• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The purpose of legislation is to control and regulate the use of ICT

Extracts from this document...


Legislation of ICT The purpose of legislation is to control and regulate the use of ICT. Different acts in result in different benefits to the end user or other people affected by the technology. Use of computer systems can be intrusive and can lead to the loss of privacy to the individual. I will show below how legislation can protect against this intrusion. There many other problems and opportunities that are presented by the use of ICT. Legislation protects people and ensures that there is no abuse by others to those investing in the technology. -Data protection act in 1998 - The Data Protection Act now covers certain types of manual records (like health records) as well as electronic records. -The Data Protection Act that was made in 1998 -Basically the data protection act is so that the wrong people don't get hold of your work that you do not want them to see. -Computer misuse act in 1990 The Computer Misuse Act 1990 is there to stop the problem of people hacking into computer systems. In the early days of hacking the problem wasn't taken very seriously, people were just mucking around, rather than as something, which could cause serious loss or problems to companies, organisations and others. With new things in technologies the issue has become more serious and legislation was introduced stop these three things: 1. ...read more.


* Safe passageways, e.g. preventing slipping and tripping hazards -The Internet code of practise People have invented this so then people can use codes on their Internet so then other people cannot hack into their system via the Internet. This is very useful to businessmen and companies that have personal and private files that they want to hide from other people that are trying to hack into their system, and are trying to find out important things, or are just trying to be annoying! -Regulation of investigatory powers in 2000 There are a lot of drawbacks of ICT. The drawbacks of ICT are as follows: Firstly there is International fraud Secondly there is Misuse of personal information Then last but not least spam, which is junk mail These are all illegal offences but cannot be stopped by these people who are making a nuisance and money out of this. Most of them think that it is a laugh and a joke but they don't realise how serious it really is. For example, this person who will stay anonymous, but he lived in Wales, but he was all over the news a couple of years ago. Well anyway he sent lots of junk mail to people and has hacked a lot of people's computers and has got a jail sentence for 5 years. -Copyright and other intellectual property The Copyright, Design and Patents Act 1988 are applicable to various types of creations, including databases, text, graphics and sounds by an author or an artist. ...read more.


The Acts make unfair discrimination a civil offence, and in certain other circumstances the law is supported by criminal sanctions. It is also a criminal offence to incite racial hatred under the Public Order Act 1986. Harassment of a person is an offence under the Protection from Harassment Act that was decided in 1997 and the Crime and Disorder Act in 1998. -Criminal Law If you want to commit a crime it is a criminal offence in itself to think like that, whether a crime has actually been committed or not. This includes the provision of information via computerised services, which facilitates any of the activities that this code has highlighted as criminal offences. -Terrorism Act in 2000 An attack on any electronic systems can be classed as an act of terrorism as well as a criminal office. What constitutes an attack within the scope of the Act includes hacking Webster or blocking Webster, with a political agenda or public intimidation in mind. -International Law and the Internet There is no international convention on Internet regulation; caution is necessary in considering what law may be applicable. As a basic rule, computing services must note that although certain materials may be considered legal in their places of origin, which does not prevent the application of UK law if those materials are considered to be illegal under the law in this country. Similarly, material transmitted in the world today may be subject to the laws of whichever country it is viewed in. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. The impact of ICT on the environment

    Issues that organisations such as greenpeace protest about are usually hugely controversial and there are many point for and against them. When I visited the greenpeace website they were trying to raise awareness about the ship sailing through the Irish sea using plutonium.

  2. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    copied and she and the person who sold it to her could be in trouble.

  1. Data Protection Act

    If personal data have been recorded because of a relationship between the data controller and the data subject the need to keep the information should be considered when the relationship ceases to exist. The act provides that personal data processed only for historical, statistical or research purposes in compliance with

  2. The Data Protection Act 1998 - questions and answers

    Where, however, the data were held by a newsagent or milk roundsman and indicated when his customers were to be on holiday, a greater degree of security might be necessary. In any event, the shopkeeper would require to ensure that such of his staff as had access to the data understood the necessity of retaining its confidentiality.

  1. 3E-The legislation that protects individuals and groups from the misuse of ICT

    shall be used in emergency events and will be kept in accordance to the act. Doing this means that I will abide by the law by enabling access of my personal information by a member of staff working at the school for only emergency cases, in accordance to the act

  2. Privacy and Data Protection: IT Law

    Contractual Protection Contractual protection is suitable only for some forms of data transfer (for example personnel records). The EU has finalised a set of model contractual clauses. By incorporating such clauses, personal data can flow from Member States to Non Member States.

  1. The legislation that protects individuals and groups from the misuse of ICT

    To improve the overall impact and effect of the Data protection act there is a need for tighter protocols to be introduced and for easier ways of tracking that criminal offences have been committed. A way that the impact could be improved is through a means of logging data movement,

  2. Assets table - recording the copyright information on the logos and pictures I used.

    Information point, swap advert 6 podcasts Sound file P N/A I have put sound files of all of the words on my E-portfolio next to the paragraph that is being spoken about. The only changes I have made to my podcasts where the shortening and the missing out of some

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work