• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Legislation unit 3 part E

Extracts from this document...

Introduction

Legislation that protects individuals and The group from the misuse of I.C.T There are many laws that have been imposed so that people don't misuse ICT. In this report I will explain some of these laws. I will try to show why these laws were introduced and what they do now to keep people from misusing these new technologies. Here are a few of the laws and acts that have been passed that have concern ICT: Data Protection Act 1998 The main purpose of this act is to prevent the misuse of personal data. All organizations that hold the data have to register its use, before using it. This includes organisations such as dentist, doctors, and hospitals etc. these organisations would hold records and data of their patient's details. They would also have to state what the information they have is and what they would use the information for. If the information is wrong it is because of the lack of care when it was compiled, and in some way has damaged the person's reputation, the person that this has happened could sue the company for the misuse of their personal data. ...read more.

Middle

On the other hand, data could be changed, like the balance of a bank account changed, details of driving offences deleted or an examination mark altered. Along with this if a virus is deliberately sent to a computer, it is also an offence under this category. The Copyright, Designs and Patients Act The copyright laws have been long protected the rights of authors, composers, artists etc. These also apply to computer software's you buy. When you have brought the software you have not brought the program, you have only bought the right to use the software under the terms and conditions of the license. If you attempt to copy or using the software without permission this could lead to criminal penalties, these penalties include unlimited fines and 2 years in prison, or both. Also this legislation links up with Stephan hawking. As many people copy his research and work without his permission, this is wrong. Without the users permission you cannot copy their work. This is called "copyright infringement". Preventing Copyrights Computer software companies now have realized about the software pirates, and now have inputted a new type of software in their old ones to prevent software pirates being sold. * The license agreement is now clearly printed on every package. ...read more.

Conclusion

Most types of legislations come with major consequences if broken or not anticipated. Many, which can be costly if data is damaged or destroyed, such disasters, may make your business insolvent, or affect you in the long term. The types of legislations that are introduced are aimed for the purpose to provide you with security of data. Whereby it helps data to be safe and secure so that it's out of reach of potential hackers. The legislation that have been made prevent people misusing I.C.T and prevent them from doing anything illegal, the data protection act keeps data safe and secure, the copyright act prevents people from making illegal pirate copies of different types of software's etc. the computer misuse act prevent people from committing crimes such as these: * Unauthorised access to computer material. * Unauthorised access to the Internet to commit commission or further offences. * Unauthorised modification of computer material. This act protects the public as the act prevents computer hackers fro committing the crimes listed above. This is how the acts have preventing people misusing I.C.T. My View of Legislation I think this acts are good, and it is good to know your data and details are safe. So therefore I like the legislation law. ?? ?? ?? ?? 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. ICT LAWS

    Using software without the proper license. So if you have a license to use a word processor on one stand alone computer but you then install it on all the machines in a network you are breaking the law. 2) Downloading text or images from then internet and using them without saying where you got them from or without receiving copyrights owners permission.

  2. The impact of ICT on the environment

    can become quite expensive, also the computer will need updating if they are doing it on a long term basis and it would be helpful to have a large memory and to be reasonably fast. Theses costs can be cut by shopping around, they will have access to the internet

  1. The Data Protection Act 1998 - questions and answers

    Let's say I'm a small shopkeeper with a list of its customers' names addresses and accounts on a computer - will I have to Register and / or to keep the computer in a locked room? Yes, the shopkeeper will have to register if any of the customers are individuals.

  2. Data Protection Act

    the terms of Code of Practice Government Information and second edition 1997 of Code of Practices on Access to Government Information will continue to apply. The Information Commissioner is responsible for regulating and enforcing both the Freedom of Information Act and the Data Protection Act.

  1. Car Safety

    Air bags are of limited benefit in side impact (unless they are side air bags), rear impact or roll-over crashes, or in crashes where there is more than one collision. A safety belt can protect an occupant in all of these crashes.

  2. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    CD's on your computer and sharing them on the internet * Viruses - programming and deliberately spreading viruses Evaluation: These are the main computer misuse acts which affect her as for example someone tries to hack her computer without her wanting to he could do anything but because of the

  1. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    A leak enabling people to access customer's strictly private data directly goes against the Data Protection Act. That's why it is important to keep up security in an organisation. An example of this would be the Cahoot breach. Cahoot is an internet bank that, as a bank, naturally holds personal data of all its customers.

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    The legislation protects me because it ensures my personal details that are stored on the school database are not being accessed and used by other people devoid of my very own authorization. If my details were used by others devoid of my very own knowledge, the law clearly states that

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work