• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The Legislation that protects individuals and groups from the misuse of ICT

Extracts from this document...


Report 3e The Legislation that protects individuals and groups from the misuse of ICT. In this report I will be investigating the different legislations that protect individuals and groups from the misuse of ICT. Data Protection Act (1998) Data Protection Act is a law set in 1998 to protect the personal informal of individuals, not businesses. It includes how the information is obtained, held or disclosed to other people or organisations. This covers information stored digitally or in a paper-based storage system. The personal details of people are constantly being collected and recorded everywhere, ranging from the local supermarket to the online learning centre. The individual who have their personal data held about them - which is everyone, are called Data Subjects. The organizations or people who hold the Data Subject's data are called Data Users. Before collecting the data from the Data Subjects, the Data Users have to contact the Information Commissioner and do the following: * what data they want to store * what they want to use the data for * how long they are going to keep it for * who they are going to pass on the data to As well as following the rules above, the Data Users have to follow the eight Data Protection Principles. The act says that the data must: * be fairly and lawfully processed * be used for limited purposes * be adequate and relevant. ...read more.


Worm A computer worm is self-replicating program that sends copies itself via network without the users' permission. Some worms are dangerous and can delete files, encrypt files, send e-mails and make backdoors to allow hackers to enter through. Trojan horse Unlike a virus, Trojan horse is a program that actually contains or installs a malicious program, while disguising itself of being something else (e.g. a program claiming to a screensaver would create a backdoor to allow remote access to the user's computer remotely when run). Most Trojan horse programs would: * Erase data * Encrypt files * Upload or download files * Spread other malware such as viruses or worms * Log keystrokes to steal information such as credit card details Antivirus software Antivirus software is a programme that attempts to identify, prevent and eliminate malware that tries to infect a computer. This does by two methods: * Scanning files to find malware that match the virus library * Identifying suspicious behaviour from any programmes which might indicate a possible infection. If a piece of code that matches any definitions in the virus library, the software can one of these following actions after informing the user: * Try to repair the file by removing the malware * Quarantine the file so the virus cannot spread * Delete the infected file In Report 3D, I talked about the impact of ICT in my local community. ...read more.


If I download pirated software from "warez" sites, and install them with the help from serial numbers available on the internet, I would be breaching the Computer Misuse Act. The result of downloading illegal copies of computer software is that many people would download the software and then distribute them. This means that the company which made the software would suffer major financial losses and they would have to increase the prices of their goods, ensuing in the people who actually buy the programme paying more. This would mean that they would rather download the software illegally than buying it. This consequence in fewer customers, so the company would have to raise the prices even more. As with the Computer Misuse Act, it is very difficult to actually catch someone who is breaking the act, but when they are caught the punishments are very harsh. Undoubtedly, everyone who uses ICT for their normal and needs have knowingly or not have broken the Copyright, Designs and Patents Act. This varies from copying and pasting some images from a website to distributing pirated content (e.g. films, software, games). To reduce the risk of breaking the act, I must purchase media contents, software and games legally - either from a retail shop, or from verified websites. If I have to copy some content from another website (e.g. history of the washing machine), I have to include some acknowledgements to the source. ?? ?? ?? ?? Ronan Kodituwakku 10T ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    of the act or even if someone tries to share my personal stuff such as pictures or videos without asking for permission I could also deal with the issue. If someone tries to send me viruses and destroys my computer it would of course also affect me as someone will

  2. Data Protection Act

    Keeping the data longer than necessary then may be both irrelevant and excessive. 4.1 Fourth Principle "Personal Data shall be accurate and, where necessary, kept up to date". A data subject who discovers that inaccurate data is being held on him may request that it is corrected or deleted.

  1. The Data Protection Act 1998 - questions and answers

    register entry; failure to comply with an enforcement notice or other notice issued by the Commissioner. There are also offences in relation to unlawful obtaining and sale of personal data. Under the 1998 Act it will also become illegal for a person to require another person or a third party to supply a copy of that other person's records.

  2. The legislation that protects individuals and groups from the misuse of ICT

    the long run it means to an extent that customer will have no unnecessary information stored about them, and it also means that what is stored about them is protected. All files that contain customer information and details are encrypted which means that no unauthorised person can access it, also

  1. 3E-The legislation that protects individuals and groups from the misuse of ICT

    Some of these rules are; Computer Misuse Act (1990); Data protection Act (1998); Health and Safety Regulations (1992); Health and safety at work act (1974); Copyright, Designs and Patents Act (1988) and Regulation of investigatory Powers Act (2000). In this report I will explain some of these laws.

  2. Privacy and Data Protection: IT Law

    These principles are actually quite similar to the principles incorporated into the 1995 directive: Transparency, Finality, Access security, Data quality and Limits on Data collection. 37 Then again, sectoral laws include the protection of financial records, health information, credit reports, video rentals, cable television, children's (under age thirteen)

  1. Assets table - recording the copyright information on the logos and pictures I used.

    this is because it was the only way I could think of making an image with a caption, this is god because it explains the purpose of fair trade. Information point A various number of ale, beer and wine. images s N/A Images that will be used in a still


    the health, safety and welfare of persons at work, for protecting others against risks to health or safety in connection with the activities of persons at work, for controlling the keeping and use and preventing the unlawful acquisition, possession and use of dangerous substances, and for controlling certain emissions into

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work