• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Report 3E: the Legislation that protects individuals and groups from the misuse of ICT

Extracts from this document...

Introduction

Report 3E: the Legislation that protects individuals and groups from the misuse of ICT Introduction In this report, I am aiming to explain the different legislations that protect individuals and groups from the misuse of ICT. There is much legislation including 'The Data Protection Act', 'Copyright, Design and Patents Act' and 'Health and Safety Act' that carry out this protection. These legislations will be linked to the people or groups mentioned in Reports 3A-D. The Data Protection Act (1998): This act was introduced in 1998, and aims to protect the privacy of personal information such as a bank statement, passport etc. However, it only covers personal information about living individuals, and not businesses. It covers data stored on a computer or in a paper-based filing system and it allows people to check what data is being held about them. It is run by the International Commissioner's Office. The 8 principles of the Data Protection Act include that data must be: 1) Fairly and lawfully processed (used) 2) Used for limited purposes 3) Adequate and relevant. Only what is needed may be used 4) Accurate 5) Not kept for longer than is necessary 6) Accessible to the individual and able to be corrected or removed where necessary 7) Secure 8) ...read more.

Middle

Cyber cafe owners must also make sure that their cafe network is safe to use and may also not be breaking any laws put out by the act. For this, he must use a network manager's valuable time to help him do this. The act also assists the people that use the cafes, as all their personal information is not used for any wrong reasons and they can safely go about doing what they do on the computers without the thought of someone finding out their details or something similar to that. If the people do find out that the owner is not abiding by the instructions of the act, they can ask the Data Commissioner to get involved. The Copyright, Designs and Patents Act (1988/89): The Copyright, Design and Patents Act sets out to protect the work of others from being stolen. It covers software as a whole and also the code that makes up the software. The only way to use these types of software is by purchasing a license that allows you to the right to use it. There are 3 types of licenses: - Single User Licenses are the most common and they allow you to install one copy of the software only on one computer, although some do allow you to also use it on a laptop as well. ...read more.

Conclusion

While the WorkPace Monitor measures the time he works on the computer, aiding the employer to send Carl off for his regular breaks. Carl's employer also has to be extra careful, as Carl is deaf and therefore will not be able to hear warnings about any health or safety endangering moments. The employer has to provide a very strong hearing aid to make sure Carl can hear the most important warnings. His employer also has to make sure that the path to his desk is left clear at all times, so that Carl will know where he is going and may not fall down risking his health due to his partial blindness. HASAWA helps people like Carl, as he has quite a few disabilities and the act helps to keep people like him safer and the risk of casualties can be put lower. The employers need to make sure that they are not breaking the law by constantly allowing Carl to take regular breaks, as he would be using a computer for most of the day. Carl's employer has to ensure that he is provided with a work surface suited to his height, the correct lighting and a chair that can be adjusted. If his employer fails to apply these regulations, then Carl and other employees are entitled to sue or prosecute them regarding the problem, especially if it causes them health and safety issues. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE ICT Systems and Application section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE ICT Systems and Application essays

  1. Different types of technology How I use ICT at home and at school

    educational, cultural, comical etc. Nearly every household has at least one of these and a television has very much been, since its creation and production to the mass public, something which every normal person either owns or watches regularly. It keeps you up to date with news, current events, celebrity gossip, new movies and much more.

  2. Health and Safety Issues in ICT

    The HSC also emphasizes the importance of being relaxed, since RSI can be caused by tension and working under stress which tenses the muscles and restricts circulation. RSI due to Mouse Use Using a mouse may give rise to greater risks than using a keyboard because use of a mouse

  1. Use of IT in schools

    There are an awful lot of general uses for ICT in education, some of which are student orientated, where as others are to do with administration. The general uses of ICT for students are fairly obvious, but still important. However, theses uses do vary according to age group.

  2. The use of ict has changed the way in which people work. Explain the ...

    Pneumatics are not as powerful as the hydraulic robots but the movements are much faster. Electric motors-The most common type of electric motor used in controlling the movement of robots is a stepper motor. These motors rotate an exact amount for each pulse of electricity sent to the motor and provide very precise movements for the robot.

  1. ICT Report 2b: ICT in Organisations

    The wireless keyboard works by sending radio waves to a receiver connected to the workstation via PS/2 port or USB. The range of function is usually 2 metres. In addition, the QWERTY keyboard is the only keyboard layout that is available in various ergonomically-styled arrangements, that prevents the development of

  2. Impact of ICT on the community

    Explanation of the technology Banking is the biggest place in the world that uses ICT. ICT is used in ATM Machines (electronic funds transfer at point of sale). ATM is used to withdraw money there are also other facilities that ATM machines provide other facilities for example: you can print or view balance on the screen, change pin, order statement.

  1. The impact of ICT on a person with special/particular needs

    Stair lift: A stair lift is simply a mechanical device programmed to lift mobility-troubled people to be lifted up and down stairs. Its purpose is to help those who are unable themselves to go up the stairs to do so, providing them with the ability to partake in a normal lifestyle without constant assistance.

  2. Describe a wide range of technologies used by an adult in employment, with evaluation ...

    Personal use/Social use: The IT Consultant can access her email from her mobile phone using Mobile Mail Application. This allows her to access her email any were any time. She can respond to her urgent emails while she is on the go.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work