ICT LEGISLATIONS

ICT LEGISLATIONS THE DATA PROTECTION ACT 1998 The Data Protection Act protects the personal data which is stored about you by different people .The 8 principles of the act are : * Processed fairly and lawfully * Processed for limited purposes * Adequate relevant and not excessive * Accurate * Not kept for longer than necessary * Processed in accordance with the individual's rights * Kept secure * not transferred to countries without adequate protection. Schools have permission from the home office and parents to know every thing about you whether it your mums name or you brothers. The police and the home office also have all our personal information. Teachers and anyone else who has your personal information cannot tell anyone anything about you. There have been many people who have been prosecuted for disobeying the data protection act and here is one example. In 1995 the ODPR brought a case against a manger of the Woolwich Building Society for disclosing personal data to a person not sanctioned by the Woolwich's data protection register entry. This was a case, therefore, of the Woolwich, through one of its staff operating outside the terms of its registration. The manager had been trying to trace a Woolwich customer who was allegedly in arrears with her Woolwich mortgage. In doing so the manager disclosed to a tenant of the customer that she was in arrears. The

  • Word count: 1639
  • Level: GCSE
  • Subject: ICT
Access this essay

E-Commerce is the buying and selling of products using an electronic service. Discuss.

E-Commerce Electronic Commerce, also known as E-Commerce is the buying and selling of products using an electronic service e.g. internet. More and more people everyday are buying over the internet as it is a much easier way of shopping for the things that you want. E-Commerce covers a lot of things such as electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. However, it isn't only buying products from a certain site e.g. Amazon, EBay but also upgrading an account from a standard to a premium account such as Megavideo. This type of E-Commerce is called "business to consumer", whereby the business is selling to the public instead of a certain business. Some common applications related to electronic commerce are the following: * Email * Enterprise content management * Instant messaging * Newsgroups * Online shopping and order tracking * Online banking * Online office suites * Domestic and international payment systems * Shopping cart software * Teleconferencing They way E-Commerce works is simple. It all starts from the customer buying the product from their computer off an E-Commerce website. This is then processed through the World Wide Web and inserted into the shopping cart program. The customer then is lead

  • Ranking:
  • Word count: 497
  • Level: GCSE
  • Subject: ICT
Access this essay

Computers and the Law.

Computers and the Law Piracy Software piracy is the illegal copying of software either to sell or to use without permission. Copyright law makes it illegal to copy software without permission. Software companies suffer a great deal from piracy. A large amount of money is needed to research and develop new software and losing money due to piracy makes it harder for companies to develop new software. It also drives up the cost of software to the end-user to allow the companies to get back their development money. Software manufacturers often put a code which must be entered before the software can be used. This means that simply copying the disc is not enough, the unlock code also needs to be copied. While this is not foolproof it does put another obstacle in the way for the would be pirate. Some software also requires that the CD-ROM be in the CD drive when it is being used rather than installing the software on a number of computers from one disk. Back to Menu Hacking Hacking is the illegal access to other peoples computers. It is usually done via telephone networks like the Internet which can allow hackers to get access to computers anywhere in the world. Some hackers break into other peoples computer systems just for the pleasure of achieving something which is hard to do. Most hackers though do it for malicious reasons and set out to cause havoc. Hackers may steal

  • Word count: 1182
  • Level: GCSE
  • Subject: ICT
Access this essay

The Data Protection Act 1998 - questions and answers

The Data Protection Act 1998 The Data Protection Act 1998 is a security issue. The seventh Data Protection Principle requires adequate security measures to protect personal data; while the eighth Principle prohibits the export of such data to countries outside of the EU that do not have an adequate level of data protection for data subjects (at the moment, this includes the USA). And on top of this, individual company directors can be held liable. Nevertheless, the new Data Protection Act is still little understood - so we asked Elaine McKinney, a solicitor with MacRoberts, to give us an overall picture of this new law. Why do we need a Data Protection law? Due to the explosion in use of computers concerns were expressed that information was being processed about individuals without their knowledge and without the ability to have access to that information or correct it if it was wrong. The Data Protection law attempts to maintain a balance between the rights of individuals and the ability of others to process information about them. What is the law in the UK? The Data Protection Act 1984 will soon be replaced by the Data Protection Act 1998 ('the 1998 Act'). The 1998 Act is being introduced to allow the UK to comply with its European obligations. The UK is late in introducing the new law and no firm date has yet been set for it to become law. So, is the new law in

  • Word count: 3933
  • Level: GCSE
  • Subject: ICT
Access this essay

Different legislations that protect people from the misuse of ICT.

Report 3E. Introduction: In this report I am going to talk about 3 different legislations that protect people from the misuse of ICT. The legislations are all laws that are in working progress and all of them can if broken carry a prison sentence or a fine with them. Data Protection Act (1998): The Data Protection Act 1998 sets out to protect the privacy of personal information. It only covers personal information about living individuals, not about businesses. It covers data stored on computer or in a paper-based filing system. It lets people check what data is being held about them. The Data Protection Act 1998 sets out to protect the privacy of personal information. It is run by the Information Commissioner's Office. These are the 8 principles of the Data Protections Act: . Fairly and lawfully processed (used) 2. Used for limited purposes 3. Adequate and relevant. Only what is needed may be used 4. Accurate 5. Not kept for longer than is necessary 6. Accessible to the individual and able to be corrected or removed where necessary 7. Secure 8. Not transferred to countries without adequate protectioIn report 3B Dr Pratab used to input his clients personally information such as house address etc in to his computer. He has to make sure that no one else could get into his computer and that he kept his log in name and password secure and to himself meaning no

  • Word count: 1672
  • Level: GCSE
  • Subject: ICT
Access this essay

ICT Legislation

Legislation Acts for ICT ICT equipment now have laws which everyone must abide by, they can still use their ICT to their every needs but they cannot exploit this use by accessing areas of information or data which are not meant to be seen by the public eye. This mainly includes things like government data and other people's personal information. The 1998 Data Protection Act The data protection act is basically the "right to privacy" .This is what everyone who has personal details and so forth on their pc expects since you don't want other people accessing your information. The data protection act was made a law in 1984 but it was replaced by a new one, the act in 1998 that included the European Union law. There are 8 principles for personal data: . Be processed fairly and lawfully 2. Be obtained for specified and lawful purposes 3. Be adequate relevant and not excessive for the purpose 4. Be accurate and up-to-date 5. Not to be kept longer than necessary 6. Be processed within the rights of data subjects 7. Be kept secure against loss damage and unauthorised and unlawful processing 8. Not be transferred to countries outside the European Economic Area. These are the 8 areas in which the data protection act is in control of. Say for example I had bank account details on my pc and I was exchanging bank details over the internet no one beside me should be able to

  • Word count: 1923
  • Level: GCSE
  • Subject: ICT
Access this essay

You have to explain how you have looked after the equipment and ensured its safety. You have shown how you have back up information. I have looked up my computer by starting it up

20th March 2006 GCSE Coursework Task You have to explain how you have looked after the equipment and ensured its safety. You have shown how you have back up information. I have looked up my computer by starting it up correctly, by turning on the hard drive and then turning on the monitor once the monitor has received signal. I log on using my correct username and password so it doesn't cause distress to the system. Whilst on the computer I do as asked and when on the Internet I don't open up too many windows to make the computer stay as fast as it is supposed to run at. When I am finished I shut down the computer and turn off the monitor. Then I place the keyboard on top of the monitor and place the mouse-mat on top, to protect the keys. Then I place the mouse on top of the mat. Ensuring the computer's and the person using its safety includes: * Inspections - desk's, chairs, computers. * Training - students are taught how to use equipment properly. * Job Design - Correct software and being designed to do the job. * Eye Tests - People using computers on regular occasions should have regular eye tests. Testing against any deficiencies the computer may cause. There are illnesses you can get from computers and problems that occur whilst using computers on regular occasions. Repetitive strain injury (RSI), backache, eyestrain, headaches and skin rashes are conditions that

  • Word count: 3588
  • Level: GCSE
  • Subject: ICT
Access this essay

Piracy. Many people have problems with piracy, some of them are the singers themselves and they claim that if you listen to their songs for free, then you should be providing some service for them too

Piracy Piracy has grown largely in the past decade and since I had my first computer, I've seen myself a significant increase in both - the piracy and the concerns about, unfortunately, the second is growing way faster... Many people have problems with piracy, some of them are the singers themselves and they claim that if you listen to their songs for free, then you should be providing some service for them too: 'If you have the right to download my music for free, then if you're, say, a plumber, then I have the right to call you up and demand that you fix my plumbing for free' - a "clever" comment by Metallica's singer. All of them have their own opinions, but the more annoying ones try to take action against piracy. First time I came to England in 2005 and before that, I didn't even know that licensed software is so expensive, I had very sincere opinion of my own that all those people who buy licensed software are just so stupid that it's unbelievable... it's just like throwing money out of the window and look at how wind carries them away. Until the age of 14, I haven't bought a DVD or CD game or film for more expensive than 5$, average price of my films and games was around 3$, I knew 100s of places where to buy these films and games and I didn't even think that there could be some legal issues to that. Those people who risk their freedom for uploading for everyone

  • Word count: 583
  • Level: GCSE
  • Subject: ICT
Access this essay

The legislation that protects individuals and groups from the misuse of ICT

Unit 3E; the legislation that protects individuals and groups from the misuse of ICT Introduction; I am going to investigate different legislations that affect the use of ICT, and look at how they affect in particular the people that I have studied in unit 3, I will consider what they have to do to abide by the law, how the piece of legislation protects them and how and what impact it has upon them. Since the introduction of the new technologies, new problems have been created, to tackle these problems certain legislation has been introduced, to allow protection for companies and individuals and to give authorities the power to combat the problems and misuses and where applicable make arrests. Data Protection Act of 1998 As the amount of information about people and their lifestyles held on computers increased, a need became apparent to control the way in that it was collected and stored, the previous ability to access large databases of information led to the introduction of the Data protection act. The data protection act is made up of eight different principles, these are the different points of the law that state what can and can't be done with regards to data, the eight principles are; - Data must not be acquired and processed unless there is a lawful reason to do so. - Data must be processed within the rights of the person supplying the data. - Data must only

  • Word count: 3293
  • Level: GCSE
  • Subject: ICT
Access this essay

Examining safety and security - accuracy checks

ELEMENT C4 IS TO EXAMINE SAFETY AND SECURITY ISSUES Accuracy Checks Accuracy checks must be applied to data handling activities. All data that is entered into ANY computer is useless if it is incorrect or inaccurate. A common phrase used in the computer world is 'garbage in, garbage out'. Manual systems lack accuracy checks that are available on computerised systems and so rely heavily on the operator to proof-read and check visually. The purpose of "Accuracy checks", such as a spell-checker on MS WORD is to reduce errors, Although errors are not eliminated completely. Validation "Valid" is another word for suitable. Certain things must be suitable or valid for their purposes. If you insert a Tesco club card into a cash withdrawal machine you will not get a response because it is not VALID for its purpose. So what is the relevance for a computer system? Two very important validation checks are type and range: Type Check In a data base, such as the ones we can use in MS Access, if a field has been designed for numbers, the computer will not accept letters in that field. If a field has been designed to accept a choice of colours - red, blue, green, yellow - it will not accept any other colour in that field. Clearly, it is still possible for the data entry clerk to make errors but some errors will be immediately apparent: Data to be entered Data actually entered

  • Word count: 5122
  • Level: GCSE
  • Subject: ICT
Access this essay