• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The Legislation that protects individuals and groups from the misuse of ICT.

Extracts from this document...

Introduction

Report 3e The Legislation that protects individuals and groups from the misuse of ICT. Introduction In this report, I will be writing about different legislations that protect individuals and groups from the misuse of ICT. The misuse of ICT , would be online hacking which is sometimes disguised as Trojan horse or spam mainly used for inappropriate reasons. ICT fraud and abuse are still posing major problems to public sector organizations and those who use their services, an in-depth survey shows. New technologies, like the use of handheld devices (PDAs) and wireless networking, are creating fresh risks that public services are only slowly reacting to. And, despite better ICT security systems, a 'culture of complacency' and a failure to ensure that staff understand the rules is undermining the effectiveness of ICT security arrangements. The survey, carried out in 2004 by the Audit Commission, is based on the responses of more than 400 public sector organizations, including NHS trusts, local authorities, police and fire authorities. 200 cases of ICT fraud and abuse were identified in the survey. The results are published in the report An Update on ICT Fraud and Abuse 2004. ...read more.

Middle

Looking back at your Reports 3a to 3d, which of the reports would you link Data Protection Act to? In Report 3b, Mr K Rhodes is a heart surgeon for Guys hospital in London. He works around people who have certain heart diseases like Cardiovascular disease,he uses his portable laptop to store confidential reports consisting of medical information and a brief profile of individuals .He needs to ensure that the information from his laptop is secure so that unauthorised users do not have access to it. He should also ensure that the information from his medical reports is used only for the purpose of the patient. Mr K Rhodes must not keep information collected from his patient for longer than necessary. If Mr K Rhodes fails to observe the Data Protection Act, Data Subjects may sue him for violation of Data Protection Act (1998). Evaluate the impact of Data Protection Act (1998) on the Individual or group you have linked this act to. (How has the Legislation affected the Individual or group?) How are they affected by the law? Is what they do close to breaking the law? ...read more.

Conclusion

HASAWA was an act to make further provision for securing the health, safety and welfare of persons at work, for protecting others against risks to health or safety in connection with the activities of persons at work, for controlling the keeping and use and preventing the unlawful acquisition, possession and use of dangerous substances, and for controlling certain emissions into the atmosphere and to make further provision with respect to the employment medical advisory service. It set up the Health and Safety Commission and the Health and Safety Executive. Health and safty at work act helps the employees to work in a safe and secure environment,this helps to prevent injuries or disabilities from accuring.If people are found with disailities due to lack of fundermental equipment, the employers could be sued for compensation. This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. The impact of ICT on the environment

    now print of the forms themselves in order to practice filling it in and then to check it when it has completed. I think that the only way to overcome the problem over high paper usage is to limit the amount of paper that is used.

  2. The Data Protection Act 1998 - questions and answers

    is not the data subject but who can be identified from that information. What happens if a data controller does not comply with the Act? The Act sets out various offences including: processing personal data without notification (i.e. being registered); failure to notify the Commissioner of any changes to a

  1. Data Protection Act

    an employer holds details of blood groups of employees engaged in hazardous occupations. Data controller should continually monitor compliance with this principle which has obvious with the Fourth and Fifth Principles. Changes in circumstances or failure to keep the information up to date may mean that the information that was originally adequate becomes inadequate.

  2. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    example someone tries to hack my computer without me wanting to he could do anything but because of the act he is not lawfully allowed to do this and if he does not follow the law he could be caught.

  1. Legal Aspects of Using Information Technology

    IKEA can prevent the misuse of the Internet is, by getting their co-workers to sign a code of conduct of conduct. It is important that IKEA to get its co-workers to sign a computer code of conduct, to make it clear what the co-workers are allowed to do and what is not permitted.

  2. Laws and Legislations (ICT)

    this protection is just not enough as it does not stop hackers from hacking information. Hackers and people who send viruses still continue to do this but the risks have increased which may just make people more reluctant from doing this in the future.

  1. Car Safety

    On vehicles, safety aspects include, seat belts, airbags, SIPS, crumple zones, ABS brakes, etc. etc. the level of safety features varies a great deal, it's up to the individual what priority is placed on safety features, often this will be determined by the cost factor.

  2. Privacy and Data Protection: IT Law

    1995 Directive shows, that the Directive could manage to establish a level of harmonisation, so the Internal Market is not inhibited further. But the former divergences survive in the different ways of the Directive's transposition in national laws, and according to the Commissions Report, although not violating EU law, gaps are still judged as too big.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work