• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The Legislation that protects individuals and groups from the misuse of ICT.

Extracts from this document...

Introduction

Report 3e The Legislation that protects individuals and groups from the misuse of ICT. Introduction In this report, I will be writing about different legislations that protect individuals and groups from the misuse of ICT. The misuse of ICT , would be online hacking which is sometimes disguised as Trojan horse or spam mainly used for inappropriate reasons. ICT fraud and abuse are still posing major problems to public sector organizations and those who use their services, an in-depth survey shows. New technologies, like the use of handheld devices (PDAs) and wireless networking, are creating fresh risks that public services are only slowly reacting to. And, despite better ICT security systems, a 'culture of complacency' and a failure to ensure that staff understand the rules is undermining the effectiveness of ICT security arrangements. The survey, carried out in 2004 by the Audit Commission, is based on the responses of more than 400 public sector organizations, including NHS trusts, local authorities, police and fire authorities. 200 cases of ICT fraud and abuse were identified in the survey. The results are published in the report An Update on ICT Fraud and Abuse 2004. ...read more.

Middle

Looking back at your Reports 3a to 3d, which of the reports would you link Data Protection Act to? In Report 3b, Mr K Rhodes is a heart surgeon for Guys hospital in London. He works around people who have certain heart diseases like Cardiovascular disease,he uses his portable laptop to store confidential reports consisting of medical information and a brief profile of individuals .He needs to ensure that the information from his laptop is secure so that unauthorised users do not have access to it. He should also ensure that the information from his medical reports is used only for the purpose of the patient. Mr K Rhodes must not keep information collected from his patient for longer than necessary. If Mr K Rhodes fails to observe the Data Protection Act, Data Subjects may sue him for violation of Data Protection Act (1998). Evaluate the impact of Data Protection Act (1998) on the Individual or group you have linked this act to. (How has the Legislation affected the Individual or group?) How are they affected by the law? Is what they do close to breaking the law? ...read more.

Conclusion

HASAWA was an act to make further provision for securing the health, safety and welfare of persons at work, for protecting others against risks to health or safety in connection with the activities of persons at work, for controlling the keeping and use and preventing the unlawful acquisition, possession and use of dangerous substances, and for controlling certain emissions into the atmosphere and to make further provision with respect to the employment medical advisory service. It set up the Health and Safety Commission and the Health and Safety Executive. Health and safty at work act helps the employees to work in a safe and secure environment,this helps to prevent injuries or disabilities from accuring.If people are found with disailities due to lack of fundermental equipment, the employers could be sued for compensation. This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ This document was downloaded from Coursework.Info - The UK's Coursework Database - http://www.coursework.info/ ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Assets table - recording the copyright information on the logos and pictures I used.

    used in my still movie I have Cropped theses images and then enlarged them so that the people watching this movie can easily see the relevant and main images, there purpose it to show people more options than just regular beer/ale.

  2. The purpose of legislation is to control and regulate the use of ICT

    Any uploading or downloading of information through on-line technologies which is not authorised by the copyright owner or any substantive extraction of information from a database that is not authorised by the database owner will be deemed to be an infringement of the owner of the databases' rights.

  1. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    and unauthorized transfer or copying - file sharing * Copying and distributing software, music and film - Including copying CD's on your computer and sharing them on the internet * Viruses - programming and deliberately spreading viruses Evaluation: These are the main computer misuse acts which affect me as for

  2. The Data Protection Act 1998 - questions and answers

    is not the data subject but who can be identified from that information. What happens if a data controller does not comply with the Act? The Act sets out various offences including: processing personal data without notification (i.e. being registered); failure to notify the Commissioner of any changes to a

  1. Car Safety

    * They help absorb the wearer's inertial energy, allowing the wearer to slow at a rate similar to the occupant compartment. In a 50 km/h crash, an average-sized occupant not wearing a safety belt would hit the vehicle interior with a force of three and a half tonnes.

  2. Data Protection Act

    The notification to the commissioner alone will not satisfy the fairness element of the First Principle. 3.1 Third Principle "Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed".

  1. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    All organisations who process personal information have to register with the 'Information Commissioner's Office'. This is to ensure that all handling of personal data can be observed and any breach can be prosecuted. Organisations are also prosecuted if they handle personal data without registering to the Information Commissioner's Office (ICO).

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    However, the access of an array of technologies also brought forth a new set of problems which must be dealt with and this problem in essence is the misuse of ICT for different purposes. New laws have been put over time in order to protect us from these problems.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work