• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The Legislation that protects individuals and groups from the misuse of ICT.

Extracts from this document...

Introduction

Report 3e The Legislation that protects individuals and groups from the misuse of ICT. Introduction In this report, I will be writing about different legislations that protect individuals and groups from the misuse of ICT. The misuse of ICT , would be online hacking which is sometimes disguised as Trojan horse or spam mainly used for inappropriate reasons. ICT fraud and abuse are still posing major problems to public sector organizations and those who use their services, an in-depth survey shows. New technologies, like the use of handheld devices (PDAs) and wireless networking, are creating fresh risks that public services are only slowly reacting to. And, despite better ICT security systems, a 'culture of complacency' and a failure to ensure that staff understand the rules is undermining the effectiveness of ICT security arrangements. The survey, carried out in 2004 by the Audit Commission, is based on the responses of more than 400 public sector organizations, including NHS trusts, local authorities, police and fire authorities. 200 cases of ICT fraud and abuse were identified in the survey. The results are published in the report An Update on ICT Fraud and Abuse 2004. ...read more.

Middle

Looking back at your Reports 3a to 3d, which of the reports would you link Data Protection Act to? In Report 3b, Mr K Rhodes is a heart surgeon for Guys hospital in London. He works around people who have certain heart diseases like Cardiovascular disease,he uses his portable laptop to store confidential reports consisting of medical information and a brief profile of individuals .He needs to ensure that the information from his laptop is secure so that unauthorised users do not have access to it. He should also ensure that the information from his medical reports is used only for the purpose of the patient. Mr K Rhodes must not keep information collected from his patient for longer than necessary. If Mr K Rhodes fails to observe the Data Protection Act, Data Subjects may sue him for violation of Data Protection Act (1998). Evaluate the impact of Data Protection Act (1998) on the Individual or group you have linked this act to. (How has the Legislation affected the Individual or group?) How are they affected by the law? Is what they do close to breaking the law? ...read more.

Conclusion

HASAWA was an act to make further provision for securing the health, safety and welfare of persons at work, for protecting others against risks to health or safety in connection with the activities of persons at work, for controlling the keeping and use and preventing the unlawful acquisition, possession and use of dangerous substances, and for controlling certain emissions into the atmosphere and to make further provision with respect to the employment medical advisory service. It set up the Health and Safety Commission and the Health and Safety Executive. Health and safty at work act helps the employees to work in a safe and secure environment,this helps to prevent injuries or disabilities from accuring.If people are found with disailities due to lack of fundermental equipment, the employers could be sued for compensation. This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    and unauthorized transfer or copying - file sharing * Copying and distributing software, music and film - Including copying CD's on your computer and sharing them on the internet * Viruses - programming and deliberately spreading viruses Evaluation: These are the main computer misuse acts which affect me as for

  2. Data Protection Act

    an employer holds details of blood groups of employees engaged in hazardous occupations. Data controller should continually monitor compliance with this principle which has obvious with the Fourth and Fifth Principles. Changes in circumstances or failure to keep the information up to date may mean that the information that was originally adequate becomes inadequate.

  1. The Data Protection Act 1998 - questions and answers

    is not the data subject but who can be identified from that information. What happens if a data controller does not comply with the Act? The Act sets out various offences including: processing personal data without notification (i.e. being registered); failure to notify the Commissioner of any changes to a

  2. The legislation that protects individuals and groups from the misuse of ICT

    when handling data, Askews solicitors has a strict policy in place to protect both themselves and their clients, clients sign a disclaimer which sets out the rights that they as customers have and what the solicitors must do. It creates more paperwork, and takes longer to process information but in

  1. 3E-The legislation that protects individuals and groups from the misuse of ICT

    However, the access of an array of technologies also brought forth a new set of problems which must be dealt with and this problem in essence is the misuse of ICT for different purposes. New laws have been put over time in order to protect us from these problems.

  2. Leaflet design for Finding Nemo.

    I always save my work several times in a lesson in case the computer crashes.

  1. Privacy and Data Protection: IT Law

    But according to the eighth report in the implementations regulatory package, action needs to be taken to improve the low level of harmonisation regarding the retention of traffic data in the member states, both for billing and other purposes, since it entails financial burden on operators and has an impact in particular on cross-border players.25 III.

  2. Assets table - recording the copyright information on the logos and pictures I used.

    this is to make it more visible for the target audience and to get rid of the irrelevant text. This was chosen because it was a good image of two inspiring people. Swap advert Fair deal (words) image S N/A A picture of fair deals (word)

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work