• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The main purposes of legislation covering working with and using ICT.

Extracts from this document...

Introduction

The main purposes of legislation covering working with and using ICT This assignment will cover the main purposes of legislation that is involved with ICT and the advantages and disadvantages of the laws covering and ICT. The Data Protection Act The first Data Protection Act was introduced in 1984. A new Data Protection Act that changed the law to meet the requirements of the European Union replaced this in 1998. The Data Protection Act gives rights to individuals about whom information is stored. Individuals may find out information about themselves, challenge it and claim compensation in certain circumstances. It is the act that enables them to do this. The Act places legal requirements on those who store and use personal data. They must let everyone know about their use of data and follow the data protection principles. These eight principals consist of: - 1. Be obtained and processed fairly and lawfully 2. Be held and processed only for the lawful purposes described in the register entry 3. ...read more.

Middle

* A general description of the security measures taken to protect the data. An applicant who only keeps paper records doesn't have to apply to the commissioner but still must abide by the rules of the commission. This law has several huge limitations. * It is difficult to find out who is holding data about you. * The act itself has several exemptions in extreme circumstances, for example, if a court orders the information to be disclosed. Companies definitely have an obligation to protect their customer's privacy and if this does not happen, I believe that customers deserve some sort of compensation. I am spammed by companies that I have never had any contact with before and it is very irritating, so much so, that I have downloaded a piece of software to filter spam e-mails. Another intrusion on my privacy is the text messages that I get form companies asking me to enter competitions and pay an extortionate amount of money. This is very annoying and occasionally companies charge you to send you messages advertising the competitions to start with. ...read more.

Conclusion

Breaking the Act is severely punished by imprisonment and a large fine and the payment of damages to the company involved. This act essentially attempts to stop companies loosing money through illegal software selling. Whilst this is a good law in theory, in practice it is quite different. The Internet has become a medium for exchanging software illegally because it is much faster and more difficult to be caught. With the introduction of broadband Internet services software trading has become very rife. It is easy for somebody to upload a program onto the Internet and within minutes other computer users around the world can be downloading it. Companies such as Microsoft are now asking customers to register their operating systems to prevent them being passed on to other people. I think that this is a good thing because if people are able to illegally download a piece of software without any repercussions from the law, while other people have to pay for it just creates a negative multiplier effect with more and more people refusing to pay for their software and downloading it illicitly. Matt Bull 10K ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. The Data Protection Act 1998 - questions and answers

    The list of names and addresses constitutes personal data. In terms of the 1998 Act it is likely that the shopkeeper would require to register even if he did not keep the information on a computer as, unless all the information were stored randomly in a shoe box, it would form part of a relevant filing system.

  2. Data Protection Act

    who will responsible for promoting good practice amongst all requirements. The public can apply to the Information Commissioner of public authority's decisions if they are unhappy the way they handled the information under the Freedom of Information. Until this comes into force the Government departments and agencies are working to

  1. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    Without the risk of facing the charges of breaking the act, these fraudulent criminal acts would be much more common. The Data Protection Act is there to give a warning to people on what is allowed and what is breaking other people's rights to their data.

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    use of others without he's individual permission and which ensures that he's data is not being used for a range of purpose which could cause problems for him i.e. increase in income tax. Conversely, to investigate this matter in depth, Mr.

  1. The legislation that protects individuals and groups from the misuse of ICT

    Because the impact that the law is having upon Mr. Clements, there is not much that could be improved to increase the overall impact. Copyright, Designs and Patent Act 1988 The copyright and patents act makes it a criminal offence to copy or steal software, images and other such things.

  2. Right of privacy under Hong Kong's current laws

    A journalist will face criminal charge(s) if s/he improbably collects or uses one's personal data. The cases Eastweek v. Privacy Commissioner11 and undercover agent case12 has shed some light on the use of DDP: allowing journalists to take photographs of unidentified people, and disallowing them to publish details of undercover agent.

  1. The Legislation that protects individuals and groups from the misuse of ICT

    The Data Protection Act also gives the data subjects the assurance to give out their personal data to either the hospital and/or Dr. Kumar since they know that they can request to see their data held on them from the hospital anytime.

  2. You have to explain how you have looked after the equipment and ensured its ...

    software or any manuals, which come with it, without permission or a licence from the copyright owner, who is normally the software designer. It is also an offence to run purchased software covered by copyright on two or more machines at the same time, unless the licence specifically allows it.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work