• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The legislations that protects individuals and groups from the misuse of ICT

Extracts from this document...


The legislations that protects individuals and groups from the misuse of ICT Legislation means the laws that are passed by parliament. Over the years many things have changed and as thins change new laws are created to prevent misuse. Computers have been developed and have become very popular and as the use of computers increases the amount of information stored in them will also increase i.e. bank details, credit card information, personal information and such. This information can be obtained and can cause harm to individuals and for this reason the following laws have been introduced to prevent this from happening: The Data Protection Act (1998) The data protection act was established in 1998 and has 8 principles: 1. processed fairly and lawfully 2. used for the lawful purpose it was collected for 3. adequate and relevant to purpose collected for 4. kept accurate and up-to-date 5. kept no longer than necessary 6. processed within the rights of the data subjects 7. kept secure 8. kept only within the EEC. ...read more.


A contractual agreement with a person is needed 2. The individual involved as given permission for the data to be held 3. It is necessary under another law 4. It is in a businesses interests and is not detrimental to any individual involved 5. Protect persons interests. The Computer Misuse Act (1990) This act was established in the year 1990 and there are 3 main offences covered by this act 1. Unauthorized access to computer material (hacking). This includes copying software illegally (called software piracy). 2. Gaining unauthorized access to a computer to carry out serious crimes like fraud or blackmail. 3. Unauthorized changing of computer files, including planting viruses and deleting files. If any of these acts are performed unintentionally then no harm will be done to the defendant as long as they are proved innocent by their legal representative. If anyone is convicted of this act then they will face an unlimited fine or five years in prison. The advantage of this act is that it protects our private files containing valuable information and prevents other people from accessing them. ...read more.


The law ensures the following: 1. workstations are analysed to reduce health and safety risks 2. ensure workstations meet minimum ergonomic requirements 3. provide information about risks and measures 4. plan daily work routine for users 5. offer eye tests and special glasses if necessary 6. Provide health and safety training. The advantage of this Act is that it protects the employee from any harm that is caused by his/ her workplace. It gives them a right to speak for their required needs. The disadvantage is that some workplaces cannot meet the employees need due to the company's budget. Also some business's blackmail the employee and tell them not to complain about the workplace situations otherwise the business will encounter a loss. The law has made a change to the community and that is the most important thing. Overall I think that these law's have made a change to society and have taught individuals to respect technology and not to misuse it. There are some people who are breaking these law's but hopefully these people will be locked up behind bars very soon. ?? ?? ?? ?? Farhana Rahman Unit 3e (ICT and legislation) - 1 - ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. The Data Protection Act 1998 - questions and answers

    The safe course, for commercial organisations must be to register under the Act. My company is a multi-national, with branches throughout the world. Data is collected and sorted in each of our regional branch offices before being sent to Head Office for central storage and evaluation before being the subject of co-ordinated international marketing efforts.

  2. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    and transfers her videos or coursework's without her wanting to she would also be able to deal with the issue because of the act or even if someone tries to share her personal stuff such as pictures or videos without asking for permission she could also deal with the issue.

  1. Legal Aspects of Using Information Technology

    I have gone onto the Internet and have found some information on how to use the e-mail in an appropriate way in the organisation. A copy of the E-mail Usage Guideline is in the Appendix section. Laws to consider when using the e-mail There are two main laws that IKEA

  2. Data Protection Act

    The Data Protection Act 1998 will continue to provide access to information held about you as individuals. 1.2.1 What is a publication scheme? This is a guide to the information which the authority is committed itself to publishing. The authority must publish with, and from time to time review, its scheme.

  1. Laws and Legislations (ICT)

    Improvements that can be made This legislation could be improved by sentencing a persecutor to jail depending on the offense committed and the after effects of it. Also criminals found guiltily could be totally band from touching computers. Summary The individual user is protected quite well though in many cases

  2. Car Safety

    It is preferable that three-point lap and shoulder safety belts are installed in every seating position in a vehicle, although this is not always possible in the centre rear seat of some cars. While two-point lap safety belts are much better than wearing no restraint, they do not provide the same protection as three-point safety belts.

  1. Is the UK copyright act of 1988 still an adequate means of protecting intellectual ...

    Similarly the system would again raise grey areas of what data should be encrypted and what should be available to the general public. * Electronic Copyright Management Systems (ECMS) One proposed method is employing electronic copyright management system (4). Such a system is seen as being more preferable to encryption

  2. Assets table - recording the copyright information on the logos and pictures I used.

    This was chosen because it was a good sized fair trade product. Swap advert Two brothers next to each other with a smile and someone with clean water with a smile on their face. image s N/A Two happy African boys I have cropped the image and made it bigger

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work