• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Legislation unit 3 part E

Extracts from this document...


Legislation that protects individuals and The group from the misuse of I.C.T There are many laws that have been imposed so that people don't misuse ICT. In this report I will explain some of these laws. I will try to show why these laws were introduced and what they do now to keep people from misusing these new technologies. Here are a few of the laws and acts that have been passed that have concern ICT: Data Protection Act 1998 The main purpose of this act is to prevent the misuse of personal data. All organizations that hold the data have to register its use, before using it. This includes organisations such as dentist, doctors, and hospitals etc. these organisations would hold records and data of their patient's details. They would also have to state what the information they have is and what they would use the information for. If the information is wrong it is because of the lack of care when it was compiled, and in some way has damaged the person's reputation, the person that this has happened could sue the company for the misuse of their personal data. ...read more.


On the other hand, data could be changed, like the balance of a bank account changed, details of driving offences deleted or an examination mark altered. Along with this if a virus is deliberately sent to a computer, it is also an offence under this category. The Copyright, Designs and Patients Act The copyright laws have been long protected the rights of authors, composers, artists etc. These also apply to computer software's you buy. When you have brought the software you have not brought the program, you have only bought the right to use the software under the terms and conditions of the license. If you attempt to copy or using the software without permission this could lead to criminal penalties, these penalties include unlimited fines and 2 years in prison, or both. Also this legislation links up with Stephan hawking. As many people copy his research and work without his permission, this is wrong. Without the users permission you cannot copy their work. This is called "copyright infringement". Preventing Copyrights Computer software companies now have realized about the software pirates, and now have inputted a new type of software in their old ones to prevent software pirates being sold. * The license agreement is now clearly printed on every package. ...read more.


Most types of legislations come with major consequences if broken or not anticipated. Many, which can be costly if data is damaged or destroyed, such disasters, may make your business insolvent, or affect you in the long term. The types of legislations that are introduced are aimed for the purpose to provide you with security of data. Whereby it helps data to be safe and secure so that it's out of reach of potential hackers. The legislation that have been made prevent people misusing I.C.T and prevent them from doing anything illegal, the data protection act keeps data safe and secure, the copyright act prevents people from making illegal pirate copies of different types of software's etc. the computer misuse act prevent people from committing crimes such as these: * Unauthorised access to computer material. * Unauthorised access to the Internet to commit commission or further offences. * Unauthorised modification of computer material. This act protects the public as the act prevents computer hackers fro committing the crimes listed above. This is how the acts have preventing people misusing I.C.T. My View of Legislation I think this acts are good, and it is good to know your data and details are safe. So therefore I like the legislation law. ?? ?? ?? ?? 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    act he is not lawfully allowed to do this and if he does not follow the law he could be caught. The Data Misuse act also affects her as if I have my coursework on my computer and don't want to share it and someone and someone hacks her computer

  2. Data Protection Act

    the terms of Code of Practice Government Information and second edition 1997 of Code of Practices on Access to Government Information will continue to apply. The Information Commissioner is responsible for regulating and enforcing both the Freedom of Information Act and the Data Protection Act.

  1. The Data Protection Act 1998 - questions and answers

    Let's say I'm a small shopkeeper with a list of its customers' names addresses and accounts on a computer - will I have to Register and / or to keep the computer in a locked room? Yes, the shopkeeper will have to register if any of the customers are individuals.

  2. The legislation that protects individuals and groups from the misuse of ICT

    Because the impact that the law is having upon Mr. Clements, there is not much that could be improved to increase the overall impact. Copyright, Designs and Patent Act 1988 The copyright and patents act makes it a criminal offence to copy or steal software, images and other such things.

  1. 3E-The legislation that protects individuals and groups from the misuse of ICT

    and not for any other illegal use and as an individual I should comply with them and shall know how and where my data is placed, thus protects my data from misuse. I must also provide organisations that require my details with the complete truth; false details should never be

  2. Privacy and Data Protection: IT Law

    The Bush Administration has eliminated the position of the "Chief Counselor for Privacy" as an advisor within the Office of Management and Budget.41 The Federal Trade Commission (FTC) has oversight and enforcement powers for some sectoral laws but has no general authority to enforce privacy rights.42 It can issue opinions if it receives complaints, but does not always do so.


    An example of someone breaking this act was Steve Gold and Robert Schifrin who were the first hackers to become well known in the UK. They were responsible for hacking Pestle in 1984 and gained notoriety for obtaining system manager status and hacking Prince Phillip's mailbox.

  2. The impact of ICT on the environment

    One function of computers is the ability to produce cross sectional views of the body. Doctors can now study the computer images before they advance with treatment. This helps amplify diagnosis accuracy (up to 85% more accurate) though doctors still have the final say on the final diagnosis.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work