Laws and Legislations (ICT)
Laws and Legislations Laws and legislations were introduced due to the fact that ICT was growing and since the uses of large computerized databases as they became quite useful for sensitive personal data to be stored without the individual's knowledge. Employers, credit card companies or insurance companies, could access this confidential data. Therefore personal privacy is important as it is our human right to not want personal information on age, religious beliefs, family circumstances or academic qualifications to be accessed by others without permission. An Individual User An individual user would use various software applications in everyday life throughout ICT. The main uses of ICT software are: > E-mail > Internet > Mail merge > Excel > FrontPage > Access Due to the increased of the amount of information available particularly on the Internet it has been a concern for the interest taken by hackers into and stealing data therefore the government had to produce may different legislations to prevent this from occurring. Legislations were also created for the misuse of data and viruses as well. Before 1990 there wasn't a law against any misuse of computers so it was legal to send a virus to someone's computer. Since then there have been several legislations, which have come into place that prevent this from happening. Suitable
The Legislation That Protects Individuals and Groups using IT. Use of It by myself and an adult in employment.
3E - The Legislation That Protects Individuals and Groups from Computer Misuse of ICT In the final piece of unit 3, I will be investigating the laws and legislations which protect and affect the people through the ICT they use from units 3A to 3D. These legislations all aim to aid the public and aim to locate people breaking the legislation. They essentially moderate the use of technology to make sure they follow certain rules. They prevent exploitation of technology. The laws/legislative acts I will be talking about in this case are the Data Protection Act of 1998, the Computer Misuse Act of 1990 and the Copyright, Design and Patents Act of 1988. Data Protection Act 1998 What is it? The Data Protection Act is essentially a legislative act that aims to keep data regarding citizens of the country private and out of the hands of 3rd parties. This law is a 'United Kingdom Act of Parliament', meaning it was made in the UK and only affects citizens of the UK. It gives people a protection of their personal data, preventing a breach of human rights and promoting and enforcing freedom, freedom being the act of allowing citizens to keep their personal information in the hands of only those consented to. The UK government-using this act-aim in keeping data of customers, members, or other such relations to an organisation only within that organisation. This means that companies
The following report will compare differences between internal and external information sources relevant to four different organisational types, only one information type will be used per organisation.
Wendy McIntyre HNC computing on-line Information Systems & Services Outcome 1 b, c, d & e August 2003 Introduction Information requirements differ greatly from one organisation type to another, depending on the nature of the business. But the categories from which this information is available remain similar. * Internal * External * Personal * Employment * Financial * Legal * Other For a computerised information system to be useful, it must be capable of organising and presenting information to the context of the business. The following report will compare differences between internal and external information sources relevant to four different organisational types, only one information type will be used per organisation. Examples of its end use will be outlined along with an over view of security requirements which apply to the use and storage of the information collected. Internal & External Information Sources As the name implies an internal source of information is information, which is gathered from within an organisation, and an external source from out with the organisation. Examples of internal sources of information are accounting ledgers, production/sales statistics, staff questionnaires/interviews, training records, internal market research, the list is unquantifiable and what is relevant is dependant on the organisation itself. Examples of
The Child Protection Act.
The Child Protection Act The child protection act is a legislation which was put in place to protect child from harm. So far in society it has worked well to protect children from many forms of violence but it has been discussed that there are many inadequacies and that it is in need of reform. This assignment will state what the protection order is and what it does, the problems arising with it and what changes can be made to improve it. The old Legislation The Child protection bill of 1998 is a legislation which states that a child is in need of protection if s/he is suffering harm, is at unacceptable risk of suffering harm and does not have a parent willing and able to protect them from harm. This includes situations where the child is at risk from his parents, from others inside the house where he lives, from others outside the house where he lives and from themself. The current legislation The current legislation is much like the old legislation except that there are some reforms that have been put into place. The Child protection Act of 1999 states that there are new rights of people reporting the suspected abuse and that there is a charter of rights for child care. When an investigation is being conducted and the investigator believes that it is important that the child does not return home until the end of the investigation due to there being a threat of
Data protection act comparison.
Data protection act comparison Data protection act 1984 summarized This act is concerned with firms, which process personal data about individuals on a computer. It states that they must register with the data protection registrar. The act has eight main principles with which all registered data users much stick by: * 1. The information to be contained in personal data shall be obtained, and personal data shall be processed, fairly and lawfully. * 2. Personal data shall be held only for one or more specified and lawful purposes. * 3. Data held for any purpose or purposes shall not be used or disclosed in any manner incompatible with that purpose or those purposes. * 4. Personal Data held for any purpose or purposes shall be adequate, relevant, and not excessive in relation to that purpose or those purposes. * 5. Personal data shall be accurate and, where necessary, kept up to date. * 6. Personal data held for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes. * 7. An individual shall be entitled: * 7. (a) at reasonable intervals and without undue delay or expense. * 7. (a) (i) to be informed by any Data User whether he holds personal data of which that individual is the subject, and * 7. (a) (ii) to access to any such data held by a Data User, and * 7. (b) where appropriate, to have such data
How has technology changed and affected shopping trends and the social behaviour of customers?
TECHNOLOGY & CHANGE CI1141 Individual Report Application Area 2 PESTLE analysis 2 Research topic question 2 Preface 2 Introduction 2 The ICT industry 2 The growth of ICT in the retailing industry over the years 2 Customer shopping habits/trends 3 How Has Technology Changed and Affected Shopping Trends? 3 ICT innovations 3 Types of cards 3 Credit/Debit cards 4 Bar Code Scanner 4 Touch Screen Tills 4 Loyalty/Store Cards 4 On-line shopping 5 Sales Figures 5 How has technology changed and affected the social behaviour of customers? 6 On-line shopping 6 Credit/Debit Cards 7 Environmental and transportation issues 7 Conclusion 8 Bibliography .1 Application Area Retail .2 PESTLE Perspective Social .3 Research Topic Question How has technology changed and affected shopping trends and the social behaviour of customers? 2.0 Preface/Abstract The purpose of this report is to analysis the PESTLE analysis; this report will contain one context of an Application Area, and then choose a research question based on both. In this case am talking about the social aspect and the retailing area. I will also being looking at how IT technology has changed shopping trends and
The Data Protection Act, 1998
The Data Protection Act, 1998 The 'right to privacy' is a right we all expect. We do not expect personal details such as our age, medical records, personal family details and, political and religious beliefs to be freely available to everybody. With the growth of information and communication technology, large databases are able to hold huge quantities of information and global networks are able to share and distribute this information around the world in seconds. To protect people and their personal information, the Data Protection Act was formed. The first Act was made law in 1984 but was replaced by a new Act in 1998 to include the European Union law. If any person, organisation, company or business wishes to hold personal information about people, they must register with the Office of the Data Protection Commissioner. The Data Protection Act contains eight basic principles. A summary of these: . be processed fairly and lawfuuly 2. be obtained for specified and lawful purposes 3. be adequate, relevant and not excessive for the purpose 4. be accurate and up-to-date 5. not be kept longer than necessary 6. be processed within the rights of data subjects 7. be kept secure against loss, damage and unauthorised and unlawful processing 8. not be transferred to countries outside the European Economic Area Personal data Personal data is data that can identify a living
ICT LEGISLATIONS THE DATA PROTECTION ACT 1998 The Data Protection Act protects the personal data which is stored about you by different people .The 8 principles of the act are : * Processed fairly and lawfully * Processed for limited purposes * Adequate relevant and not excessive * Accurate * Not kept for longer than necessary * Processed in accordance with the individual's rights * Kept secure * not transferred to countries without adequate protection. Schools have permission from the home office and parents to know every thing about you whether it your mums name or you brothers. The police and the home office also have all our personal information. Teachers and anyone else who has your personal information cannot tell anyone anything about you. There have been many people who have been prosecuted for disobeying the data protection act and here is one example. In 1995 the ODPR brought a case against a manger of the Woolwich Building Society for disclosing personal data to a person not sanctioned by the Woolwich's data protection register entry. This was a case, therefore, of the Woolwich, through one of its staff operating outside the terms of its registration. The manager had been trying to trace a Woolwich customer who was allegedly in arrears with her Woolwich mortgage. In doing so the manager disclosed to a tenant of the customer that she was in arrears. The
Right of privacy under Hong Kong's current laws
Right of privacy under Hong Kong's current laws There is a trend to recognize privacy as a human right that should be protected by law, yet, we can find no general right to privacy existing in Hong Kong nowadays. "The concept of privacy doesn't exist in both Hong Kong and UK common law systems, but it doesn't mean that common law doesn't protect people's privacy. Privacy protection is being provided indirectly"1 Prof. Johannes Chan2. However, such indirect protection is still far from being comprehensive. Whereas the right of freedom of speech and press enjoys clear legal protection3, only fragmented and narrow legal provisions can be spotted in separate branches of law, with their focus on an individual's interest in his person or property. Under the current law, our privacy rights are enforceable mainly against the government and corporations, like the the Bill of Rights Ordinance ("BORO") Article 144. Yet, such privacy rights are neither absolute nor all-embracing. The Telecommunications Ordinance and the Post Office Ordinance give government and its law enforcement agencies wide powers to intercept personal communications. As for the media, while there are legal provisions which would apply to journalists as set out in the next section, Hong Kong still counts quite a lot on the self-discipline of the media, in order to save from a possible detriment of freedom of
Legal Aspects of Using Information Technology
Legal Aspects of Using Information Technology The widespread use of information technology has brought us a number of benefits and problems, too. As information technology has spread, so have computer crime and abuse. For example, the internet is not only used by the innocent members of the public, but also by fraudulent traders, paedophiles, software pirates, hackers and terrorists. Their activities would include: placing computer viruses, software bootlegging, credit card fraud and money laundering schemes. Hackers A hacker is an individual who break codes and passwords to gain unauthorised access to data held on computer systems. When hackers gain unauthorised access to computer systems, they can do a huge amount of damage. Stand-alone computers are safe because, there is no connection for the hackers to break into. However, computers which are connected to networks or modems are at more risk from hacking. The only way of protecting the computer systems from being broken into, is by changing the passwords at regular intervals. Computer Fraud Computer fraud is when computer operators use the computer to their own advantage. It is difficult to track down these offenders for the following possible reasons: * They are often clever * They might be young with no previous criminal records * When fraud is discovered in a business, it is often not publicised, because the