• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The legislation that protects individuals and groups from the misuse of ICT.

Extracts from this document...

Introduction

The legislation that protects individuals and groups from the misuse of ICT This act was introduced to help everybody n the work place to be safe while working and when it was introduced in 1974 many work places had to change their entire health and safety rules and regulations. Employers have got to > Take reasonable steps to ensure the health, safety and welfare of employees > Provide safe plant and machinery and safe premises > Safe system of work and competent, trained and supervised staff > Consult with employees on health and safety matters > Give information on basic health and safety requirements If the employer fails to cover these areas it could result in criminal prosecution in the magistrates court and sometimes go into the crown courts. If personal injury occurs the employer is held liable and could be sued by the injured party These regulations were introduced for employees ...read more.

Middle

This act was passed in 1984 due to the increase on worry over the rapidly developing technology and the privacy of them over the web. This act covers automatically processed personal data which can be used in conjunction with good information handling practice. There are two ways in which this works > It gives individuals certain rights while requiring those who record data > It uses personal information on computer to be open about that use and to follow proper practices There was another act passed in the year 1998 which extended the rights for data subjects There are eight principles of the data protection act, they are: > Fairly and lawfully processed, > Processed for limited purposes, > Adequate, relevant and not excessive, > Accurate, > Not kept longer than necessary, > Processed in accordance with the data subject's rights, > Secure, > Not transferred to countries without adequate protection. ...read more.

Conclusion

The provision of this act makes it illegal to > Run pirated software > Copy software > Transmit software over a telecommunications line Usually when software is copied it is sold illegally and this often is the case in many places, also program ideas are often stolen by competitors, for example many years ago Apple unsuccessfully sued Microsoft for stealing the lock and feel of their graphical interface, and this is just one example things like this go on each day. It is becoming increasingly harder to copy software due to the huge clampdown. This is not a law it is only an agreement which protects the users of the internet. Once a website has registered and paid a small fee they can show the ICR (Internet Content Register) seal. This shows the user hat this site conforms to the code of practice. This includes these seven headings > Audience > Advertising > Contracts > Copyright and information ownership > Information > Applets, browser scripts and CGI usage > Mail and news ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    she will usually have to enter the credit and debit card details so if for example the company saves the details for longer then necessary it may be end up stolen or get corrupted. Even if the data gets shared the details could be used by anyone which also would affect her.

  2. Data Protection Act

    data * The security of telecommunication services and the use of cookie type devices * Calling or connected line identification9 The information commissioner can consider complaint about a public authority scheme (for example, failure to adopt a scheme or failure to publish information in accordance with the classes of the scheme).

  1. Car Safety

    It is preferable that three-point lap and shoulder safety belts are installed in every seating position in a vehicle, although this is not always possible in the centre rear seat of some cars. While two-point lap safety belts are much better than wearing no restraint, they do not provide the same protection as three-point safety belts.

  2. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    protection law Taken from 'www.pass-ict.co.uk' These principles which make up the Data Protection Act essentially provide a basis of what exactly the act pertains to as well as when charges will be placed, if necessary (when a breach of rights each individual has over his personal data occurs).

  1. 3E-The legislation that protects individuals and groups from the misuse of ICT

    Additionally, I will link the law that I most relevant to those studies in 3A-3D. LAW NO.1: DATA PROTECTION ACT (1998) The sole purpose of this law is to prevent the misuse of an individual's personal data. It is extremely crucial for all organisation that hold personal data on people

  2. The legislation that protects individuals and groups from the misuse of ICT

    What ever it may be Mr. Clements has access to a lot of data, because of this situation there is a need for both the data and Mr. Clements to be protected. For Mr. Clements to stay within and abide by the data protection act, he must consider certain things

  1. The legislations that protects individuals and groups from the misuse of ICT

    Church administrations, voluntary organisations and some charities are exempt from the ACT. This is a great disadvantage as it is the little details that create the big losses. The advantage of this ACT is that it prevents loss and keeps our personal information safe and secure.

  2. Right of privacy under Hong Kong's current laws

    media or the offender, and that any media coverage that may lead to the identification of the victim in sexual abuse cases is also prohibited. Likewise, the Magistrates Ordinance (MO) protects people involved in committal proceedings from media coverage. Common Law Some aspects of privacy are provided by the common

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work