• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The purpose of legislation is to control and regulate the use of ICT

Extracts from this document...


Legislation of ICT The purpose of legislation is to control and regulate the use of ICT. Different acts in result in different benefits to the end user or other people affected by the technology. Use of computer systems can be intrusive and can lead to the loss of privacy to the individual. I will show below how legislation can protect against this intrusion. There many other problems and opportunities that are presented by the use of ICT. Legislation protects people and ensures that there is no abuse by others to those investing in the technology. -Data protection act in 1998 - The Data Protection Act now covers certain types of manual records (like health records) as well as electronic records. -The Data Protection Act that was made in 1998 -Basically the data protection act is so that the wrong people don't get hold of your work that you do not want them to see. -Computer misuse act in 1990 The Computer Misuse Act 1990 is there to stop the problem of people hacking into computer systems. In the early days of hacking the problem wasn't taken very seriously, people were just mucking around, rather than as something, which could cause serious loss or problems to companies, organisations and others. With new things in technologies the issue has become more serious and legislation was introduced stop these three things: 1. ...read more.


* Safe passageways, e.g. preventing slipping and tripping hazards -The Internet code of practise People have invented this so then people can use codes on their Internet so then other people cannot hack into their system via the Internet. This is very useful to businessmen and companies that have personal and private files that they want to hide from other people that are trying to hack into their system, and are trying to find out important things, or are just trying to be annoying! -Regulation of investigatory powers in 2000 There are a lot of drawbacks of ICT. The drawbacks of ICT are as follows: Firstly there is International fraud Secondly there is Misuse of personal information Then last but not least spam, which is junk mail These are all illegal offences but cannot be stopped by these people who are making a nuisance and money out of this. Most of them think that it is a laugh and a joke but they don't realise how serious it really is. For example, this person who will stay anonymous, but he lived in Wales, but he was all over the news a couple of years ago. Well anyway he sent lots of junk mail to people and has hacked a lot of people's computers and has got a jail sentence for 5 years. -Copyright and other intellectual property The Copyright, Design and Patents Act 1988 are applicable to various types of creations, including databases, text, graphics and sounds by an author or an artist. ...read more.


The Acts make unfair discrimination a civil offence, and in certain other circumstances the law is supported by criminal sanctions. It is also a criminal offence to incite racial hatred under the Public Order Act 1986. Harassment of a person is an offence under the Protection from Harassment Act that was decided in 1997 and the Crime and Disorder Act in 1998. -Criminal Law If you want to commit a crime it is a criminal offence in itself to think like that, whether a crime has actually been committed or not. This includes the provision of information via computerised services, which facilitates any of the activities that this code has highlighted as criminal offences. -Terrorism Act in 2000 An attack on any electronic systems can be classed as an act of terrorism as well as a criminal office. What constitutes an attack within the scope of the Act includes hacking Webster or blocking Webster, with a political agenda or public intimidation in mind. -International Law and the Internet There is no international convention on Internet regulation; caution is necessary in considering what law may be applicable. As a basic rule, computing services must note that although certain materials may be considered legal in their places of origin, which does not prevent the application of UK law if those materials are considered to be illegal under the law in this country. Similarly, material transmitted in the world today may be subject to the laws of whichever country it is viewed in. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Discussing legislation - Data Protection act, Copyright, Computer Misuse, Health and Safety at Work ...

    copied and she and the person who sold it to her could be in trouble.

  2. The Data Protection Act 1998 - questions and answers

    Where, however, the data were held by a newsagent or milk roundsman and indicated when his customers were to be on holiday, a greater degree of security might be necessary. In any event, the shopkeeper would require to ensure that such of his staff as had access to the data understood the necessity of retaining its confidentiality.

  1. Car Safety

    However within the range of a single model of vehicle, the addition of these items will increase the level of protection over the base model. Air bags An air bag is a supplementary restraint that works in combination with a safety belt to protect an occupant in a frontal crash.

  2. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    It gives an incentive for organisations to maintain strict security procedures in fear of breaking the Data Protection Act and facing charges. Misuse of facilities With people's jobs involving access to databases and such, people have the ability to go through personal information.

  1. Data Protection Act

    The notification to the commissioner alone will not satisfy the fairness element of the First Principle. 3.1 Third Principle "Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed".

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    data is going to be used for and who the data may effect or relate to. Under the Data Protection Act, if an individual was to face changes or deletion of data which relates to that specific person, the person can sue the company under the act and which can be a relatively serious matter.

  1. The impact of ICT on the environment

    of ICT, computers have been able to map, the structure of a human cold virus. Computers are also used to monitor patients. They can be used to monitor anything from weight loss to heart rates. Scientists predict a revolution in medical care in the future.

  2. Right of privacy under Hong Kong's current laws

    A claimant can establish a cause of action for nuisance against a journalist who disturbs the free use of his/her property. Examples are the act of harassing telephone calls or prolonged encampment outside a private residence. Breach of contract is another branch of common law enforceable against a journalist who discloses information against his/her contractual agreement with another party.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work