3E-The legislation that protects individuals and groups from the misuse of ICT

3E-The legislation that protects individuals and groups from the misuse of ICT In my prior tasks, I have written an in depth report on the enhanced development of an array of technologies which effects and have provided numerous of opportunities for everyone whether they are studying in school (like me), in employment, individuals with special particular needs or generally the whole community. Task 3A is a detailed report on the technologies I use on a daily basis. These large numbers of technology have proven to better meet my personal, social and work related needs. For instance, having access to the World Wide Web has ensured that I am able to gain efficient research for school work somewhat then going to the local library and finding a specific book which relates to the topic I am studying at school. The World Wide Web Is much easier and generally less time consuming for me. I can access the World Wide Web and retrieve ample of information that's needed for my school work rather then having to proceed with the hassle of going to the library and searching for the specific book related to the topic I may currently studying at school. The technology is available for all my needs and wants and has proven to provide exciting opportunities. Similarly, task 3B is a particularize report of the technologies Mr. Obrien uses in his everyday life. The numerous quantity of

  • Word count: 12524
  • Level: GCSE
  • Subject: ICT
Access this essay

ICT AND SOCIETY

ICT AND SOCIETY Introduction In this coursework I will be describing the different Acts designed for different purposes to protect individuals, the community, people with special needs and the working adult. I will be talking about the Data Protection Act 1984 later changed to 1998, The Computer Misuse Act 1990, The Freedom of Information Act 2000 and The Copyright Design and Patterns Act 1989. All these Acts are deigned for the benefit of individuals as it restricts them from breaking some of the laws which is illegal. Task1 The Data Protection Act 1998 The Data Protection Act was developed to give protection and lay down rules about how data about people can be used. Usually this data is stored on a computer. The Data protection Act(DPA) is a United Kingdom Act of parliament that provides a legal basis and allowing for the privacy and protection of data of individuals in the UK. The act places restrictions on organisations which collect or hold data which can identify a living person. The Act does not apply to domestic use e.g. keeping a personal address book. Data collected by any person or organisation may only be used for the specific purposes for which they were collected. Personal data may only be kept for an appropriate length of time and must not be disclosed to other parties without the consent of the data owner, unless there is legislation or other

  • Word count: 9617
  • Level: GCSE
  • Subject: ICT
Access this essay

Data Protection Act

Semester Two Lecturer: Stuart Merrick Contents Pages - Introduction 4 - Executive Summary 4 - Analysis - Subheadings - 5-24 .0 Question 1: 5-14 What is Data Protection Act (1998) and eight essential principles 1.1 First Principle 7 1.1.1 Conditions for processing (Schedule 2 of the Act) 8 1.1.2 Conditions of processing sensitive personal data 8 (Schedule 3 of the Act) 1.1.3 The fair Processing requirements 9 (Schedule 1 Part II paragraph 1 to 4) Paragraph 1 1.1.4 Paragraph 2 and 3 - Information to be provided to date 9 subject 2.1 Second Principle 10 3.1 Third Principle 10 4.1 Fourth Principle 11 5.1 Fifth Principle 12 6.1 Sixth Principle 12 7.1 Seventh Principle 13 8.1 Eighth Principle 14 .2 Question 2: 15-17 Freedom of information Act (2000) 1.2.1 What is a Publication Scheme 16 1.2.2 What new rights will the public have 17 .3 Question 3: Privacy and Electronic Communication (EC Directive) Regulation 2003 18-20 .4 Question 4: Privacy / Security of Medical Records 20-24 - Conclusion 25 - Bibliography Question 1: Data Protection Act (1998) and eight essential principles 26 Question 2: Freedom of information Act (2000) 28 Question 3: Privacy

  • Word count: 7021
  • Level: GCSE
  • Subject: ICT
Access this essay

Privacy and Data Protection: IT Law

IT Law (Public Law Aspects) Seminar 4: Privacy and Data Protection Seminar Paper: The matter of transfer of personal data to a third country particularly in relation to the differences between the EU and the US; The Safe Harbor Principle Teacher: Dr. Gerrit Betlem and Mr. Martin Truman Student: Katharina v. Boehm-Bezing I. Introduction .) An old issue, growing in importance Searching the web, one can see that privacy on the Internet is a big issue. Countless US or EU based human rights initiatives are fighting for the right to privacy. What is the reason for this? Although concerns about consumers' ability to protect their privacy have been in existence for decades, the Internet makes the issue more delicate: Businesses have access to a larger audience, which allows them to collect more data from more people. Furthermore, collection of more specific behavioural information is possible attaching cookies to a hard drive, reporting which websites someone enters.1 In addition, data collection and storage having become much easier, faster and cheaper, cost concerns do not limit data-collection practices.2 At the same time, the market for information about consumers and consumer behaviour is continuously growing, side by side with the expansion of e-commerce. 2.) Definition of the issue Privacy can be defined as "the right of the individual to be protected against

  • Word count: 6759
  • Level: GCSE
  • Subject: ICT
Access this essay

The Legislation That Protects Individuals and Groups using IT. Use of It by myself and an adult in employment.

3E - The Legislation That Protects Individuals and Groups from Computer Misuse of ICT In the final piece of unit 3, I will be investigating the laws and legislations which protect and affect the people through the ICT they use from units 3A to 3D. These legislations all aim to aid the public and aim to locate people breaking the legislation. They essentially moderate the use of technology to make sure they follow certain rules. They prevent exploitation of technology. The laws/legislative acts I will be talking about in this case are the Data Protection Act of 1998, the Computer Misuse Act of 1990 and the Copyright, Design and Patents Act of 1988. Data Protection Act 1998 What is it? The Data Protection Act is essentially a legislative act that aims to keep data regarding citizens of the country private and out of the hands of 3rd parties. This law is a 'United Kingdom Act of Parliament', meaning it was made in the UK and only affects citizens of the UK. It gives people a protection of their personal data, preventing a breach of human rights and promoting and enforcing freedom, freedom being the act of allowing citizens to keep their personal information in the hands of only those consented to. The UK government-using this act-aim in keeping data of customers, members, or other such relations to an organisation only within that organisation. This means that companies

  • Word count: 6079
  • Level: GCSE
  • Subject: ICT
Access this essay

Examining safety and security - accuracy checks

ELEMENT C4 IS TO EXAMINE SAFETY AND SECURITY ISSUES Accuracy Checks Accuracy checks must be applied to data handling activities. All data that is entered into ANY computer is useless if it is incorrect or inaccurate. A common phrase used in the computer world is 'garbage in, garbage out'. Manual systems lack accuracy checks that are available on computerised systems and so rely heavily on the operator to proof-read and check visually. The purpose of "Accuracy checks", such as a spell-checker on MS WORD is to reduce errors, Although errors are not eliminated completely. Validation "Valid" is another word for suitable. Certain things must be suitable or valid for their purposes. If you insert a Tesco club card into a cash withdrawal machine you will not get a response because it is not VALID for its purpose. So what is the relevance for a computer system? Two very important validation checks are type and range: Type Check In a data base, such as the ones we can use in MS Access, if a field has been designed for numbers, the computer will not accept letters in that field. If a field has been designed to accept a choice of colours - red, blue, green, yellow - it will not accept any other colour in that field. Clearly, it is still possible for the data entry clerk to make errors but some errors will be immediately apparent: Data to be entered Data actually entered

  • Word count: 5122
  • Level: GCSE
  • Subject: ICT
Access this essay

Data Protection Issues – Compliance Within Computing Organisations, The Causes, Effects and Consequences.

Project and Professional Studies Unit Data Protection Issues - Compliance Within Computing Organisations, The Causes, Effects and Consequences. Page . Introduction to the data protection bill 1998 2 .1 The Eight Principles of The Data Protection Act 2 i. Fairly and lawfully processed 2 ii. Processed for one or more limited lawful purposes 2 iii. Adequate, relevant and not excessive 2 iv. Accurate and valid and where necessary kept up to date 3 v. Personal data processed for any purpose shall not be kept longer than deemed necessary 3 vi. Processed in accordance with the data subject's rights under this Act 3 vii. Securely protected by appropriate technical and organisational measures 3 viii. Personal data will not be transferred to Countries without adequate protection 3 2. Registration For Data Protection Act 4 3. Exclusions and Exceptions 4 4. Typical Example Of Active Data Protection Environments 5 Employer/Employee Relationships 5. Enforcement Of Data Protection 5 6. Implications For System Designers 6 Protection from potential dangers 7. Implications For Customers 8 The Fear Off Online Transactions 8. Summary 9 APPENDIX THE PROBLEMS WITH DATA PROTECTION AND NEW TECHNOLOGY EXAMPLE 1 - Marks and Spencers deny security threat. 10 EXAMPLE 2 -

  • Word count: 4127
  • Level: GCSE
  • Subject: ICT
Access this essay

Planning and Deadlines

.1 PLANNING AND DEADLINES Purpose of planning For an information technology project to go smoothly, it must be planned well. Without such planning the project might not be completed in the time available or it might be over budget. To be able to plan a project successfully, it is necessary to break it down into a series of smaller tasks and determine the order of which these smaller tasks need to be done. The time and resources needed for each of these smaller tasks also need to be estimated. The tasks then need to be divided among the other team members. Deadlines A deadline is a date set by the senior management of a company, by which the project should be completed or reach a certain predetermined milestone. The milestones or mileposts mark the end of logical stages in the project, and their main purpose is to establish whether the project is on time or not. In business deadlines are very important and everyone involved in the project needs to be constantly aware of them. Planning activities should be centred on achieving the preset deadlines. .2 Consistent layout, spaces, tabs and indents Consistent layout and spacing It is possible to alter the way a document looks by formatting all or part of it. Most documents are typed with single spacing, which has no blank lines between the lines of typed texts. Double spacing is often used if a document needs to be sent

  • Word count: 3963
  • Level: GCSE
  • Subject: ICT
Access this essay

The Data Protection Act 1998 - questions and answers

The Data Protection Act 1998 The Data Protection Act 1998 is a security issue. The seventh Data Protection Principle requires adequate security measures to protect personal data; while the eighth Principle prohibits the export of such data to countries outside of the EU that do not have an adequate level of data protection for data subjects (at the moment, this includes the USA). And on top of this, individual company directors can be held liable. Nevertheless, the new Data Protection Act is still little understood - so we asked Elaine McKinney, a solicitor with MacRoberts, to give us an overall picture of this new law. Why do we need a Data Protection law? Due to the explosion in use of computers concerns were expressed that information was being processed about individuals without their knowledge and without the ability to have access to that information or correct it if it was wrong. The Data Protection law attempts to maintain a balance between the rights of individuals and the ability of others to process information about them. What is the law in the UK? The Data Protection Act 1984 will soon be replaced by the Data Protection Act 1998 ('the 1998 Act'). The 1998 Act is being introduced to allow the UK to comply with its European obligations. The UK is late in introducing the new law and no firm date has yet been set for it to become law. So, is the new law in

  • Word count: 3933
  • Level: GCSE
  • Subject: ICT
Access this essay

Legal Aspects of Using Information Technology

Legal Aspects of Using Information Technology The widespread use of information technology has brought us a number of benefits and problems, too. As information technology has spread, so have computer crime and abuse. For example, the internet is not only used by the innocent members of the public, but also by fraudulent traders, paedophiles, software pirates, hackers and terrorists. Their activities would include: placing computer viruses, software bootlegging, credit card fraud and money laundering schemes. Hackers A hacker is an individual who break codes and passwords to gain unauthorised access to data held on computer systems. When hackers gain unauthorised access to computer systems, they can do a huge amount of damage. Stand-alone computers are safe because, there is no connection for the hackers to break into. However, computers which are connected to networks or modems are at more risk from hacking. The only way of protecting the computer systems from being broken into, is by changing the passwords at regular intervals. Computer Fraud Computer fraud is when computer operators use the computer to their own advantage. It is difficult to track down these offenders for the following possible reasons: * They are often clever * They might be young with no previous criminal records * When fraud is discovered in a business, it is often not publicised, because the

  • Word count: 3890
  • Level: GCSE
  • Subject: ICT
Access this essay