• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Report 3E: the Legislation that protects individuals and groups from the misuse of ICT

Extracts from this document...

Introduction

Report 3E: the Legislation that protects individuals and groups from the misuse of ICT Introduction In this report, I am aiming to explain the different legislations that protect individuals and groups from the misuse of ICT. There is much legislation including 'The Data Protection Act', 'Copyright, Design and Patents Act' and 'Health and Safety Act' that carry out this protection. These legislations will be linked to the people or groups mentioned in Reports 3A-D. The Data Protection Act (1998): This act was introduced in 1998, and aims to protect the privacy of personal information such as a bank statement, passport etc. However, it only covers personal information about living individuals, and not businesses. It covers data stored on a computer or in a paper-based filing system and it allows people to check what data is being held about them. It is run by the International Commissioner's Office. The 8 principles of the Data Protection Act include that data must be: 1) Fairly and lawfully processed (used) 2) Used for limited purposes 3) Adequate and relevant. Only what is needed may be used 4) Accurate 5) Not kept for longer than is necessary 6) Accessible to the individual and able to be corrected or removed where necessary 7) Secure 8) ...read more.

Middle

Cyber cafe owners must also make sure that their cafe network is safe to use and may also not be breaking any laws put out by the act. For this, he must use a network manager's valuable time to help him do this. The act also assists the people that use the cafes, as all their personal information is not used for any wrong reasons and they can safely go about doing what they do on the computers without the thought of someone finding out their details or something similar to that. If the people do find out that the owner is not abiding by the instructions of the act, they can ask the Data Commissioner to get involved. The Copyright, Designs and Patents Act (1988/89): The Copyright, Design and Patents Act sets out to protect the work of others from being stolen. It covers software as a whole and also the code that makes up the software. The only way to use these types of software is by purchasing a license that allows you to the right to use it. There are 3 types of licenses: - Single User Licenses are the most common and they allow you to install one copy of the software only on one computer, although some do allow you to also use it on a laptop as well. ...read more.

Conclusion

While the WorkPace Monitor measures the time he works on the computer, aiding the employer to send Carl off for his regular breaks. Carl's employer also has to be extra careful, as Carl is deaf and therefore will not be able to hear warnings about any health or safety endangering moments. The employer has to provide a very strong hearing aid to make sure Carl can hear the most important warnings. His employer also has to make sure that the path to his desk is left clear at all times, so that Carl will know where he is going and may not fall down risking his health due to his partial blindness. HASAWA helps people like Carl, as he has quite a few disabilities and the act helps to keep people like him safer and the risk of casualties can be put lower. The employers need to make sure that they are not breaking the law by constantly allowing Carl to take regular breaks, as he would be using a computer for most of the day. Carl's employer has to ensure that he is provided with a work surface suited to his height, the correct lighting and a chair that can be adjusted. If his employer fails to apply these regulations, then Carl and other employees are entitled to sue or prosecute them regarding the problem, especially if it causes them health and safety issues. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE ICT Systems and Application section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE ICT Systems and Application essays

  1. The use of ict has changed the way in which people work. Explain the ...

    For everyday police Work it is vital for police officers to be able to access information on known Criminals. The information held includes , A personal description ,Last known address,Details of the offence committed , Methods used to carry out the offence ,Details of the arrest ,Previous convictions and prison sentences ,Known aliases ,Known accomplices.

  2. Health and Safety Issues in ICT

    The HSC also emphasizes the importance of being relaxed, since RSI can be caused by tension and working under stress which tenses the muscles and restricts circulation. RSI due to Mouse Use Using a mouse may give rise to greater risks than using a keyboard because use of a mouse

  1. How is ICT used in schools and what are the effects?

    People should be sitting at least one metre away from laser printers because of ozone emitted from the printers and be in a well-ventilated area.coce cer sececew orce cek ince foce ce: Also, in computer rooms there should be no trailing wires, food or drink near the computers, electrical sockets

  2. Impact of ICT on the community

    It is quicker and reliable as the customer doesn't need to show ID when withdrawing money from your own account. ATM machines are safe as no one can get the data from the ATM. How ATM works? ATM is simply a data terminal.

  1. Use of IT in schools

    by schools, so that it can be readily accessed easily, and even over the Internet. Becta, the government's agency responsible for the use of ICT in education says 'A well-designed and well-maintained MIS will allow information to be entered once and used many times.

  2. a level ict project

    You should now be on the searches and queries12 switchboard, select the () link, this should take you to the following location: 3. Above shows the customer search query, each criteria box13 in the row is labelled with a number, each one will be explained and related to how it can be used to search for customer records: 1.

  1. The impact of ICT on a person with special/particular needs

    to maintain and hard to get up the stairs, thus needing the stair lift contributing more to expenses * Requires electricity rather than the typical manual force-uses up money and resources which Sarah is very conscious of (she tries to be as green as possible)

  2. task2-report-template 3

    2.1.4 User Requirements [2-4] * Changing data The users need to be able to change data easily and keep them in one place to find it easily when needed. The users need to be able to change all the information about laptops and customer details.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work