Report 3E: the Legislation that protects individuals and groups from the misuse of ICT

Authors Avatar

Report 3E: the Legislation that protects individuals and groups from the misuse of ICT

Introduction

In this report, I am aiming to explain the different legislations that protect individuals and groups from the misuse of ICT. There is much legislation including ‘The Data Protection Act’, ‘Copyright, Design and Patents Act’ and ‘Health and Safety Act’ that carry out this protection.  These legislations will be linked to the people or groups mentioned in Reports 3A-D.

The Data Protection Act (1998):

This act was introduced in 1998, and aims to protect the privacy of personal information such as a bank statement, passport etc. However, it only covers personal information about living individuals, and not businesses.

It covers data stored on a computer or in a paper-based filing system and it allows people to check what data is being held about them. It is run by the International Commissioner’s Office.

The 8 principles of the Data Protection Act include that data must be:

  1. Fairly and lawfully processed (used)
  2. Used for limited purposes
  3. Adequate and relevant. Only what is needed may be used
  4. Accurate
  5. Not kept for longer than is necessary
  6. Accessible to the individual and able to be corrected or removed where necessary
  7. Secure
  8. Not transferred to countries without adequate protection.

The Data Protection Act helps in circumstances for people such as Mr Stan Chipcate, who in Report 3B, was a wedding planner/clothes designer. Mr Chipcate takes a lot of details from his customers, meaning that he has access to them whenever he needs them. He needs to make sure that all of this information is secure and cannot be accessed by any unauthorised personnel. He does this by password protecting the files and folders. However, Mr Chipcate can only keep this information for as long as he needs it, and after he’s finished with it, (e.g. the wedding has finished) he needs to dispose of it in a safe manner, so that nobody else can find it. If Stan keeps the information than longer than he needs it, customers may be liable to sue him under violation of the Data Protection Act.

Join now!

Mr Chipcate is affected by the law in terms of him keeping a safer eye on the personal information he has collected. He has to – as said before – password protect all the information and make sure that all other forms of the data are deleted or disposed of. Only authorised people should be able to access this data and Stan has to ensure that only they are able to access it along with him.

Stan must be certain that the data is deleted within the time period with which he needs it, so that he doesn’t ...

This is a preview of the whole essay