• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  • Level: GCSE
  • Subject: ICT
  • Word count: 6079

The Legislation That Protects Individuals and Groups using IT. Use of It by myself and an adult in employment.

Extracts from this document...

Introduction

3E - The Legislation That Protects Individuals and Groups from Computer Misuse of ICT In the final piece of unit 3, I will be investigating the laws and legislations which protect and affect the people through the ICT they use from units 3A to 3D. These legislations all aim to aid the public and aim to locate people breaking the legislation. They essentially moderate the use of technology to make sure they follow certain rules. They prevent exploitation of technology. The laws/legislative acts I will be talking about in this case are the Data Protection Act of 1998, the Computer Misuse Act of 1990 and the Copyright, Design and Patents Act of 1988. Data Protection Act 1998 What is it? The Data Protection Act is essentially a legislative act that aims to keep data regarding citizens of the country private and out of the hands of 3rd parties. This law is a 'United Kingdom Act of Parliament', meaning it was made in the UK and only affects citizens of the UK. It gives people a protection of their personal data, preventing a breach of human rights and promoting and enforcing freedom, freedom being the act of allowing citizens to keep their personal information in the hands of only those consented to. The UK government-using this act-aim in keeping data of customers, members, or other such relations to an organisation only within that organisation. This means that companies outside the organisation which aim to use this information for other reasons are not permitted to do so and this is inspected and punished in accordance to the Data Protection Act 1998. It abides by every UK citizen's fundamental right and right to privacy in respect to the processing of personal data. Individuals are given the ability to control information about them. In terms of technology, the data protection act gives the right to people who have personal information stored about them by any organisation(s). ...read more.

Middle

The victim would essentially be at the mercy of the hacker. Not just key logging but hackers can also access important files of their victim. This makes hackers very dangerous. They also often work to send viruses to people's computers. This is why the Computer Misuse Act was set up. The growth of technology also meant the growth of hacking and the malicious use of technology. With this act in place, hackers could face up-to 5 years in prison and an unlimited fine. Hacking is essentially trespassing into another's property but its potential misuse can be extremely high, hence such extreme charges. Brief history of the Computer Misuse Act The law was coined up after the case of Robert Schifreen and Stephen Gold in 1984-1985.They gained access to the account of a BT engineer, giving them the ability to explore the whole system and even access the personal message box of Prince Philip. With current laws, they would have been charged and fined quite a lot, but the current laws did not condemn what they had done. This is when Parliament made the decision to make new laws regarding hacking and thus, the Computer Misuse Act formed. What does it consist of? The Computer Misuse Act essentially makes the following things illegal: * Hacking - unauthorized people gaining access to computer networks * Data Misuse and unauthorized transfer or copying - file sharing * Copying and distributing software, music and film - Including copying CD's on your computer and sharing them on the internet * Email and chat room abuses - Impersonation and deception or spreading malicious rumours * Pornography - any material showing illegal acts stored on computers * Identity and financial abuses - Identity theft and misuse of credit cards and even printing counterfeit money * Viruses - programming and deliberately spreading viruses (Taken from pass-ict.co.uk) Some of these offences are also covered by the Copyright, Design and Patents Act. ...read more.

Conclusion

This stops money being essentially stolen from Sarah whose sales would have been bad due to the ease of downloads. 3D - Technology used by a community Library Libraries use copyright to allow them to distribute author's books to the public. Each free loan gets the government to give the author money so libraries are encouraged as the community are using books for free and the authors are getting credit and being paid for their work. Evaluation While this act is quite useful in stopping companies going bankrupt, it's still being broken on a day-to-day basis. Piracy has become so world-wide and common that it's incredibly hard to stop it altogether. Sometimes, the act is also unjustified in what it does. For example, while Limewire did allow people to download a lot of music for free, it was provided by Limewire peers meaning Limewire users themselves were the ones who spread the copyrighted media. The owners of Limewire are made to take the blame for all the apparent loss the copyrighted creators have accumulated. This, however, is entirely subjective as it doesn't mean that every download would have equated a purchase. Due to this, they are being sued for a ridiculous 72 trillion dollars. It shows that the law doesn't always work perfectly. Conclusion These three lawful acts all help keep the cyber world safe and justified. They are all bound by their own rules and help make technology easier for all kinds of people, including the community itself. And other than the three acts mentioned, there are also acts such as health and safety at work and health and safety regulations. These acts account towards the safety and health of workers. They account for what employees work with, the risk and formulate an ethical/moral response to their work from that. If a certain technology has the risk of giving cancer or producing radiation, then that has to be accounted and employees have to be given fair treatment. ?? ?? ?? ?? Name: Sadian Choudhury Candidate number: 7027 Leytonstone School 13411 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Marked by a teacher

    Ict and the law

    4 star(s)

    The information must be kept secure and confidential, for instance it cannot be stored on the notice board and cannot be shown to anyone who doesn't need to see it, and it cannot be sold to anyone. The data must be accurate and correct, such as it cannot say I live next door to my real house.

  2. Assets table - recording the copyright information on the logos and pictures I used.

    The purpose of it is because it was a perfect sized picture of fruit that I was able to use on my information point. Information point My logo Flash video P N/A A flash video that I have created for this project and used as my logo The design of

  1. ICT LAWS

    Contradicts freedom of information act 2000 Copy Right Law: The copyright act was introduced in 1989 and now makes it illegal to copy a file without permission from the owner or the copyright holder. If this law is broken, there is an unlimited fine.

  2. The impact of ICT on the environment

    so that can be used to purchase resources, and if the company that they are working for want their employees to have the most recent hardware and software and also an internet connection they should provide them with extra money to help with the expenses.

  1. The Data Protection Act 1998 - questions and answers

    has been made public as a result of steps taken by the individual. Remember that only one of the additional conditions must be met. If none of these additional conditions can be met then the processing of sensitive personal data is unlawful.

  2. Data Protection Act

    as to;- - the racial or ethnic origin of the data subject - his political opinions - whether he is member of trade union At least one of the following conditions must be satisfied in addition to at least one of the conditions for processing in Schedule 2 (which apply to the processing of all personal data)

  1. Car Safety

    Although safety belts cannot stop forward movement completely, new technology designed as part of the vehicle's frontal impact protection system can further improve their effectiveness at restraining occupants. * Webbing clamps grab the safety belt webbing to prevent more of the safety belt reeling out as it tightens on the spool in a crash.

  2. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    Evaluation: These Data protection act affect me as if I do online shopping, I usually have to enter the credit and debit card details so if for example the company saves the details for longer then necessary it may be end up stolen or get corrupted.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work