• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The legislation that protects individuals and groups from the misuse of ICT.

Extracts from this document...

Introduction

The legislation that protects individuals and groups from the misuse of ICT This act was introduced to help everybody n the work place to be safe while working and when it was introduced in 1974 many work places had to change their entire health and safety rules and regulations. Employers have got to > Take reasonable steps to ensure the health, safety and welfare of employees > Provide safe plant and machinery and safe premises > Safe system of work and competent, trained and supervised staff > Consult with employees on health and safety matters > Give information on basic health and safety requirements If the employer fails to cover these areas it could result in criminal prosecution in the magistrates court and sometimes go into the crown courts. If personal injury occurs the employer is held liable and could be sued by the injured party These regulations were introduced for employees ...read more.

Middle

This act was passed in 1984 due to the increase on worry over the rapidly developing technology and the privacy of them over the web. This act covers automatically processed personal data which can be used in conjunction with good information handling practice. There are two ways in which this works > It gives individuals certain rights while requiring those who record data > It uses personal information on computer to be open about that use and to follow proper practices There was another act passed in the year 1998 which extended the rights for data subjects There are eight principles of the data protection act, they are: > Fairly and lawfully processed, > Processed for limited purposes, > Adequate, relevant and not excessive, > Accurate, > Not kept longer than necessary, > Processed in accordance with the data subject's rights, > Secure, > Not transferred to countries without adequate protection. ...read more.

Conclusion

The provision of this act makes it illegal to > Run pirated software > Copy software > Transmit software over a telecommunications line Usually when software is copied it is sold illegally and this often is the case in many places, also program ideas are often stolen by competitors, for example many years ago Apple unsuccessfully sued Microsoft for stealing the lock and feel of their graphical interface, and this is just one example things like this go on each day. It is becoming increasingly harder to copy software due to the huge clampdown. This is not a law it is only an agreement which protects the users of the internet. Once a website has registered and paid a small fee they can show the ICR (Internet Content Register) seal. This shows the user hat this site conforms to the code of practice. This includes these seven headings > Audience > Advertising > Contracts > Copyright and information ownership > Information > Applets, browser scripts and CGI usage > Mail and news ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    If she gives away the data for a different purpose and it gets used for a different purpose which data had not been given for it would also have affected her. Because of these reasons it is important that these acts are followed by anyone and if someone breaks them

  2. Car Safety

    * They help absorb the wearer's inertial energy, allowing the wearer to slow at a rate similar to the occupant compartment. In a 50 km/h crash, an average-sized occupant not wearing a safety belt would hit the vehicle interior with a force of three and a half tonnes.

  1. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    protection law Taken from 'www.pass-ict.co.uk' These principles which make up the Data Protection Act essentially provide a basis of what exactly the act pertains to as well as when charges will be placed, if necessary (when a breach of rights each individual has over his personal data occurs).

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    Additionally, I will link the law that I most relevant to those studies in 3A-3D. LAW NO.1: DATA PROTECTION ACT (1998) The sole purpose of this law is to prevent the misuse of an individual's personal data. It is extremely crucial for all organisation that hold personal data on people

  1. Data Protection Act

    Firstly it achieves the public authorities to make information available pro actively through a publication scheme. Secondly it requires them to deal with specific requests and to release information unless they can justify withholding information because exemption in the Act applies.

  2. Critically evaluate the extent to which it can be said that copyright law gives ...

    could not be an 'original literary work' without acknowledging the principle De minimis. What this means is that indeed not all contemporary art will gain protection such as my red squiggly line example, works such as these will be considered insignificant, or worthless and the law must draw a line

  1. The impact of ICT on the environment

    I know that some cities now collect paper separately from your rubbish in your home, but this should be happening all over the county (even the world). If people got into the habit of using separate bins for rubbish and paper it could reduce the amount of trees that need

  2. The legislations that protects individuals and groups from the misuse of ICT

    Church administrations, voluntary organisations and some charities are exempt from the ACT. This is a great disadvantage as it is the little details that create the big losses. The advantage of this ACT is that it prevents loss and keeps our personal information safe and secure.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work