• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

GCSE: Legislation & The Legal Framework

Browse by

Currently browsing by:

4 star+ (1)
3 star+ (5)

Meet our team of inspirational teachers

find out about the team

Get help from 80+ teachers and hundreds of thousands of student written documents

  • Marked by Teachers essays 1
  • Peer Reviewed essays 7
  1. Peer reviewed

    The Data Protection Act

    4 star(s)

    kept no longer than necessary * processed within the rights of the data subjects * kept secure * not transferred to other countries without protection We have much information held about us in many places. Without the Data Protection Act, personal information could be misused and shared with anyone, however the Data Protection Act ensures that the companies and government which holds this information will not breach anyone's right to privacy. The act benefits a number of people. It benefits me, people at work, and also the community.

    • Word count: 872
  2. Peer reviewed

    E-Commerce is the buying and selling of products using an electronic service. Discuss.

    3 star(s)

    Amazon, EBay but also upgrading an account from a standard to a premium account such as Megavideo. This type of E-Commerce is called "business to consumer", whereby the business is selling to the public instead of a certain business. Some common applications related to electronic commerce are the following: * Email * Enterprise content management * Instant messaging * Newsgroups * Online shopping and order tracking * Online banking * Online office suites * Domestic and international payment systems * Shopping cart software * Teleconferencing They way E-Commerce works is simple.

    • Word count: 497
  3. Peer reviewed

    Legal issues of e-commerce

    3 star(s)

    Legal Issues Data protection considerations The Data Protection Act lays puts down a serious of rules that M&S must obey under their co-operation. Therefore as a successful trader any personal data that the company collects from its customers, such as name, address and billing information such as credit card details must be protected from fraud. Therefore M&S must deal fairly with the info they receive from consumers and tell the customer what data the have collected, upon that they must tell them what you are going to do with that information, and consult with the customers before taking any actions.

    • Word count: 852
  4. Peer reviewed

    Managing Research and Information: Data Protection Act

    3 star(s)

    It is fairly to exchange the data. Furthermore, their privacy details are protected by the law. Also the company must keep them securely. 2. Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with those purposes.

    • Word count: 486
  5. Peer reviewed

    The Data Protection Act.

    3 star(s)

    It was created to protect everyone's civil rights and the information that is kept on them by organisations. Principles of Data Protection The rules Anyone processing personal data must comply with the eight enforceable principles of good practice. They say that data must be: * Fairly and lawfully processed; * Processed for limited purposes; * Adequate, relevant and not excessive; * Accurate; * Not kept longer than necessary; * Processed in accordance with the data subject's rights; * Secure; * Not transferred to countries without adequate protection.

    • Word count: 465
  6. Ict and the law

    It was brought in because more and more organisations were starting to hold people's personal information on computers. This was a problem because nobody knew who was holding their information. Data users must register all their purposes on a national register held by a Date Protection Commissioner and the data can only be used for that purpose. The second act was brought in after more people began to use the internet to collect information. This makes the community safer from identity theft and gives the thief a fine if he/she does wrongly. Data must only be used for the purposes that have been registered.

    • Word count: 997
  7. Piracy. Many people have problems with piracy, some of them are the singers themselves and they claim that if you listen to their songs for free, then you should be providing some service for them too

    All of them have their own opinions, but the more annoying ones try to take action against piracy. First time I came to England in 2005 and before that, I didn't even know that licensed software is so expensive, I had very sincere opinion of my own that all those people who buy licensed software are just so stupid that it's unbelievable... it's just like throwing money out of the window and look at how wind carries them away. Until the age of 14, I haven't bought a DVD or CD game or film for more expensive than 5$, average

    • Word count: 583
  8. Free essay


    also damage hand if done excessively Someone may break a bone or risk some other injury Things you found out - from books or the web What I found out Why you must/must not do it The law states that an employer must provide or ensure: 1. Tilt-able screens 2.

    • Word count: 502
  9. Health and Safety

    Tightness, aching and stiffness in arms, neck and shoulders Numbness, coldness or tingling in arm and hands. Loss of strength in hands. Preventing RSI Ergonomic Keyboards Raising the keyboard Wrist Supports Take Regular Breaks Use keyboard shortcuts instead of mouse. Exercise fingers and hands. 3) Eye Strain The eyes can become strained after staring at a monitor particularly if working in bad light or a flickering screen. This can also lead to headaches. Glare from the screen and poor quality images on old monitors make it hard for the eyes to focus Preventing Eye Strain Take Regular Breaks Work in a well lit room Reduce glare on Screen/Sun Adjust the contrast on screen.

    • Word count: 630
  10. ICT in Business and Commerce

    You can read what other people thought of the product before you buy. Amazon allows customers to listen to a sample of each track on the CD before they decide to buy Businesses have fewer overheads and these savings should be passed on to the customer. Drawbacks of Online Commerce: * Some people actually enjoy going out shopping * Security concerns (credit card fraud, bogus companies etc.) * Waiting for goods to arrive (or the wrong goods arriving) * Technological Underclass (the poorest people in society have the least access to the new technology)

    • Word count: 631
  11. The computer misuse act

    The Act introduced three new offences: 1. Accessing computer material without permission (e.g. viewing someone else's files) 2. Accessing computer material without permission with intent to commit further criminal offences (e.g. hacking into a bank's computer as a result of wanting to increase the amount in your account) 3. Altering computer data without permission (e.g. writing a virus to destroy someone else's data) A breach of the 1990 Computer Misuse Act would be if a student hacked into the school database, and altered information without permission. This is unauthorised modification.

    • Word count: 823
  12. The legislations that protects individuals and groups from the misuse of ICT

    processed within the rights of the data subjects 7. kept secure 8. kept only within the EEC. This basically means that it however sensitive the information held by a company is about a person, that information must only be used for the reason it was collected. This law applies to all businesses and organizations and all the records that ate kept. Unfortunately there are some exemptions for this ACT. If you process data for personal, family or recreational use you are exempt from the ACT. Exemptions could include birthday lists, personal appointments for the family or information on hobbies.

    • Word count: 930
  13. Data protection act

    The computer misuse act also lets you view data about your self, and if you want to you can request to have it deleted. The computer misuse act protects people's network from being hacked into. For example peoples passwords being found out. This also prevents hackers (people who get into a network with out being authorized. Even though hackers hack into peoples computers today most of them are frighten that they might get caught and will have to suffer the penalties of the computer misuse act.

    • Word count: 975
  14. Effect of Legislation on the Internet

    These Principles are known as the eight data protection principles. Personal Data must be; * Processed fairly and lawfully * Processed only for one or more specified and lawful purpose * Adequate, relevant and non excessive of those purposes * Accurate and kept up to date * Kept for no longer than it is necessary for the purposes it is processed * Processed in line with the rights of individuals * Secured against accidental loss, destruction or damage and against unauthorised or unlawful processing.

    • Word count: 719
  15. Assess the likelihood of Sid and Kenny avoiding personal liability for the debts of the company

    This act makes it a legal requirement that health and social care agencies keep clients details confidential. The data act allows clients to these rights: * To see what information is held about them and correct the information if necessary. * The right to refuse or give information. * The data stored must be correct and up to date. * The data must only be kept for as long as it is needed. * The information given should not be available to unauthorised people For my work placement I went to St Marks Rainbows.

    • Word count: 793
  16. The Data Protection Act, 1998

    If any person, organisation, company or business wishes to hold personal information about people, they must register with the Office of the Data Protection Commissioner. The Data Protection Act contains eight basic principles. A summary of these: 1. be processed fairly and lawfuuly 2. be obtained for specified and lawful purposes 3. be adequate, relevant and not excessive for the purpose 4. be accurate and up-to-date 5. not be kept longer than necessary 6. be processed within the rights of data subjects 7.

    • Word count: 527
  17. ICT and Legislation

    time * Kept for only relevant and lawful purposes * Processed fairly and in accordance with the rights of the subject data * protected against loss, damage and unlawful processing Health and Safety at work act (1974) This legislation makes sure that all people at work have a safe working environment and that employer's make there workers aware of the safety issues including: * fire exits must be kept clear * fire doors must be kept shut * any obstacles must be positions so there is no danger of tripping over * plug sockets can not be overload and paper

    • Word count: 871
  18. Laws and Legislations (ICT)

    Legislations were also created for the misuse of data and viruses as well. Before 1990 there wasn't a law against any misuse of computers so it was legal to send a virus to someone's computer. Since then there have been several legislations, which have come into place that prevent this from happening. Suitable protection acts: Many of these legislations take effect in our community including cyber caf´┐Ż bars and libraries. Cyber cafes have many users using the same computer so it is important that information is protected and not found by others. There are also many people using the same computers in libraries.

    • Word count: 923
  19. The legislation that protects individuals and groups from the misuse of ICT.

    who use VDUs for a significant amount of time while working to reduce repetitive strain injury, fatigue and eye problems which were very common occurrences in the 80s and early 90s. To abide by these regulations employers must > Analyse workstations and assess and reduce risks > Ensure workstations meet minimum requirements > Provide health and safety training for employees so they can use all areas of workstation equipment correctly > Arrange and pay for eye tests Its not only the employers that take responsibility, employees also have to > Bring problems to the attention of the employer as soon as possible > Use workstations and equipment correctly And not abiding by these rules can too result in criminal prosecution.

    • Word count: 731
  20. Data protection act comparison.

    * 7. An individual shall be entitled: * 7. (a) at reasonable intervals and without undue delay or expense. * 7. (a) (i) to be informed by any Data User whether he holds personal data of which that individual is the subject, and * 7. (a) (ii) to access to any such data held by a Data User, and * 7. (b) where appropriate, to have such data corrected or erased. * 8. Appropriate security measures shall be taken against unauthorized access to, or alteration, disclosure or destruction of, personal data and against accidental loss or destruction of personal data.

    • Word count: 877
  21. The main purposes of legislation covering working with and using ICT.

    Be held and processed only for the lawful purposes described in the register entry 3. Be used only for those purposes and only be disclosed to those people in the register entry 4. Be adequate, relevant and not excessive in relation to the purpose for which they are held 5. Be accurate and, where necessary, kept up to date 6. Be held no longer than is necessary for the registered purpose 7. Be surrounded by proper security 8. Not be transferred outside of the European Economic Area unless the country that the data is being sent to has a suitable data protection law All of these principals apply to data stored on a computer or on paper, an amendment to the Act of 1984, which only applied to data stored on a computer.

    • Word count: 927
  22. What is the purpose of the Data Protection Act?

    That does not mean that types of processing information are prohibited, but they may be subjected to certain conditions. Simple files will continue to be exempted, just as the data processing for private or domestic use. 2. Summarise the eight principles of the Act The eight principals of the data protection act are: 1. Personal data shall be processed fairly and lawfully 2. Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes. 3. Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed.

    • Word count: 780
  23. What Rights Do I Have To Get Access To Data Held About Me, Including Personnel Records?

    This is to allow organisations time to bring their systems progressively into compliance with the regime created by the Act.) There are a number of exemptions to the right of subject access. In particular, where subject access would disclose information about an identifiable third party, or the fact that they are the source of personal information on the file, the data controller is not obliged to grant a subject access request unless the third party has consented to disclosure of the information; or it is reasonable in all the circumstances to comply with the request without their consent.

    • Word count: 880
  24. Outline the Data Protection Act and give examples of breaches.

    This rule ensures there is no getting around the data protection act by just sending data to somewhere where it is legal to reveal it. 1. Be processed fairly and lawfully - Basically, this means that the company must: ? Tell people why, in clear language, they are processing their data. ? Tell people about any nonobvious reasons for which their data is being processed for. It is important that it is in "clear language" because hiding important things by using complex terms is not fair.

    • Word count: 837
  25. Copyright patents act

    Offences which are outlawed by the act: * Unauthorised copying of software. * The selling of software that is known to be copied. There are some very serious actions which a court can use on anyone breaking the law. These include: www.en.wikipedia.org/wiki/Copyright,_and_Patents_Act_1988. * The copying or sale of copied software can mean a prison sentence of up to two years and a large fine. * Being in possession of a device designed to copy software can mean a prison sentence of up to six months and a fine of up to £2000.

    • Word count: 437

Marked by a teacher

This document has been marked by one of our great teachers. You can read the full teachers notes when you download the document.

Peer reviewed

This document has been reviewed by one of our specialist student essay reviewing squad. Read the full review on the document page.

Peer reviewed

This document has been reviewed by one of our specialist student document reviewing squad. Read the full review under the document preview on this page.