• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Ict and the law

Extracts from this document...

Introduction

ICT and the Law In this piece of coursework I will be talking about various laws and how they affect myself, Mr James (An Adult with a disability) and Mr Hulse (An adult in employment. There are 4 laws I will be concentrating on: * The DPA * Health and Safety * The CMA * The Copyright, Design and Patents Act DPA (1998) The DPA (Data Protection Act) is a law which enforces how data is collected and stored. It stops it from being misused and transported to countries who do not have similar protection of data. For instance, if a school had the personal data of a student and sold it to someone or gave it away, or pinned it up on a notice board or a wall somewhere, they would be prosecuted by the DPA for misuse of data. The DPA ensures all personal information digitally stored is not used in any other way than necessary, and are not viewed and changed when there is no need to. How would you feel if you applied for a job and someone had changed your GCSE results to a very poor standard, making it near impossible to get the job, or if someone had made all the results really good, you would be given a position and expected to do more work than you can possibly accomplish. ...read more.

Middle

Another form of virus is a Trojan, these are more advanced viruses that enter a persons computer hiding inside another file such as a harmless bmp image file or an mp3, since these are more advanced they cause more harm and may be harder to find and remove, since they have the ability to run from the inside of a file. The next form of virus I will explain about is called a 'worm', the worm itself is harmless and is not usually found as a virus, but it creates viruses, and recreates them if they are deleted, making the viruses it creates near impossible to remove without removing the worm first. Some very advanced viruses called polymorph viruses have the ability to change their own programming to maximize stealth, infection and destruction. Most viruses nowadays are able to hide inside a file, infect other files, and in some cases they are a group of 2 or more worms that all create viruses and the other worms, these are almost impossible to find and remove and can be very frustrating and damaging. The CMA works to prevent such files from entering the internet and harming personal files. Copyright Everyone in the community must follow the laws of copyright, which state that whoever made a file (whoever recorded a video or took a picture) ...read more.

Conclusion

It means that there should not be tripping hazards or objects on the stairs that I could fall down. It means that the wires in the computer room are out of the way. It also means that I should take regular breaks every twenty minutes so I do not get eye strain. The monitors have to have the ability to change the brightness and contrast. As well as being safe at school Mr Hulse is responsible for the safety of the children in his care. This means he should constantly check if there is anything in the room that is dangerous and if so do all he can to remove the danger. The copyright designs and patent act affects me when I am completing my coursework for school. It means I cannot go onto the internet and copy pictures and text and saying that the work is mine. If I should use pictures and text from the internet I should reference where I have got this information from. This law also means that I cannot go onto the internet and use peer two peer sites such as piratebay to download movies and music without paying for them. If I want to download music I should go to sites such as Itunes and pay for the download or subscribe to a monthly contract. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a teacher thought of this essay

4 star(s)

Summary

This document gives the reader a good breadth of information covering the main points of the legislation mentioned in the title. There are some good examples in each section and this helps to demonstrate the understanding the student has of the principles of each piece of legislation.

Overall the document would benefit from clarity. This is in terms of the structure of the writing and also the way the legislation is portrayed as "law". It would help overall if there could be some clarification of what is law and what is not.

This piece of work is four stars overall.

Marked by teacher Ad Son 04/09/2013

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Peer reviewed

    E-commerce - the legal considerations

    3 star(s)

    * Full name, address, email etc of the trader, VAT number, Company number, member of trade organisation (if you are selling) * A clear privacy policy explaining what you do with information collected on the site. This privacy policy must also set out if you use cookies on the site and what you use them for.

  2. The purpose of legislation is to control and regulate the use of ICT

    Copyright rises when an individual or organisation creates a work, and a work is subject to it if it is regarded as original, and must an exhibit a degree of labour, skill or judgement. Interpretation is related to the independent creation rather than the idea behind the creation.

  1. The impact of ICT on the environment

    If you grow up with theses skills being practiced around you it is more likely to become second nature. There is no doubt that our society runs on paper and though you would think that the amount of paper should be reduced by the introduction of computers in some ways it increases it.

  2. The social, legal, moral aspects of I.C.T. In this report, I am going to ...

    There is little control on what can be downloaded or posted on the internet. 2. computers are replacing people at work * People are losing their jobs because the computers are machineries do their jobs. 3. easy to copy files * copying computer files is very easy.

  1. The Legislation that protects individuals and groups from the misuse of ICT

    Firewall protects the individuals or businesses as it filters the data coming and going to the computer. If the data that is trying to enter is suspicious, the firewall blocks it and asks the user if they want to allow that data to enter.

  2. ICT Legislation

    There can be exceptions of data protection individuals can have medical files sent to other hospitals in case they have an accident and are in a hospital which is not their normal GP. This act is weaved in to every technology including mine and my schools; it will mainly protect my documents at school.

  1. File management and standard ways of working.

    You can limit the amount of access to any important data by using usernames, passwords and firewalls to stop anyone from hacking into files that don't have the right to access it. To protect data from access security you should limit a person's use of the network.

  2. Outline the Data Protection Act and give examples of breaches.

    Data Protection Act Breach 1. In April 2013, three police forces accidentally sent personal details of a 1,000 staff to a security firm.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work