• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  • Level: GCSE
  • Subject: ICT
  • Word count: 2599

The data protection act

Extracts from this document...

Introduction

Dean Smith 11k LEGISLATION The data protection act was introduced in the UK in 1984. It gives rights to data subjects (i.e. people who have data about them stored on computer systems). The act was updated in 1998 to take the increasing use of computers, and changes in European Union law, into account. The 8 principles of the data protection act are: 1. Data must not be processed unless there is a specific lawful reason to do so. 2. Data must only be obtained and then used for a specified purposes. 3. Data should be adequate, relevant, and not excessive for the specified use. 4. Data must be accurate and where relevant, kept up to date. 5. Data should not be kept longer than is necessary for the specified purpose. 6. Data processing should meet the legal rights of the data subjects. 7. Data holders should protect the data against loss, theft, or corruption. 8. Data should not be transferred abroad, except to certain other European countries. Here are some useful bits of information to help protect your data: 1. To keep information is important and personal. People like to keep their own data to themselves. The main reason for this is to stop the breaching of their privacy from hackers. Their also like to keep their data classified from others as they can use their information to use for illegal purposes that can result in terrible issues. Some hackers even use their data to get their credit card details and use a purpose called "skimming" to break down the code and use their card as themselves. ...read more.

Middle

Before its release, their music was pirated and sold for cheap and 19.3 million pirated copies were sold worldwide. It was the bands first album and they needed the money to boost their career, bearing in mind the average cost of an album is around �13 their total loss from piracy would be around �200 million. A month later MTV sent emails to people invited for their annual guest party. Shell shock were invited and they would be able to perform live on TV for the first time. However a hacker managed to breach their files and delete the email. As a result Shell shock could not have their big first act live on TV. Shell shock made their own website on the internet called www.shellshock.com but soon after hackers used their website to access codes and decrypt them, doing so he managed to gain control of their computer and managed to find out their credit details and inherit their profits from their band. Computer Fraud. With so many financial transactions being handled by computers it is a prime area for crime. There have been many reports of 'inside jobs', with the programmers working on the computer system responsible for building into their code a way to make money. One of the most popular stories is about the programmer who noticed that when interest payments were calculated on bank balances there was often the odd quarter of a penny left over. ...read more.

Conclusion

People also fear that there will be a loss in personal skills, and communication will be limited to people with the same views. Over-reliance on technology. Some people believe allowing there children to use new technology, will lead to them being less self-reliant in later life. This can then lead to the fears of the millennium bug as an example of the reliance of computer technology for a smooth running society. Impact on Literacy. Some people believe the increasing use of computer games and multi-media software will result in people spending less time reading. This could lead to lower levels of literacy, and as a result education standards will decrease. Implicating the quality of the workforce. Faster Pace of Life. Computer technology is rapidly changing, so people forever have to adapt to new ways of working. Also computers generate work faster, so people have to work harder to keep up with all the work generated. Although you may class some of the above of bad affects of computer technology, the Internet can make it easier for people of different cultures, countries etc to communicate. Computers are able to perform routine tasks, leaving people to perform more complex ones. This can result in the need to travel. In my opinion I think that the forever-expanding computer technology could make life easier, if used correctly. A big problem can be the Internet, the problem being the freedom, and accessibility of web sites and chat rooms. I think that it can be easy for children to access inappropriate web sites, and adults making inappropriate web sites. ?? ?? ?? ?? Dean Smith 11k Dean Smith 11k ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. The Data Protection Act 1998 - questions and answers

    Personal data must be accurate and where necessary kept up to date. Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes. Personal data must be processed in accordance with the rights of data subjects under the 1998 Act.

  2. Data Protection Act

    Schedule 3 conditions are set out in Data Protection Order 2000. Schedule 4 of the Act consists of cases where the Eighth Principle (prohibiting the transfer of personal data outside the European Economic Area) does not apply. Once registered the data user must comply with the following eight principles: 1.1

  1. Car Safety

    It is preferable that three-point lap and shoulder safety belts are installed in every seating position in a vehicle, although this is not always possible in the centre rear seat of some cars. While two-point lap safety belts are much better than wearing no restraint, they do not provide the same protection as three-point safety belts.

  2. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    The Data Misuse act also affects me as if I have my coursework on my computer and don't want to share it and someone and someone hacks my computer and transfers my videos or coursework's without me wanting to I would also be able to deal with the issue because

  1. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    They can be charged and taken to court. Personal information also cannot be shared. The library holds this information in privacy and keeps it from being accessed by unknown sources. Evaluation As described, the Data Protection Act is extremely essential. It stops people from committing crime regarding people's data and/or identity with the threat of breaking the law.

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    Obrien can easily take the matter up in court. This is what keeps individuals terrified from carrying out illegal data transferring or usage. IMPACT OF LAW UPON MARIA KORELLI The data protection act creates an impact upon Maria Korelli who is an individual with special particular needs.

  1. ICT - Data Protection

    SMS stands for Short Message Service and is commonly know as text messaging. It's great for sending quick little messages to friends' phones and normally cheaper than a mobile phone call. So, next time you're running late you can just key in "On my way!"

  2. The legislation that protects individuals and groups from the misuse of ICT

    The health and safety at work act has been around for a long time, well over 100 years. It allows the workforce to be protected whilst at work preventing them from being put at any risk or faced with a dangerous situation.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work