• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Legislation unit 3 part E

Extracts from this document...


Legislation that protects individuals and The group from the misuse of I.C.T There are many laws that have been imposed so that people don't misuse ICT. In this report I will explain some of these laws. I will try to show why these laws were introduced and what they do now to keep people from misusing these new technologies. Here are a few of the laws and acts that have been passed that have concern ICT: Data Protection Act 1998 The main purpose of this act is to prevent the misuse of personal data. All organizations that hold the data have to register its use, before using it. This includes organisations such as dentist, doctors, and hospitals etc. these organisations would hold records and data of their patient's details. They would also have to state what the information they have is and what they would use the information for. If the information is wrong it is because of the lack of care when it was compiled, and in some way has damaged the person's reputation, the person that this has happened could sue the company for the misuse of their personal data. ...read more.


On the other hand, data could be changed, like the balance of a bank account changed, details of driving offences deleted or an examination mark altered. Along with this if a virus is deliberately sent to a computer, it is also an offence under this category. The Copyright, Designs and Patients Act The copyright laws have been long protected the rights of authors, composers, artists etc. These also apply to computer software's you buy. When you have brought the software you have not brought the program, you have only bought the right to use the software under the terms and conditions of the license. If you attempt to copy or using the software without permission this could lead to criminal penalties, these penalties include unlimited fines and 2 years in prison, or both. Also this legislation links up with Stephan hawking. As many people copy his research and work without his permission, this is wrong. Without the users permission you cannot copy their work. This is called "copyright infringement". Preventing Copyrights Computer software companies now have realized about the software pirates, and now have inputted a new type of software in their old ones to prevent software pirates being sold. * The license agreement is now clearly printed on every package. ...read more.


Most types of legislations come with major consequences if broken or not anticipated. Many, which can be costly if data is damaged or destroyed, such disasters, may make your business insolvent, or affect you in the long term. The types of legislations that are introduced are aimed for the purpose to provide you with security of data. Whereby it helps data to be safe and secure so that it's out of reach of potential hackers. The legislation that have been made prevent people misusing I.C.T and prevent them from doing anything illegal, the data protection act keeps data safe and secure, the copyright act prevents people from making illegal pirate copies of different types of software's etc. the computer misuse act prevent people from committing crimes such as these: * Unauthorised access to computer material. * Unauthorised access to the Internet to commit commission or further offences. * Unauthorised modification of computer material. This act protects the public as the act prevents computer hackers fro committing the crimes listed above. This is how the acts have preventing people misusing I.C.T. My View of Legislation I think this acts are good, and it is good to know your data and details are safe. So therefore I like the legislation law. ?? ?? ?? ?? 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. The impact of ICT on the environment

    so that can be used to purchase resources, and if the company that they are working for want their employees to have the most recent hardware and software and also an internet connection they should provide them with extra money to help with the expenses.

  2. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    act he is not lawfully allowed to do this and if he does not follow the law he could be caught. The Data Misuse act also affects her as if I have my coursework on my computer and don't want to share it and someone and someone hacks her computer

  1. The Data Protection Act 1998 - questions and answers

    Let's say I'm a small shopkeeper with a list of its customers' names addresses and accounts on a computer - will I have to Register and / or to keep the computer in a locked room? Yes, the shopkeeper will have to register if any of the customers are individuals.

  2. Car Safety

    Air bags are of limited benefit in side impact (unless they are side air bags), rear impact or roll-over crashes, or in crashes where there is more than one collision. A safety belt can protect an occupant in all of these crashes.

  1. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    However, due to a loop in security, customers were temporarily able to access other customer's accounts, thus viewing all their personal information. This could have been extremely fatal if Cahoot didn't fix the problem quick enough. Cahoot could have been in big trouble and that's why the Data Protection Act is important.

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    the organisation that has given out my personal information and are using the information for different purposes without my very own intelligence can be sued for carrying out this particular act. In order to abide by the law, I must agree on the condition stated such as my personal information


    An example of someone breaking this act was Steve Gold and Robert Schifrin who were the first hackers to become well known in the UK. They were responsible for hacking Pestle in 1984 and gained notoriety for obtaining system manager status and hacking Prince Phillip's mailbox.

  2. Data Protection Act

    This act provides guidance in interpreting this principle as follows: The Principle is not to be taken as being contravened because of any inaccuracy in personal data which accurately record information obtained by the data controller from the data subject or third party in case where :- a)

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work