• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The purpose of legislation is to control and regulate the use of ICT

Extracts from this document...

Introduction

Legislation of ICT The purpose of legislation is to control and regulate the use of ICT. Different acts in result in different benefits to the end user or other people affected by the technology. Use of computer systems can be intrusive and can lead to the loss of privacy to the individual. I will show below how legislation can protect against this intrusion. There many other problems and opportunities that are presented by the use of ICT. Legislation protects people and ensures that there is no abuse by others to those investing in the technology. -Data protection act in 1998 - The Data Protection Act now covers certain types of manual records (like health records) as well as electronic records. -The Data Protection Act that was made in 1998 -Basically the data protection act is so that the wrong people don't get hold of your work that you do not want them to see. -Computer misuse act in 1990 The Computer Misuse Act 1990 is there to stop the problem of people hacking into computer systems. In the early days of hacking the problem wasn't taken very seriously, people were just mucking around, rather than as something, which could cause serious loss or problems to companies, organisations and others. With new things in technologies the issue has become more serious and legislation was introduced stop these three things: 1. ...read more.

Middle

* Safe passageways, e.g. preventing slipping and tripping hazards -The Internet code of practise People have invented this so then people can use codes on their Internet so then other people cannot hack into their system via the Internet. This is very useful to businessmen and companies that have personal and private files that they want to hide from other people that are trying to hack into their system, and are trying to find out important things, or are just trying to be annoying! -Regulation of investigatory powers in 2000 There are a lot of drawbacks of ICT. The drawbacks of ICT are as follows: Firstly there is International fraud Secondly there is Misuse of personal information Then last but not least spam, which is junk mail These are all illegal offences but cannot be stopped by these people who are making a nuisance and money out of this. Most of them think that it is a laugh and a joke but they don't realise how serious it really is. For example, this person who will stay anonymous, but he lived in Wales, but he was all over the news a couple of years ago. Well anyway he sent lots of junk mail to people and has hacked a lot of people's computers and has got a jail sentence for 5 years. -Copyright and other intellectual property The Copyright, Design and Patents Act 1988 are applicable to various types of creations, including databases, text, graphics and sounds by an author or an artist. ...read more.

Conclusion

The Acts make unfair discrimination a civil offence, and in certain other circumstances the law is supported by criminal sanctions. It is also a criminal offence to incite racial hatred under the Public Order Act 1986. Harassment of a person is an offence under the Protection from Harassment Act that was decided in 1997 and the Crime and Disorder Act in 1998. -Criminal Law If you want to commit a crime it is a criminal offence in itself to think like that, whether a crime has actually been committed or not. This includes the provision of information via computerised services, which facilitates any of the activities that this code has highlighted as criminal offences. -Terrorism Act in 2000 An attack on any electronic systems can be classed as an act of terrorism as well as a criminal office. What constitutes an attack within the scope of the Act includes hacking Webster or blocking Webster, with a political agenda or public intimidation in mind. -International Law and the Internet There is no international convention on Internet regulation; caution is necessary in considering what law may be applicable. As a basic rule, computing services must note that although certain materials may be considered legal in their places of origin, which does not prevent the application of UK law if those materials are considered to be illegal under the law in this country. Similarly, material transmitted in the world today may be subject to the laws of whichever country it is viewed in. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. The impact of ICT on the environment

    Issues that organisations such as greenpeace protest about are usually hugely controversial and there are many point for and against them. When I visited the greenpeace website they were trying to raise awareness about the ship sailing through the Irish sea using plutonium.

  2. The Data Protection Act 1998 - questions and answers

    Where, however, the data were held by a newsagent or milk roundsman and indicated when his customers were to be on holiday, a greater degree of security might be necessary. In any event, the shopkeeper would require to ensure that such of his staff as had access to the data understood the necessity of retaining its confidentiality.

  1. Privacy and Data Protection: IT Law

    The Commission, under Article 25 (6) of the Directive, may find that a third country gives an adequate level of protection "by reason of its domestic law or of the international commitments it has entered into." If the level of protection in the third country is inadequate, Member States are to prevent data transfers to that third country (Article 25(4))

  2. Data Protection Act

    If personal data have been recorded because of a relationship between the data controller and the data subject the need to keep the information should be considered when the relationship ceases to exist. The act provides that personal data processed only for historical, statistical or research purposes in compliance with

  1. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    The Copyright, Design and Patents Act (1989) * Using software without a proper licence * Copying music * Sharing music files that you have copied Evaluation: These are the main acts which affect her as if she decides to buy a pirated cd because it is cheaper it will be

  2. Legal Aspects of Using Information Technology

    with regard to access to information and the security of the information. The act provides the government the right to perform intelligence surveillance and to spy on electronic communications and data. Legal aspects of using the e-mail IKEA must be aware of the legal aspects of e-mail usage and guidelines for good practice.

  1. Computer Crime and the Law.

    Task: Suggest some ways in which computers can help solve crime > Computers prove invaluable in the detection and prevention of crime > Detection is about collecting huge amounts of information until a key piece of evidence emergese. > Databases of fingerprints, stolen vehicles and criminal records are all essential tools in todays's fight against crime.

  2. Right of privacy under Hong Kong's current laws

    Famous cases are the Princess Diana gym case15, Li Yau-wai v. Genesis Films16, Douglas v. Hello!17 and the Campbell Engineering18 trade secrets case. Defamation impacts journalism in a way that they need to be very careful when making their statement which might lower one's reputation.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work