• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  • Level: GCSE
  • Subject: ICT
  • Word count: 2599

The data protection act

Extracts from this document...


Dean Smith 11k LEGISLATION The data protection act was introduced in the UK in 1984. It gives rights to data subjects (i.e. people who have data about them stored on computer systems). The act was updated in 1998 to take the increasing use of computers, and changes in European Union law, into account. The 8 principles of the data protection act are: 1. Data must not be processed unless there is a specific lawful reason to do so. 2. Data must only be obtained and then used for a specified purposes. 3. Data should be adequate, relevant, and not excessive for the specified use. 4. Data must be accurate and where relevant, kept up to date. 5. Data should not be kept longer than is necessary for the specified purpose. 6. Data processing should meet the legal rights of the data subjects. 7. Data holders should protect the data against loss, theft, or corruption. 8. Data should not be transferred abroad, except to certain other European countries. Here are some useful bits of information to help protect your data: 1. To keep information is important and personal. People like to keep their own data to themselves. The main reason for this is to stop the breaching of their privacy from hackers. Their also like to keep their data classified from others as they can use their information to use for illegal purposes that can result in terrible issues. Some hackers even use their data to get their credit card details and use a purpose called "skimming" to break down the code and use their card as themselves. ...read more.


Before its release, their music was pirated and sold for cheap and 19.3 million pirated copies were sold worldwide. It was the bands first album and they needed the money to boost their career, bearing in mind the average cost of an album is around �13 their total loss from piracy would be around �200 million. A month later MTV sent emails to people invited for their annual guest party. Shell shock were invited and they would be able to perform live on TV for the first time. However a hacker managed to breach their files and delete the email. As a result Shell shock could not have their big first act live on TV. Shell shock made their own website on the internet called www.shellshock.com but soon after hackers used their website to access codes and decrypt them, doing so he managed to gain control of their computer and managed to find out their credit details and inherit their profits from their band. Computer Fraud. With so many financial transactions being handled by computers it is a prime area for crime. There have been many reports of 'inside jobs', with the programmers working on the computer system responsible for building into their code a way to make money. One of the most popular stories is about the programmer who noticed that when interest payments were calculated on bank balances there was often the odd quarter of a penny left over. ...read more.


People also fear that there will be a loss in personal skills, and communication will be limited to people with the same views. Over-reliance on technology. Some people believe allowing there children to use new technology, will lead to them being less self-reliant in later life. This can then lead to the fears of the millennium bug as an example of the reliance of computer technology for a smooth running society. Impact on Literacy. Some people believe the increasing use of computer games and multi-media software will result in people spending less time reading. This could lead to lower levels of literacy, and as a result education standards will decrease. Implicating the quality of the workforce. Faster Pace of Life. Computer technology is rapidly changing, so people forever have to adapt to new ways of working. Also computers generate work faster, so people have to work harder to keep up with all the work generated. Although you may class some of the above of bad affects of computer technology, the Internet can make it easier for people of different cultures, countries etc to communicate. Computers are able to perform routine tasks, leaving people to perform more complex ones. This can result in the need to travel. In my opinion I think that the forever-expanding computer technology could make life easier, if used correctly. A big problem can be the Internet, the problem being the freedom, and accessibility of web sites and chat rooms. I think that it can be easy for children to access inappropriate web sites, and adults making inappropriate web sites. ?? ?? ?? ?? Dean Smith 11k Dean Smith 11k ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    The Data Misuse act also affects me as if I have my coursework on my computer and don't want to share it and someone and someone hacks my computer and transfers my videos or coursework's without me wanting to I would also be able to deal with the issue because

  2. The Data Protection Act 1998 - questions and answers

    Personal data must be accurate and where necessary kept up to date. Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes. Personal data must be processed in accordance with the rights of data subjects under the 1998 Act.

  1. Car Safety

    It is preferable that three-point lap and shoulder safety belts are installed in every seating position in a vehicle, although this is not always possible in the centre rear seat of some cars. While two-point lap safety belts are much better than wearing no restraint, they do not provide the same protection as three-point safety belts.

  2. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    Basically, it aims to act against hackers and viruses which cause problems and try to access data which belongs to someone else. With the advancement of technology, the previous laws in regards of hacking and viruses soon became insufficient. As the internet and computer use expanded, people became more prone to hacking and viruses.

  1. 3E-The legislation that protects individuals and groups from the misuse of ICT

    Consequently, if the software is unable to keep Maria's data secured and vulnerable from hackers; she can sue the AVG company under the act that the software was unable to keep the confidentiality of her data and was incapable to keep her data secured, which was clearly stated and said

  2. Data Protection Act

    a copy of the data held A holder cannot refuse to give the information unless the data is held for national security. In addition, information on criminal, tax and social work records may also be with held. However, finding out information is not necessarily free.

  1. Is the UK copyright act of 1988 still an adequate means of protecting intellectual ...

    Especially when combined with telecommunications networks; with Richard J. Soloman stating in his book Computers and the Concept of Intellectual Property that they pose `issues completely at odds with copyright traditions based on the printing press of 400 years ago. Why is the Copyright Act of 1988 no longer adequate?

  2. Data Protection Act

    Ones of those is putting a screen in front of any VDU's. This is so that the workers don't damage their eye from continually looking at a screen. To check that the worker hasn't damaged their eyes they have regular eye tests.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work