Legislation and ICT

Legislation and ICT Briefly summarise the key points regarding the 4 Acts of Parliament The Health and Safety Act of 1974 was set up as a means to protect employees, the public, management and stop safety hazards at work. This is achieved by enforcing strict guide lines that all it may affect must abide by. Failure to do so can result in punishment and fines. The Copyright, Designs and Patents Act 1989 makes it illegal to copy or steal software in order to protect the designer's prophets. This is done by placing a (c) symbol on all products protected by this act. Breaking this can result in legal action and possible imprisonment. The Data Protection Act of 1998 was developed to give protection and lay down rules about how data about people can be used for example criminal records and other such information. Breach of this act has serious consequences and can again result in imprisonment. The Computer Misuse Act 1990 stops the misuse of computers and communications systems for example: Hacking, Data misuse and unauthorised transfer or copying, Email and chat room abuses, Pornography and Viruses. Obviously this act is computer based so it is enforced by means of blocking and monitoring certain websites for breaches of the act. Doing so can result in a fine or imprisonment. How each Act protects each group Group Health and Safety at Work Act 1974 Copyright, Designs

  • Word count: 1202
  • Level: GCSE
  • Subject: ICT
Access this essay

Computers and the Law.

Computers and the Law Piracy Software piracy is the illegal copying of software either to sell or to use without permission. Copyright law makes it illegal to copy software without permission. Software companies suffer a great deal from piracy. A large amount of money is needed to research and develop new software and losing money due to piracy makes it harder for companies to develop new software. It also drives up the cost of software to the end-user to allow the companies to get back their development money. Software manufacturers often put a code which must be entered before the software can be used. This means that simply copying the disc is not enough, the unlock code also needs to be copied. While this is not foolproof it does put another obstacle in the way for the would be pirate. Some software also requires that the CD-ROM be in the CD drive when it is being used rather than installing the software on a number of computers from one disk. Back to Menu Hacking Hacking is the illegal access to other peoples computers. It is usually done via telephone networks like the Internet which can allow hackers to get access to computers anywhere in the world. Some hackers break into other peoples computer systems just for the pleasure of achieving something which is hard to do. Most hackers though do it for malicious reasons and set out to cause havoc. Hackers may steal

  • Word count: 1182
  • Level: GCSE
  • Subject: ICT
Access this essay

The social, legal, moral aspects of I.C.T. In this report, I am going to discuss some of the positive and negative effects of ICT in view of its social, economic, legal and moral implications.

Computers have and will continue to revolutionise every part of our day-to-day living. The use of ICT has made great improvement to our living. The use of ICT has made great improvements to be lives, and has done a lot of good for mankind. However, the use ICT regardless of its advantages also has its down sides. In this report, I am going to discuss some of the positive and negative effects of ICT in view of its social, economic, legal and moral implications. Social aspects are those effects that are made upon society, and how people behave and act towards each other. Moral issues arte those, which concern right and wrong. Economic issues are linked with employment and money. Finally legal aspects are those to do with the law. The social issues consist of:- . (information risk) and (information poor) * Not every one is able to afford a computer. * A two tie society could be created because of this people who are computer literate and those who are unable to exploit the technology. 2. The internet changing how we react * More people are shopping online and are communicating via email making people lazy. * Internet communication may make people lose their personal communication sills. 3. over reliance on technology * People rely too much on computers for the smooth running of society. 4. impact on literacy * People spend more time on the computer games and the

  • Word count: 1125
  • Level: GCSE
  • Subject: ICT
Access this essay

The Child Protection Act.

The Child Protection Act The child protection act is a legislation which was put in place to protect child from harm. So far in society it has worked well to protect children from many forms of violence but it has been discussed that there are many inadequacies and that it is in need of reform. This assignment will state what the protection order is and what it does, the problems arising with it and what changes can be made to improve it. The old Legislation The Child protection bill of 1998 is a legislation which states that a child is in need of protection if s/he is suffering harm, is at unacceptable risk of suffering harm and does not have a parent willing and able to protect them from harm. This includes situations where the child is at risk from his parents, from others inside the house where he lives, from others outside the house where he lives and from themself. The current legislation The current legislation is much like the old legislation except that there are some reforms that have been put into place. The Child protection Act of 1999 states that there are new rights of people reporting the suspected abuse and that there is a charter of rights for child care. When an investigation is being conducted and the investigator believes that it is important that the child does not return home until the end of the investigation due to there being a threat of

  • Word count: 1112
  • Level: GCSE
  • Subject: ICT
Access this essay

Computers and the Law.

COMPUTERS and the LAW Software Copyright It is illegal under the Copyright Designs and Patents Act 1989 to copy software in breach of a licensing agreement. Licensing Agreements When buying software, you do not become the owner of the software itself - you are buying a license that permits you to use the software. There are a variety of different licensing agreements:- * Single-user license - this covers the use of software by one person. The individual is usually permitted to copy the software once, so that they have a backup. Also, they may be able to use the software on two different machines, say a home PC and a portable laptop, as long as both copies aren't used at the same time! * Multi-user license - this covers the use of software by several people and is the kind of license bought by small to medium-sized organisations where, typically, five to twenty people may be using the software. The multi-user agreement will often state the maximum number of copies that the license buyer may make. * Site license - this covers the use of the software over a site, but the agreement will often state a maximum number of copies that can be made. Computer Misuse Act 1990 This act is concerned with unauthorised access to computer systems and any subsequent crimes or changes to data/programs. It has three levels or sections of offence:- Section 1 A person is guilty of an

  • Word count: 1036
  • Level: GCSE
  • Subject: ICT
Access this essay

Ict and the law

ICT in the Law Data Protection Act 1998 The data protection act is there to keep people safe from identity theft. It also helps the police identify the criminals and stop them. This benefits people like me because it keeps my personal information safe when I use it on the internet and give my details when subscribing to a website. The act keeps my details safe from theft. Schools and colleges that I have been to have my personal information. They have my phone numbers and addresses. The Data Protection Act protects this information so it cannot be stolen. This means that they cannot give out any of my information to other people. My doctor also has my information. He has my address, phone number and medical records which are kept safe on a database so my details aren't stolen. My bank also has my details. It has my name, age, numbers and addresses. It also has my account details which need to be protected from thieves so my money is safe. Personal data must be got fairly and lawfully. It was brought in because more and more organisations were starting to hold people's personal information on computers. This was a problem because nobody knew who was holding their information. Data users must register all their purposes on a national register held by a Date Protection Commissioner and the data can only be used for that purpose. The second act was brought in after more people

  • Word count: 997
  • Level: GCSE
  • Subject: ICT
Access this essay

Data protection act

Data protection act The data protection act protects data from being stolen. For example peoples personal data. The data protection act was brought down to parliament to control the way information is handled and to give legal right to people who have information stored about them. The data protection act is a law to protect your personal data stored on your computer. The law was passed by parliament to control the way data is stored. The law is useful because no one can legally see your data other than your self or someone you want to show any data to. If some one tried to 'hack' into some of your data, they would be doing so illegally and if they were caught they would most likely to be sent to jail. The computer misuse act The computer misuse act was made to protect people from hackers and crackers. The law prevents hackers from sending viruses that could damage other people's computers. But the law still has flaws in it; some people use the loopholes and others, knowing the law hack anyway knowing the risks and penalties of being caught. The computer misuse act also lets you view data about your self, and if you want to you can request to have it deleted. The computer misuse act protects people's network from being hacked into. For example peoples passwords being found out. This also prevents hackers (people who get into a network with out being authorized. Even

  • Word count: 975
  • Level: GCSE
  • Subject: ICT
Access this essay

The legislations that protects individuals and groups from the misuse of ICT

The legislations that protects individuals and groups from the misuse of ICT Legislation means the laws that are passed by parliament. Over the years many things have changed and as thins change new laws are created to prevent misuse. Computers have been developed and have become very popular and as the use of computers increases the amount of information stored in them will also increase i.e. bank details, credit card information, personal information and such. This information can be obtained and can cause harm to individuals and for this reason the following laws have been introduced to prevent this from happening: The Data Protection Act (1998) The data protection act was established in 1998 and has 8 principles: . processed fairly and lawfully 2. used for the lawful purpose it was collected for 3. adequate and relevant to purpose collected for 4. kept accurate and up-to-date 5. kept no longer than necessary 6. processed within the rights of the data subjects 7. kept secure 8. kept only within the EEC. This basically means that it however sensitive the information held by a company is about a person, that information must only be used for the reason it was collected. This law applies to all businesses and organizations and all the records that ate kept. Unfortunately there are some exemptions for this ACT. If you process data for personal, family or

  • Word count: 930
  • Level: GCSE
  • Subject: ICT
Access this essay

The main purposes of legislation covering working with and using ICT.

The main purposes of legislation covering working with and using ICT This assignment will cover the main purposes of legislation that is involved with ICT and the advantages and disadvantages of the laws covering and ICT. The Data Protection Act The first Data Protection Act was introduced in 1984. A new Data Protection Act that changed the law to meet the requirements of the European Union replaced this in 1998. The Data Protection Act gives rights to individuals about whom information is stored. Individuals may find out information about themselves, challenge it and claim compensation in certain circumstances. It is the act that enables them to do this. The Act places legal requirements on those who store and use personal data. They must let everyone know about their use of data and follow the data protection principles. These eight principals consist of: - . Be obtained and processed fairly and lawfully 2. Be held and processed only for the lawful purposes described in the register entry 3. Be used only for those purposes and only be disclosed to those people in the register entry 4. Be adequate, relevant and not excessive in relation to the purpose for which they are held 5. Be accurate and, where necessary, kept up to date 6. Be held no longer than is necessary for the registered purpose 7. Be surrounded by proper security 8.

  • Word count: 927
  • Level: GCSE
  • Subject: ICT
Access this essay

Laws and Legislations (ICT)

Laws and Legislations Laws and legislations were introduced due to the fact that ICT was growing and since the uses of large computerized databases as they became quite useful for sensitive personal data to be stored without the individual's knowledge. Employers, credit card companies or insurance companies, could access this confidential data. Therefore personal privacy is important as it is our human right to not want personal information on age, religious beliefs, family circumstances or academic qualifications to be accessed by others without permission. An Individual User An individual user would use various software applications in everyday life throughout ICT. The main uses of ICT software are: > E-mail > Internet > Mail merge > Excel > FrontPage > Access Due to the increased of the amount of information available particularly on the Internet it has been a concern for the interest taken by hackers into and stealing data therefore the government had to produce may different legislations to prevent this from occurring. Legislations were also created for the misuse of data and viruses as well. Before 1990 there wasn't a law against any misuse of computers so it was legal to send a virus to someone's computer. Since then there have been several legislations, which have come into place that prevent this from happening. Suitable

  • Word count: 923
  • Level: GCSE
  • Subject: ICT
Access this essay