Computers and the Law.

COMPUTERS and the LAW Software Copyright It is illegal under the Copyright Designs and Patents Act 1989 to copy software in breach of a licensing agreement. Licensing Agreements When buying software, you do not become the owner of the software itself - you are buying a license that permits you to use the software. There are a variety of different licensing agreements:- * Single-user license - this covers the use of software by one person. The individual is usually permitted to copy the software once, so that they have a backup. Also, they may be able to use the software on two different machines, say a home PC and a portable laptop, as long as both copies aren't used at the same time! * Multi-user license - this covers the use of software by several people and is the kind of license bought by small to medium-sized organisations where, typically, five to twenty people may be using the software. The multi-user agreement will often state the maximum number of copies that the license buyer may make. * Site license - this covers the use of the software over a site, but the agreement will often state a maximum number of copies that can be made. Computer Misuse Act 1990 This act is concerned with unauthorised access to computer systems and any subsequent crimes or changes to data/programs. It has three levels or sections of offence:- Section 1 A person is guilty of an

  • Word count: 1036
  • Level: GCSE
  • Subject: ICT
Access this essay

The impact of ICT on the environment

The impact of ICT on the environment The introduction of ICT promised many things including a paperless office and a global society. In this report I will be discussing whether these goals, and others, are achievable. In the late 70's IT promised people more free time due to the expansion of IT in society. It promised 20 hour weeks and the need for the leisure industry to expand due to the more hours available to working people. Now in the year 2002 looking at what was said this has not completely happened. Many people dream of 20 hour weeks but most are working more than they ever had before. The leisure industry has expanded though this seems to mostly be due to the need to relax more than people have got too much time on their hand. Automation has taken over some of the jobs that used to be done by humans. Robots and machines can now be used in factories producing clothes and cars therefore decreasing the need for unskilled workers making it more and more difficult for people with no formal qualifications to find good paying employment. An increase has been seen in the amount of people studying ICT in their own time, on online courses or at night school. People now realise the need for ICT skills to succeed anywhere in society, there is one main benefit to this; individual levels of training and education are constantly increasing. One way to overcome this problem of

  • Word count: 2079
  • Level: GCSE
  • Subject: ICT
Access this essay

Data Protection Act

Semester Two Lecturer: Stuart Merrick Contents Pages - Introduction 4 - Executive Summary 4 - Analysis - Subheadings - 5-24 .0 Question 1: 5-14 What is Data Protection Act (1998) and eight essential principles 1.1 First Principle 7 1.1.1 Conditions for processing (Schedule 2 of the Act) 8 1.1.2 Conditions of processing sensitive personal data 8 (Schedule 3 of the Act) 1.1.3 The fair Processing requirements 9 (Schedule 1 Part II paragraph 1 to 4) Paragraph 1 1.1.4 Paragraph 2 and 3 - Information to be provided to date 9 subject 2.1 Second Principle 10 3.1 Third Principle 10 4.1 Fourth Principle 11 5.1 Fifth Principle 12 6.1 Sixth Principle 12 7.1 Seventh Principle 13 8.1 Eighth Principle 14 .2 Question 2: 15-17 Freedom of information Act (2000) 1.2.1 What is a Publication Scheme 16 1.2.2 What new rights will the public have 17 .3 Question 3: Privacy and Electronic Communication (EC Directive) Regulation 2003 18-20 .4 Question 4: Privacy / Security of Medical Records 20-24 - Conclusion 25 - Bibliography Question 1: Data Protection Act (1998) and eight essential principles 26 Question 2: Freedom of information Act (2000) 28 Question 3: Privacy

  • Word count: 7021
  • Level: GCSE
  • Subject: ICT
Access this essay

Data Protection Act

Data Protection Act There are many laws and acts that have been passed since the introduction of ICT to the mainstream audience; these exist to maintain the safety and efficiency of computer and internet use. These laws are applied in many different locations such as in the workplace, school, colleges, universities and public places such as libraries or internet cafes. These laws are important as they ensure that the general well being of their computer presence is kept sustained. This unifying of the law and ICT has brought about several laws and acts that have been introduced at different times, these include: . Data protection act 2. Computer misuse act 3. Copyright, design and patents act 4. Health and safety at work act Other regulations: . EU 2. Internet code of practice 3. The regulation of inventory powers act (2000) The Data Protection Act The data protection act was first passed in 1984 and in 1998. It was made to accommodate for the growing amount of personal information on all the computer and the possible illegal misuse of that information. This law include all "data subjects", or any person with data about them stored on a computer and gives them any organisation's data. There are eight rules made by the data protection act. They say that any data held about a person must be: . fairly and lawfully processed; 2. processed for limited purposes; 3.

  • Word count: 1713
  • Level: GCSE
  • Subject: ICT
Access this essay

Health and Safety

Health and Safety . Stress! - Some people can't keep up with technology and they feel that they might be made redundant as they are unable to learn new skills. Due to ICT systems (e.g. email, mobile, fax, internet) it can be hard to forget about work and relax Amount of information on a system can make worker's feel like they can't cope- 'Information Overload!' Workers can be monitored on ICT systems and the feeling that you're being watched can cause stress 2) Repetitive Strain Injury (RSI) RSI is a general term for damage to fingers, wrist and other parts of the body due to repeated movements, resulting from overuse of a keyboard or a mouse. Tightness, aching and stiffness in arms, neck and shoulders Numbness, coldness or tingling in arm and hands. Loss of strength in hands. Preventing RSI Ergonomic Keyboards Raising the keyboard Wrist Supports Take Regular Breaks Use keyboard shortcuts instead of mouse. Exercise fingers and hands. 3) Eye Strain The eyes can become strained after staring at a monitor particularly if working in bad light or a flickering screen. This can also lead to headaches. Glare from the screen and poor quality images on old monitors make it hard for the eyes to focus Preventing Eye Strain Take Regular Breaks Work in a well lit room Reduce glare on Screen/Sun Adjust the contrast on screen. Buy a better, larger monitor. Make

  • Word count: 630
  • Level: GCSE
  • Subject: ICT
Access this essay

The Legislation that protects individuals and groups from the misuse of ICT.

Report 3e The Legislation that protects individuals and groups from the misuse of ICT. Introduction In this report, I will be writing about different legislations that protect individuals and groups from the misuse of ICT. The misuse of ICT , would be online hacking which is sometimes disguised as Trojan horse or spam mainly used for inappropriate reasons. ICT fraud and abuse are still posing major problems to public sector organizations and those who use their services, an in-depth survey shows. New technologies, like the use of handheld devices (PDAs) and wireless networking, are creating fresh risks that public services are only slowly reacting to. And, despite better ICT security systems, a 'culture of complacency' and a failure to ensure that staff understand the rules is undermining the effectiveness of ICT security arrangements. The survey, carried out in 2004 by the Audit Commission, is based on the responses of more than 400 public sector organizations, including NHS trusts, local authorities, police and fire authorities. 200 cases of ICT fraud and abuse were identified in the survey. The results are published in the report An Update on ICT Fraud and Abuse 2004. Since the last survey in 2001, the new report points to some improvement in ICT security, with security policies in place at 96 per cent of organizations. It also recorded a fall in the incidence of

  • Word count: 1549
  • Level: GCSE
  • Subject: ICT
Access this essay

The Legislation that protects individuals and groups from the misuse of ICT

Report 3e The Legislation that protects individuals and groups from the misuse of ICT. In this report I will be investigating the different legislations that protect individuals and groups from the misuse of ICT. Data Protection Act (1998) Data Protection Act is a law set in 1998 to protect the personal informal of individuals, not businesses. It includes how the information is obtained, held or disclosed to other people or organisations. This covers information stored digitally or in a paper-based storage system. The personal details of people are constantly being collected and recorded everywhere, ranging from the local supermarket to the online learning centre. The individual who have their personal data held about them - which is everyone, are called Data Subjects. The organizations or people who hold the Data Subject's data are called Data Users. Before collecting the data from the Data Subjects, the Data Users have to contact the Information Commissioner and do the following: * what data they want to store * what they want to use the data for * how long they are going to keep it for * who they are going to pass on the data to As well as following the rules above, the Data Users have to follow the eight Data Protection Principles. The act says that the data must: * be fairly and lawfully processed * be used for limited purposes * be adequate and relevant.

  • Word count: 2327
  • Level: GCSE
  • Subject: ICT
Access this essay

The legislation that protects individuals and groups from the misuse of ICT.

The legislation that protects individuals and groups from the misuse of ICT This act was introduced to help everybody n the work place to be safe while working and when it was introduced in 1974 many work places had to change their entire health and safety rules and regulations. Employers have got to > Take reasonable steps to ensure the health, safety and welfare of employees > Provide safe plant and machinery and safe premises > Safe system of work and competent, trained and supervised staff > Consult with employees on health and safety matters > Give information on basic health and safety requirements If the employer fails to cover these areas it could result in criminal prosecution in the magistrates court and sometimes go into the crown courts. If personal injury occurs the employer is held liable and could be sued by the injured party These regulations were introduced for employees who use VDUs for a significant amount of time while working to reduce repetitive strain injury, fatigue and eye problems which were very common occurrences in the 80s and early 90s. To abide by these regulations employers must > Analyse workstations and assess and reduce risks > Ensure workstations meet minimum requirements > Provide health and safety training for employees so they can use all areas of workstation equipment correctly > Arrange and pay for eye tests Its not only

  • Word count: 731
  • Level: GCSE
  • Subject: ICT
Access this essay

The Data Protection Act.

The Data Protection Act The Data Protection act is an act that came into force on 1 March 2000. It gives effect in UK law to the 1995 EC Data Protection Directive. The Act strengthens and extends the data protection regime created by the Data Protection Act 1984, which it replaces. The 1998 Act applies to: * Computerised personal data (like the 1984 Act); * Personal data held in structured manual files (new). It applies to anything at all done to personal data ("processing"), including collection, use, disclosure, and destruction and merely holding data. It was created to protect everyone's civil rights and the information that is kept on them by organisations. Principles of Data Protection The rules Anyone processing personal data must comply with the eight enforceable principles of good practice. They say that data must be: * Fairly and lawfully processed; * Processed for limited purposes; * Adequate, relevant and not excessive; * Accurate; * Not kept longer than necessary; * Processed in accordance with the data subject's rights; * Secure; * Not transferred to countries without adequate protection. Personal data covers both facts and opinions about the individual. It also includes information regarding the intentions of the data controller towards the individual, although in some limited circumstances exemptions will apply. With processing,

  • Ranking:
  • Word count: 465
  • Level: GCSE
  • Subject: ICT
Access this essay

The Data Protection Act

The Data Protection Act (1998) The 1998 Data Protection Act was introduced to control the way information is handled and to give rights to people who have information stored about them. It was introduced due to a number of reasons. Towards the end of the 20th century, computers were getting more and more powerful and government and companies began to use them with databases to store large amounts of information about people, such as their customers and staff. Computers were being used instead of paper to keep personal data about people (i.e. contact details). Also, it became easy to access information due to the ease of databases. Also as more and more companies used computers to store personal information, there was a risk that the information could be misused in the wring hands. The main principals of the Act are that data must be: * processed fairly and lawfully * used for the lawful purpose it was collected for * data must be relevant to purpose collected for * kept accurate and up-to-date * kept no longer than necessary * processed within the rights of the data subjects * kept secure * not transferred to other countries without protection We have much information held about us in many places. Without the Data Protection Act, personal information could be misused and shared with anyone, however the Data Protection Act ensures that the companies and

  • Ranking:
  • Word count: 872
  • Level: GCSE
  • Subject: ICT
Access this essay