• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The Legislation that protects individuals and groups from the misuse of ICT.

Extracts from this document...

Introduction

Report 3e The Legislation that protects individuals and groups from the misuse of ICT. Introduction In this report, I will be writing about different legislations that protect individuals and groups from the misuse of ICT. The misuse of ICT , would be online hacking which is sometimes disguised as Trojan horse or spam mainly used for inappropriate reasons. ICT fraud and abuse are still posing major problems to public sector organizations and those who use their services, an in-depth survey shows. New technologies, like the use of handheld devices (PDAs) and wireless networking, are creating fresh risks that public services are only slowly reacting to. And, despite better ICT security systems, a 'culture of complacency' and a failure to ensure that staff understand the rules is undermining the effectiveness of ICT security arrangements. The survey, carried out in 2004 by the Audit Commission, is based on the responses of more than 400 public sector organizations, including NHS trusts, local authorities, police and fire authorities. 200 cases of ICT fraud and abuse were identified in the survey. The results are published in the report An Update on ICT Fraud and Abuse 2004. ...read more.

Middle

Looking back at your Reports 3a to 3d, which of the reports would you link Data Protection Act to? In Report 3b, Mr K Rhodes is a heart surgeon for Guys hospital in London. He works around people who have certain heart diseases like Cardiovascular disease,he uses his portable laptop to store confidential reports consisting of medical information and a brief profile of individuals .He needs to ensure that the information from his laptop is secure so that unauthorised users do not have access to it. He should also ensure that the information from his medical reports is used only for the purpose of the patient. Mr K Rhodes must not keep information collected from his patient for longer than necessary. If Mr K Rhodes fails to observe the Data Protection Act, Data Subjects may sue him for violation of Data Protection Act (1998). Evaluate the impact of Data Protection Act (1998) on the Individual or group you have linked this act to. (How has the Legislation affected the Individual or group?) How are they affected by the law? Is what they do close to breaking the law? ...read more.

Conclusion

HASAWA was an act to make further provision for securing the health, safety and welfare of persons at work, for protecting others against risks to health or safety in connection with the activities of persons at work, for controlling the keeping and use and preventing the unlawful acquisition, possession and use of dangerous substances, and for controlling certain emissions into the atmosphere and to make further provision with respect to the employment medical advisory service. It set up the Health and Safety Commission and the Health and Safety Executive. Health and safty at work act helps the employees to work in a safe and secure environment,this helps to prevent injuries or disabilities from accuring.If people are found with disailities due to lack of fundermental equipment, the employers could be sued for compensation. This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. The impact of ICT on the environment

    now print of the forms themselves in order to practice filling it in and then to check it when it has completed. I think that the only way to overcome the problem over high paper usage is to limit the amount of paper that is used.

  2. The Data Protection Act 1998 - questions and answers

    is not the data subject but who can be identified from that information. What happens if a data controller does not comply with the Act? The Act sets out various offences including: processing personal data without notification (i.e. being registered); failure to notify the Commissioner of any changes to a

  1. Car Safety

    * They help absorb the wearer's inertial energy, allowing the wearer to slow at a rate similar to the occupant compartment. In a 50 km/h crash, an average-sized occupant not wearing a safety belt would hit the vehicle interior with a force of three and a half tonnes.

  2. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    Because of these reasons it is important that these acts are followed by anyone and if someone breaks them he can be in serious trouble as mentioned in the law explanation above. The Computer Misuse Act (1990) * Hacking - unauthorized people gaining access to computer networks * Data Misuse

  1. Legal Aspects of Using Information Technology

    A copy of all IKEA IT policies is in the Appendix section. Protecting data Computers are vulnerable to crime and abuse, natural disaster and human error. This can make it difficult for businesses, such as IKEA to protect their data.

  2. Data Protection Act

    subject to the processing which in turn any may remove the basis for processing which was being relied upon by the data controller. 1.1.4 Paragraph 2 and 3 - information to be provided to data subjects Paragraph 2 and 3 provide that personal data are not to be treated as processed fairly.

  1. Laws and Legislations (ICT)

    this protection is just not enough as it does not stop hackers from hacking information. Hackers and people who send viruses still continue to do this but the risks have increased which may just make people more reluctant from doing this in the future.

  2. Critically evaluate the extent to which it can be said that copyright law gives ...

    There was a suggestion in this case that perhaps it was a collage contrary to section (a) that falls under the extensive meaning of graphic work. It was decided however that it could not form a collage as the work was merely temporary and was not a collection of objects stuck together.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work