• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  • Level: GCSE
  • Subject: ICT
  • Word count: 6079

The Legislation That Protects Individuals and Groups using IT. Use of It by myself and an adult in employment.

Extracts from this document...


3E - The Legislation That Protects Individuals and Groups from Computer Misuse of ICT In the final piece of unit 3, I will be investigating the laws and legislations which protect and affect the people through the ICT they use from units 3A to 3D. These legislations all aim to aid the public and aim to locate people breaking the legislation. They essentially moderate the use of technology to make sure they follow certain rules. They prevent exploitation of technology. The laws/legislative acts I will be talking about in this case are the Data Protection Act of 1998, the Computer Misuse Act of 1990 and the Copyright, Design and Patents Act of 1988. Data Protection Act 1998 What is it? The Data Protection Act is essentially a legislative act that aims to keep data regarding citizens of the country private and out of the hands of 3rd parties. This law is a 'United Kingdom Act of Parliament', meaning it was made in the UK and only affects citizens of the UK. It gives people a protection of their personal data, preventing a breach of human rights and promoting and enforcing freedom, freedom being the act of allowing citizens to keep their personal information in the hands of only those consented to. The UK government-using this act-aim in keeping data of customers, members, or other such relations to an organisation only within that organisation. This means that companies outside the organisation which aim to use this information for other reasons are not permitted to do so and this is inspected and punished in accordance to the Data Protection Act 1998. It abides by every UK citizen's fundamental right and right to privacy in respect to the processing of personal data. Individuals are given the ability to control information about them. In terms of technology, the data protection act gives the right to people who have personal information stored about them by any organisation(s). ...read more.


The victim would essentially be at the mercy of the hacker. Not just key logging but hackers can also access important files of their victim. This makes hackers very dangerous. They also often work to send viruses to people's computers. This is why the Computer Misuse Act was set up. The growth of technology also meant the growth of hacking and the malicious use of technology. With this act in place, hackers could face up-to 5 years in prison and an unlimited fine. Hacking is essentially trespassing into another's property but its potential misuse can be extremely high, hence such extreme charges. Brief history of the Computer Misuse Act The law was coined up after the case of Robert Schifreen and Stephen Gold in 1984-1985.They gained access to the account of a BT engineer, giving them the ability to explore the whole system and even access the personal message box of Prince Philip. With current laws, they would have been charged and fined quite a lot, but the current laws did not condemn what they had done. This is when Parliament made the decision to make new laws regarding hacking and thus, the Computer Misuse Act formed. What does it consist of? The Computer Misuse Act essentially makes the following things illegal: * Hacking - unauthorized people gaining access to computer networks * Data Misuse and unauthorized transfer or copying - file sharing * Copying and distributing software, music and film - Including copying CD's on your computer and sharing them on the internet * Email and chat room abuses - Impersonation and deception or spreading malicious rumours * Pornography - any material showing illegal acts stored on computers * Identity and financial abuses - Identity theft and misuse of credit cards and even printing counterfeit money * Viruses - programming and deliberately spreading viruses (Taken from pass-ict.co.uk) Some of these offences are also covered by the Copyright, Design and Patents Act. ...read more.


This stops money being essentially stolen from Sarah whose sales would have been bad due to the ease of downloads. 3D - Technology used by a community Library Libraries use copyright to allow them to distribute author's books to the public. Each free loan gets the government to give the author money so libraries are encouraged as the community are using books for free and the authors are getting credit and being paid for their work. Evaluation While this act is quite useful in stopping companies going bankrupt, it's still being broken on a day-to-day basis. Piracy has become so world-wide and common that it's incredibly hard to stop it altogether. Sometimes, the act is also unjustified in what it does. For example, while Limewire did allow people to download a lot of music for free, it was provided by Limewire peers meaning Limewire users themselves were the ones who spread the copyrighted media. The owners of Limewire are made to take the blame for all the apparent loss the copyrighted creators have accumulated. This, however, is entirely subjective as it doesn't mean that every download would have equated a purchase. Due to this, they are being sued for a ridiculous 72 trillion dollars. It shows that the law doesn't always work perfectly. Conclusion These three lawful acts all help keep the cyber world safe and justified. They are all bound by their own rules and help make technology easier for all kinds of people, including the community itself. And other than the three acts mentioned, there are also acts such as health and safety at work and health and safety regulations. These acts account towards the safety and health of workers. They account for what employees work with, the risk and formulate an ethical/moral response to their work from that. If a certain technology has the risk of giving cancer or producing radiation, then that has to be accounted and employees have to be given fair treatment. ?? ?? ?? ?? Name: Sadian Choudhury Candidate number: 7027 Leytonstone School 13411 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Marked by a teacher

    Ict and the law

    4 star(s)

    It means that the data they hold must abide to the 8 principles of the act. Both men also have information stored like I do; this means they have the same rights as me. The CMA helps to protect my user areas at home and school.

  2. Peer reviewed

    The Main Features and Difficulties Regarding the Regulation of E-Commerce

    4 star(s)

    That is because the transactions made from EU will not only affect its' Member States but also the third countries including the US. Therefore, the directive which has been influenced by the OECD guidelines is one of the first pieces of legislation to be introduced with the intention of controlling the use of data in the information age.

  1. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    Evaluation: These Data protection act affect me as if I do online shopping, I usually have to enter the credit and debit card details so if for example the company saves the details for longer then necessary it may be end up stolen or get corrupted.

  2. Data Protection Act

    as to;- - the racial or ethnic origin of the data subject - his political opinions - whether he is member of trade union At least one of the following conditions must be satisfied in addition to at least one of the conditions for processing in Schedule 2 (which apply to the processing of all personal data)

  1. The Data Protection Act 1998 - questions and answers

    has been made public as a result of steps taken by the individual. Remember that only one of the additional conditions must be met. If none of these additional conditions can be met then the processing of sensitive personal data is unlawful.

  2. The legislation that protects individuals and groups from the misuse of ICT

    that their information is kept secure, the law means that any breach if the law would either result in hefty fines or imprisonment, however the extent that individuals or holders of information are protect is often limited, even with the law in place it is often difficult for somebody to

  1. 3E-The legislation that protects individuals and groups from the misuse of ICT

    data is going to be used for and who the data may effect or relate to. Under the Data Protection Act, if an individual was to face changes or deletion of data which relates to that specific person, the person can sue the company under the act and which can be a relatively serious matter.

  2. Leaflet design for Finding Nemo.

    I also searched for 'Finding Nemo' to get information on the film. This time I didn't click on images, as I just wanted information and just pictures. The result is it comes with a list of websites and not images.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work