• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The main purposes of legislation covering working with and using ICT.

Extracts from this document...


The main purposes of legislation covering working with and using ICT This assignment will cover the main purposes of legislation that is involved with ICT and the advantages and disadvantages of the laws covering and ICT. The Data Protection Act The first Data Protection Act was introduced in 1984. A new Data Protection Act that changed the law to meet the requirements of the European Union replaced this in 1998. The Data Protection Act gives rights to individuals about whom information is stored. Individuals may find out information about themselves, challenge it and claim compensation in certain circumstances. It is the act that enables them to do this. The Act places legal requirements on those who store and use personal data. They must let everyone know about their use of data and follow the data protection principles. These eight principals consist of: - 1. Be obtained and processed fairly and lawfully 2. Be held and processed only for the lawful purposes described in the register entry 3. ...read more.


* A general description of the security measures taken to protect the data. An applicant who only keeps paper records doesn't have to apply to the commissioner but still must abide by the rules of the commission. This law has several huge limitations. * It is difficult to find out who is holding data about you. * The act itself has several exemptions in extreme circumstances, for example, if a court orders the information to be disclosed. Companies definitely have an obligation to protect their customer's privacy and if this does not happen, I believe that customers deserve some sort of compensation. I am spammed by companies that I have never had any contact with before and it is very irritating, so much so, that I have downloaded a piece of software to filter spam e-mails. Another intrusion on my privacy is the text messages that I get form companies asking me to enter competitions and pay an extortionate amount of money. This is very annoying and occasionally companies charge you to send you messages advertising the competitions to start with. ...read more.


Breaking the Act is severely punished by imprisonment and a large fine and the payment of damages to the company involved. This act essentially attempts to stop companies loosing money through illegal software selling. Whilst this is a good law in theory, in practice it is quite different. The Internet has become a medium for exchanging software illegally because it is much faster and more difficult to be caught. With the introduction of broadband Internet services software trading has become very rife. It is easy for somebody to upload a program onto the Internet and within minutes other computer users around the world can be downloading it. Companies such as Microsoft are now asking customers to register their operating systems to prevent them being passed on to other people. I think that this is a good thing because if people are able to illegally download a piece of software without any repercussions from the law, while other people have to pay for it just creates a negative multiplier effect with more and more people refusing to pay for their software and downloading it illicitly. Matt Bull 10K ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Data Protection Act

    who will responsible for promoting good practice amongst all requirements. The public can apply to the Information Commissioner of public authority's decisions if they are unhappy the way they handled the information under the Freedom of Information. Until this comes into force the Government departments and agencies are working to

  2. The Data Protection Act 1998 - questions and answers

    The list of names and addresses constitutes personal data. In terms of the 1998 Act it is likely that the shopkeeper would require to register even if he did not keep the information on a computer as, unless all the information were stored randomly in a shoe box, it would form part of a relevant filing system.

  1. The legislation that protects individuals and groups from the misuse of ICT

    whilst at work, there are certain protocols in place in the event of a breaking of the law, so anybody would think that employees can go to work and know that they will be able to go home and have no problems what so ever, however this is not the

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    using or changing his personal data for a range of different purposes. In this case another advantage linked to the previous advantage is, according to this specific law; if the organisation misuse or makes changes in his data, Mr Obrien can take quick action on the organisation or individuals who

  1. Privacy and Data Protection: IT Law

    Self-Regulation Self-regulation can take the form of seal programs such as Trustee. It can also lead to Industry Guidelines or Professional Monitoring Organisations other than seal programs. Also safe harbors, discussed in detail below, are based on self-regulation. All different kinds of self-regulation mechanisms are widely spread in the US.

  2. The impact of ICT on the environment

    In the future you could carry credit card sized imprints of your whole genetic code. One ethical issue surrounding the use of ICT in health and medicine is the development of cloning. Computers have helped scientists in the cloning process by mapping the DNA.

  1. Legal Aspects of Using Information Technology

    Regulations 1992 Data Protection Act 1984 The Data Protection Act 1984 aims to help protect the privacy of individuals, by regulating and controlling the processing of the personal data. The first Act became law in 1984, but this was replaced by the 1998 Act, that also incorporates the European Commission Directive.

  2. Computer Legislation.

    against computer crime and it is an Act to make provision for securing computer material against unauthorised access or modification; and for connected purposes. The Act identifies three specific offences as shown below: * (Section 1)Accessing to computer material without unauthorised.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work