more.


* Information: Images, audio and video clips should be compressed to keep download times bandwidth requirements to a minimum. Private data (such as e-mail, network and postal addresses, telephone numbers, payment card details etc.) should not be disclosed to third parties without permission of the data subject. Information should not incite or promote illegal acts. * Applets, browser scripts and CGI usage: No programme should consume system resources or network bandwidth unnecessarily. No programme should destroy or damage any data held on the viewer's computer or network. No programme should attempt to access information about the viewers or the viewer's computer system covertly. * Mail and news: When sending an e-mail to more than one person, e-mail is certainly cheaper than using conventional mail; however both parties pay for the communications systems used during upload and download. Sending advertising mail through the post merely costs the sender. Furthermore any kind of unsolicited communication is often considered by the recipient to be unwelcome. Therefore, ICR members agree not to send, encourage, or contribute to chain letters, hoaxers or SPAM. Protection Offered This Internet Code of Practice protects children from looking at indecent material. The ISP's can use special software that can filter out indecent material. It also protects software developers because the ICOP states that copyright laws must be observed and trademarks must be clearly displayed and identified. The ICOP also provides a fair distribution of computer processing power to all users. Some users use up all the bandwidth of the Internet to download images, audio and video clip leaving the other users to suffer slow speeds. The ICOP states that data should be compressed to keep download times and bandwidth requirements to a minimum. Some ISP's have started to limit the amount of data that any individual can download on a daily basis. The ICOP also protects the individual from receiving junk mail which uses up his computer resources such as disk space and it is also time consuming to open/read/delete unwanted e-mails. Applied ICT Coursework UNIT 3 Legislation Protecting People/Group Name: Mubarak Umerji Candidate Number: 9771 Centre Number: 13216 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Peer reviewed

    The Main Features and Difficulties Regarding the Regulation of E-Commerce

    4 star(s)

    However, there is no guarantee that all the countries would use these treaties as guidelines to their actions concerning such data. Common standards for the protection of data within the EU are set by the EU Data Privacy Directive which states that data may not be transmitted out of the EU.

  2. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    have destroyed my computer using viruses which he legally is not allowed to do. If someone tries to do anything from these acts and doesn't follow them he could get in serious trouble as mentioned above. The Copyright, Design and Patents Act (1989)

  1. Data Protection Act

    subject to the processing which in turn any may remove the basis for processing which was being relied upon by the data controller. 1.1.4 Paragraph 2 and 3 - information to be provided to data subjects Paragraph 2 and 3 provide that personal data are not to be treated as processed fairly.

  2. The Data Protection Act 1998 - questions and answers

    These include an exception where providing the information to the individual would involve 'a disproportionate effort'.

  1. The legislation that protects individuals and groups from the misuse of ICT

    To improve the overall impact and effect of the Data protection act there is a need for tighter protocols to be introduced and for easier ways of tracking that criminal offences have been committed. A way that the impact could be improved is through a means of logging data movement,

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    * Data should be produced lawfully. * Processed in line with your rights. * Processed for limited purposes. * Adequate, relevant and not excessive. IMPACT OF LAW UPON ME The data protection act creates an impact upon me because I have been involved and in a position where this specific law had been very effective.

  1. Privacy and Data Protection: IT Law

    Representors of business interests continue to complain that disparities prevent multinationals from developing pan-European policies on data protection. 24 As to the 2002 Directive, it is too early to give an over-all estimation of the implementation process, the deadline having elapsed only last month.

  2. Assets table - recording the copyright information on the logos and pictures I used.

    Information point, swap advert 6 podcasts Sound file P N/A I have put sound files of all of the words on my E-portfolio next to the paragraph that is being spoken about. The only changes I have made to my podcasts where the shortening and the missing out of some

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work