• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The Legislation that protects individuals and groups from the misuse of ICT.

Extracts from this document...

Introduction

Report 3e The Legislation that protects individuals and groups from the misuse of ICT. Introduction In this report, I will be writing about different legislations that protect individuals and groups from the misuse of ICT. The misuse of ICT , would be online hacking which is sometimes disguised as Trojan horse or spam mainly used for inappropriate reasons. ICT fraud and abuse are still posing major problems to public sector organizations and those who use their services, an in-depth survey shows. New technologies, like the use of handheld devices (PDAs) and wireless networking, are creating fresh risks that public services are only slowly reacting to. And, despite better ICT security systems, a 'culture of complacency' and a failure to ensure that staff understand the rules is undermining the effectiveness of ICT security arrangements. The survey, carried out in 2004 by the Audit Commission, is based on the responses of more than 400 public sector organizations, including NHS trusts, local authorities, police and fire authorities. 200 cases of ICT fraud and abuse were identified in the survey. The results are published in the report An Update on ICT Fraud and Abuse 2004. ...read more.

Middle

Looking back at your Reports 3a to 3d, which of the reports would you link Data Protection Act to? In Report 3b, Mr K Rhodes is a heart surgeon for Guys hospital in London. He works around people who have certain heart diseases like Cardiovascular disease,he uses his portable laptop to store confidential reports consisting of medical information and a brief profile of individuals .He needs to ensure that the information from his laptop is secure so that unauthorised users do not have access to it. He should also ensure that the information from his medical reports is used only for the purpose of the patient. Mr K Rhodes must not keep information collected from his patient for longer than necessary. If Mr K Rhodes fails to observe the Data Protection Act, Data Subjects may sue him for violation of Data Protection Act (1998). Evaluate the impact of Data Protection Act (1998) on the Individual or group you have linked this act to. (How has the Legislation affected the Individual or group?) How are they affected by the law? Is what they do close to breaking the law? ...read more.

Conclusion

HASAWA was an act to make further provision for securing the health, safety and welfare of persons at work, for protecting others against risks to health or safety in connection with the activities of persons at work, for controlling the keeping and use and preventing the unlawful acquisition, possession and use of dangerous substances, and for controlling certain emissions into the atmosphere and to make further provision with respect to the employment medical advisory service. It set up the Health and Safety Commission and the Health and Safety Executive. Health and safty at work act helps the employees to work in a safe and secure environment,this helps to prevent injuries or disabilities from accuring.If people are found with disailities due to lack of fundermental equipment, the employers could be sued for compensation. This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. The impact of ICT on the environment

    now print of the forms themselves in order to practice filling it in and then to check it when it has completed. I think that the only way to overcome the problem over high paper usage is to limit the amount of paper that is used.

  2. Assets table - recording the copyright information on the logos and pictures I used.

    used in my still movie I have Cropped theses images and then enlarged them so that the people watching this movie can easily see the relevant and main images, there purpose it to show people more options than just regular beer/ale.

  1. The Data Protection Act 1998 - questions and answers

    is not the data subject but who can be identified from that information. What happens if a data controller does not comply with the Act? The Act sets out various offences including: processing personal data without notification (i.e. being registered); failure to notify the Commissioner of any changes to a

  2. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    example someone tries to hack my computer without me wanting to he could do anything but because of the act he is not lawfully allowed to do this and if he does not follow the law he could be caught.

  1. Car Safety

    Safety belts Three-point lap and shoulder safety belts are the best means of occupant protection in almost all types of crash. Wearing a safety belt can halve the risk of being injured or killed in a crash. Safety belts offer protection in three key ways: * They prevent or minimise

  2. Critically evaluate the extent to which it can be said that copyright law gives ...

    This proves that in fact what might be considered quite clearly a piece of contemporary art in the eyes of society, may not gain the relevant credit under copyright law, and the required protection. I find it quite disturbing that in this case something that has been created specifically for

  1. The following report will compare differences between internal and external information sources relevant to ...

    accordance with the data subject's rights; * Secure; * Not transferred to countries without adequate protection. This act applies to all users of information systems irrespective of where the data is collected or processed within the UK. The organisations that tend to be most at risk of breaching the Data

  2. The legislation that protects individuals and groups from the misuse of ICT

    What ever it may be Mr. Clements has access to a lot of data, because of this situation there is a need for both the data and Mr. Clements to be protected. For Mr. Clements to stay within and abide by the data protection act, he must consider certain things

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work