• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The Legislation that protects individuals and groups from the misuse of ICT

Extracts from this document...


Report 3e The Legislation that protects individuals and groups from the misuse of ICT. In this report I will be investigating the different legislations that protect individuals and groups from the misuse of ICT. Data Protection Act (1998) Data Protection Act is a law set in 1998 to protect the personal informal of individuals, not businesses. It includes how the information is obtained, held or disclosed to other people or organisations. This covers information stored digitally or in a paper-based storage system. The personal details of people are constantly being collected and recorded everywhere, ranging from the local supermarket to the online learning centre. The individual who have their personal data held about them - which is everyone, are called Data Subjects. The organizations or people who hold the Data Subject's data are called Data Users. Before collecting the data from the Data Subjects, the Data Users have to contact the Information Commissioner and do the following: * what data they want to store * what they want to use the data for * how long they are going to keep it for * who they are going to pass on the data to As well as following the rules above, the Data Users have to follow the eight Data Protection Principles. The act says that the data must: * be fairly and lawfully processed * be used for limited purposes * be adequate and relevant. ...read more.


Worm A computer worm is self-replicating program that sends copies itself via network without the users' permission. Some worms are dangerous and can delete files, encrypt files, send e-mails and make backdoors to allow hackers to enter through. Trojan horse Unlike a virus, Trojan horse is a program that actually contains or installs a malicious program, while disguising itself of being something else (e.g. a program claiming to a screensaver would create a backdoor to allow remote access to the user's computer remotely when run). Most Trojan horse programs would: * Erase data * Encrypt files * Upload or download files * Spread other malware such as viruses or worms * Log keystrokes to steal information such as credit card details Antivirus software Antivirus software is a programme that attempts to identify, prevent and eliminate malware that tries to infect a computer. This does by two methods: * Scanning files to find malware that match the virus library * Identifying suspicious behaviour from any programmes which might indicate a possible infection. If a piece of code that matches any definitions in the virus library, the software can one of these following actions after informing the user: * Try to repair the file by removing the malware * Quarantine the file so the virus cannot spread * Delete the infected file In Report 3D, I talked about the impact of ICT in my local community. ...read more.


If I download pirated software from "warez" sites, and install them with the help from serial numbers available on the internet, I would be breaching the Computer Misuse Act. The result of downloading illegal copies of computer software is that many people would download the software and then distribute them. This means that the company which made the software would suffer major financial losses and they would have to increase the prices of their goods, ensuing in the people who actually buy the programme paying more. This would mean that they would rather download the software illegally than buying it. This consequence in fewer customers, so the company would have to raise the prices even more. As with the Computer Misuse Act, it is very difficult to actually catch someone who is breaking the act, but when they are caught the punishments are very harsh. Undoubtedly, everyone who uses ICT for their normal and needs have knowingly or not have broken the Copyright, Designs and Patents Act. This varies from copying and pasting some images from a website to distributing pirated content (e.g. films, software, games). To reduce the risk of breaking the act, I must purchase media contents, software and games legally - either from a retail shop, or from verified websites. If I have to copy some content from another website (e.g. history of the washing machine), I have to include some acknowledgements to the source. ?? ?? ?? ?? Ronan Kodituwakku 10T ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Assets table - recording the copyright information on the logos and pictures I used.

    I am doing the instrumental that is all I have used of it also the song itself on a whole is inappropriate to put on my fair deal work. I have also merged it with another part of the song that fits well and so that the still movie is better than without sound.

  2. The impact of ICT on the environment

    I know that some cities now collect paper separately from your rubbish in your home, but this should be happening all over the county (even the world). If people got into the habit of using separate bins for rubbish and paper it could reduce the amount of trees that need

  1. The Data Protection Act 1998 - questions and answers

    register entry; failure to comply with an enforcement notice or other notice issued by the Commissioner. There are also offences in relation to unlawful obtaining and sale of personal data. Under the 1998 Act it will also become illegal for a person to require another person or a third party to supply a copy of that other person's records.

  2. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    of the act or even if someone tries to share my personal stuff such as pictures or videos without asking for permission I could also deal with the issue. If someone tries to send me viruses and destroys my computer it would of course also affect me as someone will

  1. Data Protection Act

    Keeping the data longer than necessary then may be both irrelevant and excessive. 4.1 Fourth Principle "Personal Data shall be accurate and, where necessary, kept up to date". A data subject who discovers that inaccurate data is being held on him may request that it is corrected or deleted.

  2. Car Safety

    The safety cage should include strong pillars to stop the roof from collapsing in rollover crashes, as well as barriers to prevent the wheels, bonnet or engine intruding into the occupant compartment. Door locks and hinges also form part of the safety cage and should remain intact so occupants are not thrown from the vehicle.

  1. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    Data should be adequate, relevant and not excessive for the specified use 4. Data must be accurate and kept up to date where necessary 5. Data should not be kept for longer than is necessary for the specified purpose 6.

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    Some of these rules are; Computer Misuse Act (1990); Data protection Act (1998); Health and Safety Regulations (1992); Health and safety at work act (1974); Copyright, Designs and Patents Act (1988) and Regulation of investigatory Powers Act (2000). In this report I will explain some of these laws.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work