Legislation unit 3 part E

Authors Avatar

Legislation that protects individuals and

The group from the misuse of I.C.T

There are many laws that have been imposed so that people don’t misuse ICT. In this report I will explain some of these laws. I will try to show why these laws were introduced and what they do now to keep people from misusing these new technologies.

Here are a few of the laws and acts that have been passed that have concern ICT:

Data Protection Act 1998

The main purpose of this act is to prevent the misuse of personal data. All organizations that hold the data have to register its use, before using it. This includes organisations such as dentist, doctors, and hospitals etc. these organisations would hold records and data of their patient’s details.  They would also have to state what the information they have is and what they would use the information for. If the information is wrong it is because of the lack of care when it was compiled, and in some way has damaged the person’s reputation, the person that this has happened could sue the company for the misuse of their personal data. This act is there to protect the privacy of ordinary people. Another part of this act stops information from being passed onto other companies without the person’s knowledge. This act links up with Thomas Davies the GP that I researched about in The Impact of I.C.T in adult in employment. This is because he has a lot of data stored on his laptop, the data stored has information on his patients, and he is not to let anyone have access to this data, apart from himself, so therefore he has set passwords on the data so that the data is kept safe and secure. This is good for Thomas Davies because he knows that the date is safe and wont need to worry of computer hackers. The only person that knows his password is himself, he shouldn’t tell anyone his password because they might try to gain access without permission and that is against the law.

Join now!

Computer Misuse Act 1990

The computer misuse act was introduced as a result of concerns about people misusing the data and programs held on computers. This act aims to protect users against vandalism and information theft. Computer hacking and spreading viruses were made crimes under this act (Computer Misuse Act). This act was introduced in the 1990s so that the computers could be secure and safe against unauthorised access.

The Act Created 3 New Offences:

  • Unauthorised access to computer material.
  • Unauthorised access to the Internet to commit commission or further offences.
  • Unauthorised modification of ...

This is a preview of the whole essay