• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The legislations that protects individuals and groups from the misuse of ICT

Extracts from this document...

Introduction

The legislations that protects individuals and groups from the misuse of ICT Legislation means the laws that are passed by parliament. Over the years many things have changed and as thins change new laws are created to prevent misuse. Computers have been developed and have become very popular and as the use of computers increases the amount of information stored in them will also increase i.e. bank details, credit card information, personal information and such. This information can be obtained and can cause harm to individuals and for this reason the following laws have been introduced to prevent this from happening: The Data Protection Act (1998) The data protection act was established in 1998 and has 8 principles: 1. processed fairly and lawfully 2. used for the lawful purpose it was collected for 3. adequate and relevant to purpose collected for 4. kept accurate and up-to-date 5. kept no longer than necessary 6. processed within the rights of the data subjects 7. kept secure 8. kept only within the EEC. ...read more.

Middle

A contractual agreement with a person is needed 2. The individual involved as given permission for the data to be held 3. It is necessary under another law 4. It is in a businesses interests and is not detrimental to any individual involved 5. Protect persons interests. The Computer Misuse Act (1990) This act was established in the year 1990 and there are 3 main offences covered by this act 1. Unauthorized access to computer material (hacking). This includes copying software illegally (called software piracy). 2. Gaining unauthorized access to a computer to carry out serious crimes like fraud or blackmail. 3. Unauthorized changing of computer files, including planting viruses and deleting files. If any of these acts are performed unintentionally then no harm will be done to the defendant as long as they are proved innocent by their legal representative. If anyone is convicted of this act then they will face an unlimited fine or five years in prison. The advantage of this act is that it protects our private files containing valuable information and prevents other people from accessing them. ...read more.

Conclusion

The law ensures the following: 1. workstations are analysed to reduce health and safety risks 2. ensure workstations meet minimum ergonomic requirements 3. provide information about risks and measures 4. plan daily work routine for users 5. offer eye tests and special glasses if necessary 6. Provide health and safety training. The advantage of this Act is that it protects the employee from any harm that is caused by his/ her workplace. It gives them a right to speak for their required needs. The disadvantage is that some workplaces cannot meet the employees need due to the company's budget. Also some business's blackmail the employee and tell them not to complain about the workplace situations otherwise the business will encounter a loss. The law has made a change to the community and that is the most important thing. Overall I think that these law's have made a change to society and have taught individuals to respect technology and not to misuse it. There are some people who are breaking these law's but hopefully these people will be locked up behind bars very soon. ?? ?? ?? ?? Farhana Rahman Unit 3e (ICT and legislation) - 1 - ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    If someone tries to send her viruses and destroys her computer it would of course also affect her as someone will have destroyed her computer using viruses which he legally is not allowed to do. If someone tries to do anything from these acts and doesn't follow them he could get in serious trouble as mentioned above.

  2. Data Protection Act

    They may be able to withhold information because an exemption in the Act applies. In most cases exemptions the authority will have to go on to consider the public interest in disclosure.6 1.3 Question 3: Privacy and Electronic Communication Regulation 2003 (EC Directives)

  1. The Data Protection Act 1998 - questions and answers

    The safe course, for commercial organisations must be to register under the Act. My company is a multi-national, with branches throughout the world. Data is collected and sorted in each of our regional branch offices before being sent to Head Office for central storage and evaluation before being the subject of co-ordinated international marketing efforts.

  2. The legislation that protects individuals and groups from the misuse of ICT

    Clients are given the right to access all information that is stored about them and it can be changed if there are any mistakes. The data protection act gives a statutory responsibility to Mr. Clements for the storing of clients information, this means that the clients should have the assurance

  1. 3E-The legislation that protects individuals and groups from the misuse of ICT

    to register the data to ensure that other individuals are unable to access and use the data illegally. Some of these organisations include hospitals; the organisation initially keeps numerous of data on patients that are registered with the hospital. All organisations must state the personal data they have, what the

  2. Privacy and Data Protection: IT Law

    Some states have passed privacy laws similar to European standards, for example Minnesota enacted a bill requiring Internet Service Providers to obtain user authorisation before using personal information for secondary purposes and North Dakota established opt-in protections for financial information.53 6.)

  1. Assets table - recording the copyright information on the logos and pictures I used.

    image S N/A A picture of fair deals (word) Photo shopped image merged with another this is to make an image mine and to avoid some copy rites issues that may occur. I have cropped the image and made it bigger this is to make it more visible for the target audience and to get rid of the irrelevant text.

  2. ICT LEGISLATIONS

    The penalty for this is up to five years of imprisonment and an unlimited amount of fine. If someone in the school deliberately spread a virus or damaged a piece of the computer the school suspend or may be even expel the pupil and make the pupils parents pay for the damages.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work