• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Data Protection Act

Extracts from this document...

Introduction

Data Protection Act There are many laws and acts that have been passed since the introduction of ICT to the mainstream audience; these exist to maintain the safety and efficiency of computer and internet use. These laws are applied in many different locations such as in the workplace, school, colleges, universities and public places such as libraries or internet cafes. These laws are important as they ensure that the general well being of their computer presence is kept sustained. This unifying of the law and ICT has brought about several laws and acts that have been introduced at different times, these include: 1. Data protection act 2. Computer misuse act 3. Copyright, design and patents act 4. Health and safety at work act Other regulations: 1. EU 2. Internet code of practice 3. The regulation of inventory powers act (2000) The Data Protection Act The data protection act was first passed in 1984 and in 1998. It was made to accommodate for the growing amount of personal information on all the computer and the possible illegal misuse of that information. This law include all "data subjects", or any person with data about them stored on a computer and gives them any organisation's data. There are eight rules made by the data protection act. They say that any data held about a person must be: 1. ...read more.

Middle

This is so if they breach the code then the company can't be prosecuted. Also when making an account then you are asked weather hotmail can share information with third person parties. If you don't check the box then hotmail cannot legally send information. Hotmail also has to say what they are going to do with the information. They will say this in the terms and conditions screen. Evaluation The data protection act protects How Legislation Affects a Working Adult In nearly all workplaces today ICT is used today. It used for computers, servers, printers and fax machines. Now because of all these different technologies there are now many laws. My dad Paul Fairburn has to follow these rules and stay on the right side of the law. If he doesn't then he may risk losing his job. The main law that affect my dad is health and safety. Health and Safety act at work The health and safety at work act (1974) is the main piece of health and safety legislation. When my dad enters his workplace he gets a talk about the rules and safety of the workplace. This would include things like the route to the fire escape. There are many different rules for the manager needs to follow. ...read more.

Conclusion

This means that even if the hacker gets into the computer then they would then to decipher the information to make it readable. The use of computer to hold all the information instead of it being written is much more secure. It is more secure because there are more ways to protect the data than a four digit code. It also has its downsides though because it means that the data can be hacked. Evaluation I think that blockbuster does a good job of protecting the data with their strict rules. Also the data is quickly deleted to make sure nothing happens to it. Blockbuster only asks for the relevant data meaning nothing is unnecessarily taken and risked being misused. The workers only have access to a limited amount of things so that dishonest workers can't breach the data protect act and risk the law. Lots of other technology is used to help make sure the data isn't misused like CCTV cameras and firewalls. Also if the computer is left logged on then anybody can access the data. This can be stopped by a self locking system meaning that when the computer is left for a long time it locks itself and only a password can unlock it. The data protection act has a large effect on the community because it ensures that the data is not misused by anyone. The computers are only installed with the basic so the computer isn't slowed down ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Peer reviewed

    The Data Protection Act

    4 star(s)

    It also affects another adult at work. It affects Joanne at work (a music teacher). She keeps many records of information of her students and staff. Due to this she must comply with this Act and make sure she keeps the information protected and kept unreachable to any unauthorised persons.

  2. File management and standard ways of working.

    * Layout of cables and equipment (to avoid tripping). * Insulation of cables (from electrical supplies). When you are setting up or using the ICT systems, users must be able to work safely. To do this they must ensure that:- > Cables do not cause an obstacle hazard. > Cables and connectors are safe electrically.

  1. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    However, the act does impose the companies to not hide this information in any way. They have to make sure it is noticeable to any users signing up. The act also makes sure that those aiming to use this agreement maliciously, i.e.

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    Maria is an individual with physical disability; she cannot walk and therefore relies on her wheelchair. The data protection creates an impact upon Maria because she works at the Churchill estates even with her disability she faces. She cannot walk and is the only type of physical disability she confronts.

  1. ICT - Data Protection

    A Right of Correction A data subject may force a data controller to correct any mistakes in the data held about them. A Right to Prevent Distress A data subject may prevent the use of information if it would be likely to cause them distress.

  2. The legislation that protects individuals and groups from the misuse of ICT

    whilst at work, there are certain protocols in place in the event of a breaking of the law, so anybody would think that employees can go to work and know that they will be able to go home and have no problems what so ever, however this is not the

  1. ICT LAWS

    This helps to provide protection against the abuse of personal information. Another method of protecting personal data is using encryption to prevent it being read by unauthorised people. This was passed by Parliament and made three new offences: 1.

  2. Right of privacy under Hong Kong's current laws

    A journalist will face criminal charge(s) if s/he improbably collects or uses one's personal data. The cases Eastweek v. Privacy Commissioner11 and undercover agent case12 has shed some light on the use of DDP: allowing journalists to take photographs of unidentified people, and disallowing them to publish details of undercover agent.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work