• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The legislation that protects individuals and groups from the misuse of ICT.

Extracts from this document...


The legislation that protects individuals and groups from the misuse of ICT This act was introduced to help everybody n the work place to be safe while working and when it was introduced in 1974 many work places had to change their entire health and safety rules and regulations. Employers have got to > Take reasonable steps to ensure the health, safety and welfare of employees > Provide safe plant and machinery and safe premises > Safe system of work and competent, trained and supervised staff > Consult with employees on health and safety matters > Give information on basic health and safety requirements If the employer fails to cover these areas it could result in criminal prosecution in the magistrates court and sometimes go into the crown courts. If personal injury occurs the employer is held liable and could be sued by the injured party These regulations were introduced for employees ...read more.


This act was passed in 1984 due to the increase on worry over the rapidly developing technology and the privacy of them over the web. This act covers automatically processed personal data which can be used in conjunction with good information handling practice. There are two ways in which this works > It gives individuals certain rights while requiring those who record data > It uses personal information on computer to be open about that use and to follow proper practices There was another act passed in the year 1998 which extended the rights for data subjects There are eight principles of the data protection act, they are: > Fairly and lawfully processed, > Processed for limited purposes, > Adequate, relevant and not excessive, > Accurate, > Not kept longer than necessary, > Processed in accordance with the data subject's rights, > Secure, > Not transferred to countries without adequate protection. ...read more.


The provision of this act makes it illegal to > Run pirated software > Copy software > Transmit software over a telecommunications line Usually when software is copied it is sold illegally and this often is the case in many places, also program ideas are often stolen by competitors, for example many years ago Apple unsuccessfully sued Microsoft for stealing the lock and feel of their graphical interface, and this is just one example things like this go on each day. It is becoming increasingly harder to copy software due to the huge clampdown. This is not a law it is only an agreement which protects the users of the internet. Once a website has registered and paid a small fee they can show the ICR (Internet Content Register) seal. This shows the user hat this site conforms to the code of practice. This includes these seven headings > Audience > Advertising > Contracts > Copyright and information ownership > Information > Applets, browser scripts and CGI usage > Mail and news ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    If she gives away the data for a different purpose and it gets used for a different purpose which data had not been given for it would also have affected her. Because of these reasons it is important that these acts are followed by anyone and if someone breaks them

  2. Data Protection Act

    data * The security of telecommunication services and the use of cookie type devices * Calling or connected line identification9 The information commissioner can consider complaint about a public authority scheme (for example, failure to adopt a scheme or failure to publish information in accordance with the classes of the scheme).

  1. The legislation that protects individuals and groups from the misuse of ICT

    all information is reviewed after one year after the clients case has been resolved, anything unnecessary will be deleted. There is only Derek who can access his client's information which means that in the event of a breach of the act he would be held responsible.

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    Additionally, I will link the law that I most relevant to those studies in 3A-3D. LAW NO.1: DATA PROTECTION ACT (1998) The sole purpose of this law is to prevent the misuse of an individual's personal data. It is extremely crucial for all organisation that hold personal data on people

  1. Privacy and Data Protection: IT Law

    was that US companies would voluntarily self-certify to adhere to a set of privacy principles worked out by the US Department of Commerce and the Internal Market Directorate of the European Commission. These companies would then have a presumption of adequacy and they could continue to receive personal data from the EU.

  2. The impact of ICT on the environment

    A survey carried out by autoglass in 1996 projects a possible 38% reduction in car journeys per week by 2110 and also a 43% reduction in the number of work trips per person per week. That's 328 million work trips per person in total in 1996 to 186 million in 2010.

  1. The legislations that protects individuals and groups from the misuse of ICT

    Church administrations, voluntary organisations and some charities are exempt from the ACT. This is a great disadvantage as it is the little details that create the big losses. The advantage of this ACT is that it prevents loss and keeps our personal information safe and secure.

  2. Legal Aspects of Using Information Technology

    The Act covers stealing software, using illegally copied software and manuals, and running purchased software on two or more machines at the same time, without a suitable licence. The legal penalties for violating the copyright law include unlimited fines and up to two years prison.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work