The Legislation That Protects Individuals and Groups using IT. Use of It by myself and an adult in employment.

3E - The Legislation That Protects Individuals and Groups from Computer Misuse of ICT In the final piece of unit 3, I will be investigating the laws and legislations which protect and affect the people through the ICT they use from units 3A to 3D. These legislations all aim to aid the public and aim to locate people breaking the legislation. They essentially moderate the use of technology to make sure they follow certain rules. They prevent exploitation of technology. The laws/legislative acts I will be talking about in this case are the Data Protection Act of 1998, the Computer Misuse Act of 1990 and the Copyright, Design and Patents Act of 1988. Data Protection Act 1998 What is it? The Data Protection Act is essentially a legislative act that aims to keep data regarding citizens of the country private and out of the hands of 3rd parties. This law is a 'United Kingdom Act of Parliament', meaning it was made in the UK and only affects citizens of the UK. It gives people a protection of their personal data, preventing a breach of human rights and promoting and enforcing freedom, freedom being the act of allowing citizens to keep their personal information in the hands of only those consented to. The UK government-using this act-aim in keeping data of customers, members, or other such relations to an organisation only within that organisation. This means that companies

  • Word count: 6079
  • Level: GCSE
  • Subject: ICT
Access this essay

The following report will compare differences between internal and external information sources relevant to four different organisational types, only one information type will be used per organisation.

Wendy McIntyre HNC computing on-line Information Systems & Services Outcome 1 b, c, d & e August 2003 Introduction Information requirements differ greatly from one organisation type to another, depending on the nature of the business. But the categories from which this information is available remain similar. * Internal * External * Personal * Employment * Financial * Legal * Other For a computerised information system to be useful, it must be capable of organising and presenting information to the context of the business. The following report will compare differences between internal and external information sources relevant to four different organisational types, only one information type will be used per organisation. Examples of its end use will be outlined along with an over view of security requirements which apply to the use and storage of the information collected. Internal & External Information Sources As the name implies an internal source of information is information, which is gathered from within an organisation, and an external source from out with the organisation. Examples of internal sources of information are accounting ledgers, production/sales statistics, staff questionnaires/interviews, training records, internal market research, the list is unquantifiable and what is relevant is dependant on the organisation itself. Examples of

  • Word count: 1733
  • Level: GCSE
  • Subject: ICT
Access this essay

The Child Protection Act.

The Child Protection Act The child protection act is a legislation which was put in place to protect child from harm. So far in society it has worked well to protect children from many forms of violence but it has been discussed that there are many inadequacies and that it is in need of reform. This assignment will state what the protection order is and what it does, the problems arising with it and what changes can be made to improve it. The old Legislation The Child protection bill of 1998 is a legislation which states that a child is in need of protection if s/he is suffering harm, is at unacceptable risk of suffering harm and does not have a parent willing and able to protect them from harm. This includes situations where the child is at risk from his parents, from others inside the house where he lives, from others outside the house where he lives and from themself. The current legislation The current legislation is much like the old legislation except that there are some reforms that have been put into place. The Child protection Act of 1999 states that there are new rights of people reporting the suspected abuse and that there is a charter of rights for child care. When an investigation is being conducted and the investigator believes that it is important that the child does not return home until the end of the investigation due to there being a threat of

  • Word count: 1112
  • Level: GCSE
  • Subject: ICT
Access this essay

Data protection act comparison.

Data protection act comparison Data protection act 1984 summarized This act is concerned with firms, which process personal data about individuals on a computer. It states that they must register with the data protection registrar. The act has eight main principles with which all registered data users much stick by: * 1. The information to be contained in personal data shall be obtained, and personal data shall be processed, fairly and lawfully. * 2. Personal data shall be held only for one or more specified and lawful purposes. * 3. Data held for any purpose or purposes shall not be used or disclosed in any manner incompatible with that purpose or those purposes. * 4. Personal Data held for any purpose or purposes shall be adequate, relevant, and not excessive in relation to that purpose or those purposes. * 5. Personal data shall be accurate and, where necessary, kept up to date. * 6. Personal data held for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes. * 7. An individual shall be entitled: * 7. (a) at reasonable intervals and without undue delay or expense. * 7. (a) (i) to be informed by any Data User whether he holds personal data of which that individual is the subject, and * 7. (a) (ii) to access to any such data held by a Data User, and * 7. (b) where appropriate, to have such data

  • Word count: 877
  • Level: GCSE
  • Subject: ICT
Access this essay

The Data Protection Act

The Data Protection Act contains eight Data Protection Principles. These state that all data must be: - Processed fairly and lawfully - Obtained & used only for specified and lawful purposes - Adequate, relevant and not excessive - Accurate, and where necessary, kept up to date - Kept for no longer than necessary - Processed in accordance with the individuals rights (as defined) - Kept secure - Transferred only to countries that offer adequate data protection The legislation underpinning these principles is extremely complex. It is not suitable for direct devolution to all the (lay) staff/managers who may have responsibility for personal data. Nor does it, on its own, provide a measure of compliance. Hence the need for supporting products and information. Terms and definitions. PERSONAL DATA- In this Act, unless the context otherwise requires- "data" means information which- (a) is being processed by means of equipment operating automatically in response to instructions given for that purpose, (b) is recorded with the intention that it should be processed by means of such equipment, (c) is recorded as part of a relevant filing system or with the intention that it should form part of a relevant filing system, or (d) does not fall within paragraph (a), (b) or (c) but forms part of an accessible record as defined by section 68; "data controller" means,

  • Word count: 1991
  • Level: GCSE
  • Subject: ICT
Access this essay

The main purposes of legislation covering working with and using ICT.

The main purposes of legislation covering working with and using ICT This assignment will cover the main purposes of legislation that is involved with ICT and the advantages and disadvantages of the laws covering and ICT. The Data Protection Act The first Data Protection Act was introduced in 1984. A new Data Protection Act that changed the law to meet the requirements of the European Union replaced this in 1998. The Data Protection Act gives rights to individuals about whom information is stored. Individuals may find out information about themselves, challenge it and claim compensation in certain circumstances. It is the act that enables them to do this. The Act places legal requirements on those who store and use personal data. They must let everyone know about their use of data and follow the data protection principles. These eight principals consist of: - . Be obtained and processed fairly and lawfully 2. Be held and processed only for the lawful purposes described in the register entry 3. Be used only for those purposes and only be disclosed to those people in the register entry 4. Be adequate, relevant and not excessive in relation to the purpose for which they are held 5. Be accurate and, where necessary, kept up to date 6. Be held no longer than is necessary for the registered purpose 7. Be surrounded by proper security 8.

  • Word count: 927
  • Level: GCSE
  • Subject: ICT
Access this essay

Legislation unit 3 part E

Legislation that protects individuals and The group from the misuse of I.C.T There are many laws that have been imposed so that people don't misuse ICT. In this report I will explain some of these laws. I will try to show why these laws were introduced and what they do now to keep people from misusing these new technologies. Here are a few of the laws and acts that have been passed that have concern ICT: Data Protection Act 1998 The main purpose of this act is to prevent the misuse of personal data. All organizations that hold the data have to register its use, before using it. This includes organisations such as dentist, doctors, and hospitals etc. these organisations would hold records and data of their patient's details. They would also have to state what the information they have is and what they would use the information for. If the information is wrong it is because of the lack of care when it was compiled, and in some way has damaged the person's reputation, the person that this has happened could sue the company for the misuse of their personal data. This act is there to protect the privacy of ordinary people. Another part of this act stops information from being passed onto other companies without the person's knowledge. This act links up with Thomas Davies the GP that I researched about in The Impact of I.C.T in adult in employment. This is because he has a lot

  • Word count: 1580
  • Level: GCSE
  • Subject: ICT
Access this essay

Assets table - recording the copyright information on the logos and pictures I used.

ASSETS TABLE You must find out what the copyright information is on all of the assets used/if any. Source Asset P or S* Details of permission if used Description of the asset Details of editing (this is a very important part of the process, as this is where you will show how you have made the assets fit for audience and purpose) In which part of the project have you used this asset? Fair trade logo image s N/A A picture of the fair trade logo I shrunk the picture and I have photo shopped the image to say fair deal instead of fair trade, this is to avoid copy rites and so that it is my work. It has also been used to show the existence of fair trade on my work. Mediator 9 Fair trade not free trade image s N/A A picture of a little badge which says Fair trade not free trade. I have enlarged the picture to make it more visible to the audience and to stand out from the rest of my work; it is also to make a better balance on my work from writing to images. This image has been chosen by me to show the relevance of equality in the world today and to try and put that message across. Mediator 9 A picture of me image p N/A A picture of me I cropped the picture so that it only shows the relevant image that I have chosen for this task, it is to also show the audience that I have took time to make sure it is relevant to my work. I have also used a picture

  • Word count: 2189
  • Level: GCSE
  • Subject: ICT
Access this essay

Legal Aspects of Using Information Technology

Legal Aspects of Using Information Technology The widespread use of information technology has brought us a number of benefits and problems, too. As information technology has spread, so have computer crime and abuse. For example, the internet is not only used by the innocent members of the public, but also by fraudulent traders, paedophiles, software pirates, hackers and terrorists. Their activities would include: placing computer viruses, software bootlegging, credit card fraud and money laundering schemes. Hackers A hacker is an individual who break codes and passwords to gain unauthorised access to data held on computer systems. When hackers gain unauthorised access to computer systems, they can do a huge amount of damage. Stand-alone computers are safe because, there is no connection for the hackers to break into. However, computers which are connected to networks or modems are at more risk from hacking. The only way of protecting the computer systems from being broken into, is by changing the passwords at regular intervals. Computer Fraud Computer fraud is when computer operators use the computer to their own advantage. It is difficult to track down these offenders for the following possible reasons: * They are often clever * They might be young with no previous criminal records * When fraud is discovered in a business, it is often not publicised, because the

  • Word count: 3890
  • Level: GCSE
  • Subject: ICT
Access this essay

Right of privacy under Hong Kong's current laws

Right of privacy under Hong Kong's current laws There is a trend to recognize privacy as a human right that should be protected by law, yet, we can find no general right to privacy existing in Hong Kong nowadays. "The concept of privacy doesn't exist in both Hong Kong and UK common law systems, but it doesn't mean that common law doesn't protect people's privacy. Privacy protection is being provided indirectly"1 Prof. Johannes Chan2. However, such indirect protection is still far from being comprehensive. Whereas the right of freedom of speech and press enjoys clear legal protection3, only fragmented and narrow legal provisions can be spotted in separate branches of law, with their focus on an individual's interest in his person or property. Under the current law, our privacy rights are enforceable mainly against the government and corporations, like the the Bill of Rights Ordinance ("BORO") Article 144. Yet, such privacy rights are neither absolute nor all-embracing. The Telecommunications Ordinance and the Post Office Ordinance give government and its law enforcement agencies wide powers to intercept personal communications. As for the media, while there are legal provisions which would apply to journalists as set out in the next section, Hong Kong still counts quite a lot on the self-discipline of the media, in order to save from a possible detriment of freedom of

  • Word count: 2707
  • Level: GCSE
  • Subject: ICT
Access this essay