• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The purpose of legislation is to control and regulate the use of ICT

Extracts from this document...


Legislation of ICT The purpose of legislation is to control and regulate the use of ICT. Different acts in result in different benefits to the end user or other people affected by the technology. Use of computer systems can be intrusive and can lead to the loss of privacy to the individual. I will show below how legislation can protect against this intrusion. There many other problems and opportunities that are presented by the use of ICT. Legislation protects people and ensures that there is no abuse by others to those investing in the technology. -Data protection act in 1998 - The Data Protection Act now covers certain types of manual records (like health records) as well as electronic records. -The Data Protection Act that was made in 1998 -Basically the data protection act is so that the wrong people don't get hold of your work that you do not want them to see. -Computer misuse act in 1990 The Computer Misuse Act 1990 is there to stop the problem of people hacking into computer systems. In the early days of hacking the problem wasn't taken very seriously, people were just mucking around, rather than as something, which could cause serious loss or problems to companies, organisations and others. With new things in technologies the issue has become more serious and legislation was introduced stop these three things: 1. ...read more.


* Safe passageways, e.g. preventing slipping and tripping hazards -The Internet code of practise People have invented this so then people can use codes on their Internet so then other people cannot hack into their system via the Internet. This is very useful to businessmen and companies that have personal and private files that they want to hide from other people that are trying to hack into their system, and are trying to find out important things, or are just trying to be annoying! -Regulation of investigatory powers in 2000 There are a lot of drawbacks of ICT. The drawbacks of ICT are as follows: Firstly there is International fraud Secondly there is Misuse of personal information Then last but not least spam, which is junk mail These are all illegal offences but cannot be stopped by these people who are making a nuisance and money out of this. Most of them think that it is a laugh and a joke but they don't realise how serious it really is. For example, this person who will stay anonymous, but he lived in Wales, but he was all over the news a couple of years ago. Well anyway he sent lots of junk mail to people and has hacked a lot of people's computers and has got a jail sentence for 5 years. -Copyright and other intellectual property The Copyright, Design and Patents Act 1988 are applicable to various types of creations, including databases, text, graphics and sounds by an author or an artist. ...read more.


The Acts make unfair discrimination a civil offence, and in certain other circumstances the law is supported by criminal sanctions. It is also a criminal offence to incite racial hatred under the Public Order Act 1986. Harassment of a person is an offence under the Protection from Harassment Act that was decided in 1997 and the Crime and Disorder Act in 1998. -Criminal Law If you want to commit a crime it is a criminal offence in itself to think like that, whether a crime has actually been committed or not. This includes the provision of information via computerised services, which facilitates any of the activities that this code has highlighted as criminal offences. -Terrorism Act in 2000 An attack on any electronic systems can be classed as an act of terrorism as well as a criminal office. What constitutes an attack within the scope of the Act includes hacking Webster or blocking Webster, with a political agenda or public intimidation in mind. -International Law and the Internet There is no international convention on Internet regulation; caution is necessary in considering what law may be applicable. As a basic rule, computing services must note that although certain materials may be considered legal in their places of origin, which does not prevent the application of UK law if those materials are considered to be illegal under the law in this country. Similarly, material transmitted in the world today may be subject to the laws of whichever country it is viewed in. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    copied and she and the person who sold it to her could be in trouble.

  2. The Data Protection Act 1998 - questions and answers

    The way in which the shopkeeper will require to control access to the information will depend on its nature. If all that is stored is names, addresses and account details, it may be sufficient that the computer is kept securely in the premises and that they are lockfast.

  1. Car Safety

    However within the range of a single model of vehicle, the addition of these items will increase the level of protection over the base model. Air bags An air bag is a supplementary restraint that works in combination with a safety belt to protect an occupant in a frontal crash.

  2. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    It gives an incentive for organisations to maintain strict security procedures in fear of breaking the Data Protection Act and facing charges. Misuse of facilities With people's jobs involving access to databases and such, people have the ability to go through personal information.

  1. 3E-The legislation that protects individuals and groups from the misuse of ICT

    the organisation that has given out my personal information and are using the information for different purposes without my very own intelligence can be sued for carrying out this particular act. In order to abide by the law, I must agree on the condition stated such as my personal information

  2. Data Protection Act

    subject to the processing which in turn any may remove the basis for processing which was being relied upon by the data controller. 1.1.4 Paragraph 2 and 3 - information to be provided to data subjects Paragraph 2 and 3 provide that personal data are not to be treated as processed fairly.

  1. Critically evaluate the extent to which it can be said that copyright law gives ...

    One thing that we can say is that copyright law does not offer complete protection to every piece of contemporary art. This is a fact that will always remain the same. If we consider factors such as originality, the intention of the creator, whether it will be appreciated by the

  2. Is the UK copyright act of 1988 still an adequate means of protecting intellectual ...

    So far, there has been only one dispute arising from inlining. It involved the comic strip `Dilbert' and has settled out of court with removal of the materials involved (2). Framing Introduced in 1996 by Netscape Communications Corporation as a feature of their web browser, the <FRAME> tag allows the viewer screen to split into multiple scrollable sections (`frames')

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work