• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Report 3E: the Legislation that protects individuals and groups from the misuse of ICT

Extracts from this document...

Introduction

Report 3E: the Legislation that protects individuals and groups from the misuse of ICT Introduction In this report, I am aiming to explain the different legislations that protect individuals and groups from the misuse of ICT. There is much legislation including 'The Data Protection Act', 'Copyright, Design and Patents Act' and 'Health and Safety Act' that carry out this protection. These legislations will be linked to the people or groups mentioned in Reports 3A-D. The Data Protection Act (1998): This act was introduced in 1998, and aims to protect the privacy of personal information such as a bank statement, passport etc. However, it only covers personal information about living individuals, and not businesses. It covers data stored on a computer or in a paper-based filing system and it allows people to check what data is being held about them. It is run by the International Commissioner's Office. The 8 principles of the Data Protection Act include that data must be: 1) Fairly and lawfully processed (used) 2) Used for limited purposes 3) Adequate and relevant. Only what is needed may be used 4) Accurate 5) Not kept for longer than is necessary 6) Accessible to the individual and able to be corrected or removed where necessary 7) Secure 8) ...read more.

Middle

Cyber cafe owners must also make sure that their cafe network is safe to use and may also not be breaking any laws put out by the act. For this, he must use a network manager's valuable time to help him do this. The act also assists the people that use the cafes, as all their personal information is not used for any wrong reasons and they can safely go about doing what they do on the computers without the thought of someone finding out their details or something similar to that. If the people do find out that the owner is not abiding by the instructions of the act, they can ask the Data Commissioner to get involved. The Copyright, Designs and Patents Act (1988/89): The Copyright, Design and Patents Act sets out to protect the work of others from being stolen. It covers software as a whole and also the code that makes up the software. The only way to use these types of software is by purchasing a license that allows you to the right to use it. There are 3 types of licenses: - Single User Licenses are the most common and they allow you to install one copy of the software only on one computer, although some do allow you to also use it on a laptop as well. ...read more.

Conclusion

While the WorkPace Monitor measures the time he works on the computer, aiding the employer to send Carl off for his regular breaks. Carl's employer also has to be extra careful, as Carl is deaf and therefore will not be able to hear warnings about any health or safety endangering moments. The employer has to provide a very strong hearing aid to make sure Carl can hear the most important warnings. His employer also has to make sure that the path to his desk is left clear at all times, so that Carl will know where he is going and may not fall down risking his health due to his partial blindness. HASAWA helps people like Carl, as he has quite a few disabilities and the act helps to keep people like him safer and the risk of casualties can be put lower. The employers need to make sure that they are not breaking the law by constantly allowing Carl to take regular breaks, as he would be using a computer for most of the day. Carl's employer has to ensure that he is provided with a work surface suited to his height, the correct lighting and a chair that can be adjusted. If his employer fails to apply these regulations, then Carl and other employees are entitled to sue or prosecute them regarding the problem, especially if it causes them health and safety issues. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE ICT Systems and Application section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE ICT Systems and Application essays

  1. Different types of technology How I use ICT at home and at school

    educational, cultural, comical etc. Nearly every household has at least one of these and a television has very much been, since its creation and production to the mass public, something which every normal person either owns or watches regularly. It keeps you up to date with news, current events, celebrity gossip, new movies and much more.

  2. The use of ict has changed the way in which people work. Explain the ...

    Computers help nurses and doctors monitor vital body function of patients e,g heart rate. With equipment with built in microprocessors, Microprocessors are what make the computer work as each computer is full of silicone chips (microprocessors ). Babies are monitored in incubators and readings are taken of heart beat etc

  1. Use of IT in schools

    Once they reach the secondary school, they are expected to be able to type essays, have a good working knowledge of word processors, and research information on the Internet. These skills would be needed at university as well. There are also specific uses for ICT in certain subjects.

  2. Health and Safety Issues in ICT

    This includes its guidance on the layout of workstations (furniture and equipment) and on work processes. As noted above, the HSC advises taking breaks from keyboard work of between five and ten minutes every 50-60 minutes, while the RSI Association recommends a break of five minutes in each half hour.

  1. ICT Report 2b: ICT in Organisations

    * The Operations department receives the order via computer from Sales and prepares to start making the product. * The system can order the raw materials for the product from suppliers. * The customer cancels the order an hour later.

  2. How is ICT used in schools and what are the effects?

    available for older pupils or teachers use vEkYJaE Visit coursework ba in ba fo ba for ba more project ba Do ba not ba redistribute vEkYJaE Touch Screen cpfc121, please do not redistribute this cours. We work very hard to create this website, and we trust our visitors to respect it for the good of other students.

  1. The impact of ICT on a person with special/particular needs

    Sarah is still a sufferer of Cerebral Palsy and while technology may try its best, her illness still causes her many difficulties. These difficulties all vary from a lot of different things. While the powerchair may be motor powered and easy for Sarah to use, she can still experience certain difficulties.

  2. Describe a wide range of technologies used by an adult in employment, with evaluation ...

    and all the work applications as if she is in the office. Advantages of VPN and does it meet her needs? The advantage of VPN is that it allows her to get all the information from her work computer to her home computer which allows her to do the same work at home.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work