• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Report 3E: the Legislation that protects individuals and groups from the misuse of ICT

Extracts from this document...

Introduction

Report 3E: the Legislation that protects individuals and groups from the misuse of ICT Introduction In this report, I am aiming to explain the different legislations that protect individuals and groups from the misuse of ICT. There is much legislation including 'The Data Protection Act', 'Copyright, Design and Patents Act' and 'Health and Safety Act' that carry out this protection. These legislations will be linked to the people or groups mentioned in Reports 3A-D. The Data Protection Act (1998): This act was introduced in 1998, and aims to protect the privacy of personal information such as a bank statement, passport etc. However, it only covers personal information about living individuals, and not businesses. It covers data stored on a computer or in a paper-based filing system and it allows people to check what data is being held about them. It is run by the International Commissioner's Office. The 8 principles of the Data Protection Act include that data must be: 1) Fairly and lawfully processed (used) 2) Used for limited purposes 3) Adequate and relevant. Only what is needed may be used 4) Accurate 5) Not kept for longer than is necessary 6) Accessible to the individual and able to be corrected or removed where necessary 7) Secure 8) ...read more.

Middle

Cyber cafe owners must also make sure that their cafe network is safe to use and may also not be breaking any laws put out by the act. For this, he must use a network manager's valuable time to help him do this. The act also assists the people that use the cafes, as all their personal information is not used for any wrong reasons and they can safely go about doing what they do on the computers without the thought of someone finding out their details or something similar to that. If the people do find out that the owner is not abiding by the instructions of the act, they can ask the Data Commissioner to get involved. The Copyright, Designs and Patents Act (1988/89): The Copyright, Design and Patents Act sets out to protect the work of others from being stolen. It covers software as a whole and also the code that makes up the software. The only way to use these types of software is by purchasing a license that allows you to the right to use it. There are 3 types of licenses: - Single User Licenses are the most common and they allow you to install one copy of the software only on one computer, although some do allow you to also use it on a laptop as well. ...read more.

Conclusion

While the WorkPace Monitor measures the time he works on the computer, aiding the employer to send Carl off for his regular breaks. Carl's employer also has to be extra careful, as Carl is deaf and therefore will not be able to hear warnings about any health or safety endangering moments. The employer has to provide a very strong hearing aid to make sure Carl can hear the most important warnings. His employer also has to make sure that the path to his desk is left clear at all times, so that Carl will know where he is going and may not fall down risking his health due to his partial blindness. HASAWA helps people like Carl, as he has quite a few disabilities and the act helps to keep people like him safer and the risk of casualties can be put lower. The employers need to make sure that they are not breaking the law by constantly allowing Carl to take regular breaks, as he would be using a computer for most of the day. Carl's employer has to ensure that he is provided with a work surface suited to his height, the correct lighting and a chair that can be adjusted. If his employer fails to apply these regulations, then Carl and other employees are entitled to sue or prosecute them regarding the problem, especially if it causes them health and safety issues. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE ICT Systems and Application section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE ICT Systems and Application essays

  1. Different types of technology How I use ICT at home and at school

    The DS is an extremely fun leisure tool and is highly recommended. The only downfall would be the graphics and the power of the DS including the size of its games which are much smaller in data to the ones in a PSP.

  2. Health and Safety Issues in ICT

    The HSC also emphasizes the importance of being relaxed, since RSI can be caused by tension and working under stress which tenses the muscles and restricts circulation. RSI due to Mouse Use Using a mouse may give rise to greater risks than using a keyboard because use of a mouse

  1. Use of IT in schools

    The reasons why this is so are as follows: * Better research facilities means that the work can be of a higher standard. * Students have the ability to find as many facts and figures as they need much more easily.

  2. ICT Report 2b: ICT in Organisations

    Some might find it easier and faster to type, others not so likely. Another problem is, since Boots Plc has branches worldwide, different countries require different keyboard layouts. For instance, in France, due to the frequent use of the letter "a", the common keyboard layout is the AZERTY layout.

  1. Impact of ICT on the community

    I will look at technologies that affect the whole of my community not a single person. I will also need to include how people benefit from using the service. And finally I will then evaluate how the technology will meet the need of my community.

  2. The impact of ICT on a person with special/particular needs

    Sarah is ultimately unable to move at all without the use of a chair such as this. While she has use of her legs, they are limited to the utmost capability of her abilities. She cannot do more than wiggle her legs around, nevertheless actually managing to stand up and walk.

  1. Describe a wide range of technologies used by an adult in employment, with evaluation ...

    and all the work applications as if she is in the office. Advantages of VPN and does it meet her needs? The advantage of VPN is that it allows her to get all the information from her work computer to her home computer which allows her to do the same work at home.

  2. AO4 ICT c/wk 2008-9

    This also means that you can have a 'meeting' with people from many different offices /countries without any of them or even yourself having to travel. * Another good thing is you can see people as well as hear them.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work