• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Report 3E: the Legislation that protects individuals and groups from the misuse of ICT

Extracts from this document...

Introduction

Report 3E: the Legislation that protects individuals and groups from the misuse of ICT Introduction In this report, I am aiming to explain the different legislations that protect individuals and groups from the misuse of ICT. There is much legislation including 'The Data Protection Act', 'Copyright, Design and Patents Act' and 'Health and Safety Act' that carry out this protection. These legislations will be linked to the people or groups mentioned in Reports 3A-D. The Data Protection Act (1998): This act was introduced in 1998, and aims to protect the privacy of personal information such as a bank statement, passport etc. However, it only covers personal information about living individuals, and not businesses. It covers data stored on a computer or in a paper-based filing system and it allows people to check what data is being held about them. It is run by the International Commissioner's Office. The 8 principles of the Data Protection Act include that data must be: 1) Fairly and lawfully processed (used) 2) Used for limited purposes 3) Adequate and relevant. Only what is needed may be used 4) Accurate 5) Not kept for longer than is necessary 6) Accessible to the individual and able to be corrected or removed where necessary 7) Secure 8) ...read more.

Middle

Cyber cafe owners must also make sure that their cafe network is safe to use and may also not be breaking any laws put out by the act. For this, he must use a network manager's valuable time to help him do this. The act also assists the people that use the cafes, as all their personal information is not used for any wrong reasons and they can safely go about doing what they do on the computers without the thought of someone finding out their details or something similar to that. If the people do find out that the owner is not abiding by the instructions of the act, they can ask the Data Commissioner to get involved. The Copyright, Designs and Patents Act (1988/89): The Copyright, Design and Patents Act sets out to protect the work of others from being stolen. It covers software as a whole and also the code that makes up the software. The only way to use these types of software is by purchasing a license that allows you to the right to use it. There are 3 types of licenses: - Single User Licenses are the most common and they allow you to install one copy of the software only on one computer, although some do allow you to also use it on a laptop as well. ...read more.

Conclusion

While the WorkPace Monitor measures the time he works on the computer, aiding the employer to send Carl off for his regular breaks. Carl's employer also has to be extra careful, as Carl is deaf and therefore will not be able to hear warnings about any health or safety endangering moments. The employer has to provide a very strong hearing aid to make sure Carl can hear the most important warnings. His employer also has to make sure that the path to his desk is left clear at all times, so that Carl will know where he is going and may not fall down risking his health due to his partial blindness. HASAWA helps people like Carl, as he has quite a few disabilities and the act helps to keep people like him safer and the risk of casualties can be put lower. The employers need to make sure that they are not breaking the law by constantly allowing Carl to take regular breaks, as he would be using a computer for most of the day. Carl's employer has to ensure that he is provided with a work surface suited to his height, the correct lighting and a chair that can be adjusted. If his employer fails to apply these regulations, then Carl and other employees are entitled to sue or prosecute them regarding the problem, especially if it causes them health and safety issues. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE ICT Systems and Application section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE ICT Systems and Application essays

  1. Different types of technology How I use ICT at home and at school

    This is why Televisions are extremely popular. There are two types of television: analogue and digital. Analogue television systems are now out-dated and soon to become obsolete. Analogue television, as the name states, use analogue signals to transmit and receive a TV broadcast.

  2. The use of ict has changed the way in which people work. Explain the ...

    can be fed into a computer ,Computer can indicate potential problems or display the results graphically. Scan machines controlled by computers produce a narrow beam of x-ray passing through the body in thin slices and different directions .The x-ray signals are fed into a computer and this builds up a 3d picture of internal organs .

  1. Health and Safety Issues in ICT

    This includes its guidance on the layout of workstations (furniture and equipment) and on work processes. As noted above, the HSC advises taking breaks from keyboard work of between five and ten minutes every 50-60 minutes, while the RSI Association recommends a break of five minutes in each half hour.

  2. How is ICT used in schools and what are the effects?

    The data held about pupils must be correct, Data can be damaged or deleted in many ways:cocb cbr secbcbw orcb cbk incb focb cb. ? Breakdown of hardwarecoea ear seeaeaw orea eak inea foea ea. ? Mistakes by staff who use the computers where the data is storedcoeb ebr seebebw oreb ebk ineb foeb eb!

  1. Impact of ICT on the community

    In my coursework I will write about those technologies which are in the most need and has impact on my community. Financial Transaction- Banking Definition of ATM: ATM stands for Automated teller machine is computerized telecommunications device that provides an agents customer a secure method of performing financial transactions is a public space without the need for a human teller.

  2. Use of IT in schools

    presentations incorporating video and sound, which help them convey the message more clearly. * A computer can hold a student's interest much more than a teacher can because there are endless possibilities. * Through using tools such as the Internet, students now have a vast library of information at their fingertips, any time of the day or night.

  1. a level ict project

    Furthermore, it is evident that the ICT requirement to implement effective security has been realised as the user is prompted to enter their personal username and password, which only allows authorised users and prevents the illegal entry of hackers into the system.

  2. The impact of ICT on a person with special/particular needs

    features * Good suspension to keep a comfortable stable ride * Simple easy controls * Allows Sarah to experience a normal life that she always wanted Summary of disadvantages * Can't always control accurately as it is very hard for her to be dextrous with her hands * Extremely expensive

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work