Page
  1. 1
    1
  2. 2
    2
  • Level: GCSE
  • Subject: ICT
  • Essay length: 823 words

The computer misuse act

Extracts from this essay...

Introduction

The Computer Misuse Act (1990) The 1990 Computer Misuse Act was introduced by Parliament to prevent misuse of computers. It was introduced due to a number of reasons. Hackers were able to gain access past security and see data stored on other computers using an Internet connection. Copying can also be quick and easy using online computers and large storage devices such as hard disks. Personal data and written work, such as textbooks, can all be copied without permission. Copies of music tracks from music CDs could be distributed on the Internet using computer equipment. This misuse of computers and the Internet breaks copyright regulations. Spam is another abuse with millions of e-mails being sent to advertise both legal and illegal products. Viruses are also being made which are designed to cause damage to other computers. The Act introduced three new offences: 1.

Middle

Most of all, this Act is highly valuable for people in the community. How the Computer Misuse Act affects the community This Act has most affect on the community, in that the local Idea Store has many public computers which are use by local people. The Idea Store needs to be protected by this Act in order to ensure that people will not misuse the computers. It prevents local people from hacking into the system and altering data without permission, meaning that the Idea Store is able to run efficiently without intrusions. It is helped by the Idea Store's own policy which states that if they are going to use the computers, then they are not allowed to abuse them. How the Computer Misuse Act affects me The Computer Misuse Act affects me because in order to use the ICT facilities in school, I must agree to comply with the school policies which are stated, which includes the Computer Misuse Act.

Conclusion

Evaluation The Computer Misuse Act is highly useful in ensuring that peoples work and personal information is kept safe. However it can be difficult in finding a person to prosecute if the Act is breached due to the enormity of the Internet. For example, if someone hacked into someone else's computer and looked at or altered information, then they would be charged with unauthorised access or modification. However it can be hard to trace the hacker as they may not use their own IP address. Also if someone was attempting to access data without authorisation, then it would be difficult to prove this as the crime has not yet been committed. I hope that in future, the government will implement new plans which will be able to reduce the activity of these happenings. Much money is lost by businesses by this law, and can be prevented by simple measures. It will serve as a further warning not to disobey this law.

The above preview is unformatted text

Found what you're looking for?

  • Start learning 29% faster today
  • Over 150,000 essays available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Over 180,000 student essays
  • Every subject and level covered
  • Thousands of essays marked by teachers

Related GCSE Legislation & The Legal Framework

  1. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    If the Employer does not take care of all these laws and decides not to follow them he could be in serious trouble. How legislation affects Croydon Community Laws and acts affect the Croydon Community in many ways such as Croydon Community has a library which is also protected by

  2. Data Protection Act

    Privacy and Electronic Communication Regulation 2003 came into force on 11th December 2003. The Privacy and Electronic Communication Regulation 2003 is responsible for both enforcing both the 2003 and the 1999 regulations. The Privacy and Electronic Communication Regulation 2003 supersedes the Telecommunication (Data Protection and Privacy)

  1. Privacy and Data Protection: IT Law

    the kind of information they collect, the purposes for which it may be used, and any third parties to whom it may be disclosed. This notice must be given at the time of the collection of any personal information or "as soon thereafter as is practicable."

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    that I am linked with, to contact me encase of an emergency or to keep me alert of a particular event i.e. health related appointment. My personal data will need to be regularly updated to ensure that it is correct.

  1. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    This is where the Data Protection Act comes in. It ensures that the school keeps this information exactly how it is-private. The Data Protection Act is extremely important in this case. Children are extremely vulnerable to various dangers in this world. Abuse of children is a major problem. If someone dangerous got a hold of these children's information, they can be in danger or threatened in various ways.

  2. Legislation protecting people & groups.

    to send unsolicited e-mails. The act also makes sure that the information stored about the individual is accurate. Computer Misuse Act (1990) With the widespread use of computers and communication systems, problems started to arise about the misuse of systems.

  1. You have to explain how you have looked after the equipment and ensured its ...

    Protection From Fires Fires, which start in computer rooms, are rare. Usually they are the result of faulty wiring or overloaded sockets. It is more likely that a fire will start in adjacent offices or in storage areas. Fireproof doors help contain fires.

  2. Different legislations that protect people from the misuse of ICT.

    to take and abide by if they want to become a doctor. Evaluation of the impact of the Data Protection Act on the individual: The data protection act means that Dr Pratab's clients can be safe and that they can rely on him to keep the information that they give him safe.

  • Over 180,000 essays
    written by students
  • Annotated by
    experienced teachers
  • Ideas and feedback to write
    your own great essays

Marked by a teacher

This essay has been marked by one of our great teachers. You can read the full teachers notes when you download the essay.

Peer reviewed

This essay has been reviewed by one of our specialist student essay reviewing squad. Read the full review on the essay page.

Peer reviewed

This essay has been reviewed by one of our specialist student essay reviewing squad. Read the full review under the essay preview on this page.