• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  • Level: GCSE
  • Subject: ICT
  • Word count: 6079

The Legislation That Protects Individuals and Groups using IT. Use of It by myself and an adult in employment.

Extracts from this document...


3E - The Legislation That Protects Individuals and Groups from Computer Misuse of ICT In the final piece of unit 3, I will be investigating the laws and legislations which protect and affect the people through the ICT they use from units 3A to 3D. These legislations all aim to aid the public and aim to locate people breaking the legislation. They essentially moderate the use of technology to make sure they follow certain rules. They prevent exploitation of technology. The laws/legislative acts I will be talking about in this case are the Data Protection Act of 1998, the Computer Misuse Act of 1990 and the Copyright, Design and Patents Act of 1988. Data Protection Act 1998 What is it? The Data Protection Act is essentially a legislative act that aims to keep data regarding citizens of the country private and out of the hands of 3rd parties. This law is a 'United Kingdom Act of Parliament', meaning it was made in the UK and only affects citizens of the UK. It gives people a protection of their personal data, preventing a breach of human rights and promoting and enforcing freedom, freedom being the act of allowing citizens to keep their personal information in the hands of only those consented to. The UK government-using this act-aim in keeping data of customers, members, or other such relations to an organisation only within that organisation. This means that companies outside the organisation which aim to use this information for other reasons are not permitted to do so and this is inspected and punished in accordance to the Data Protection Act 1998. It abides by every UK citizen's fundamental right and right to privacy in respect to the processing of personal data. Individuals are given the ability to control information about them. In terms of technology, the data protection act gives the right to people who have personal information stored about them by any organisation(s). ...read more.


The victim would essentially be at the mercy of the hacker. Not just key logging but hackers can also access important files of their victim. This makes hackers very dangerous. They also often work to send viruses to people's computers. This is why the Computer Misuse Act was set up. The growth of technology also meant the growth of hacking and the malicious use of technology. With this act in place, hackers could face up-to 5 years in prison and an unlimited fine. Hacking is essentially trespassing into another's property but its potential misuse can be extremely high, hence such extreme charges. Brief history of the Computer Misuse Act The law was coined up after the case of Robert Schifreen and Stephen Gold in 1984-1985.They gained access to the account of a BT engineer, giving them the ability to explore the whole system and even access the personal message box of Prince Philip. With current laws, they would have been charged and fined quite a lot, but the current laws did not condemn what they had done. This is when Parliament made the decision to make new laws regarding hacking and thus, the Computer Misuse Act formed. What does it consist of? The Computer Misuse Act essentially makes the following things illegal: * Hacking - unauthorized people gaining access to computer networks * Data Misuse and unauthorized transfer or copying - file sharing * Copying and distributing software, music and film - Including copying CD's on your computer and sharing them on the internet * Email and chat room abuses - Impersonation and deception or spreading malicious rumours * p*********y - any material showing illegal acts stored on computers * Identity and financial abuses - Identity theft and misuse of credit cards and even printing counterfeit money * Viruses - programming and deliberately spreading viruses (Taken from pass-ict.co.uk) Some of these offences are also covered by the Copyright, Design and Patents Act. ...read more.


This stops money being essentially stolen from Sarah whose sales would have been bad due to the ease of downloads. 3D - Technology used by a community Library Libraries use copyright to allow them to distribute author's books to the public. Each free loan gets the government to give the author money so libraries are encouraged as the community are using books for free and the authors are getting credit and being paid for their work. Evaluation While this act is quite useful in stopping companies going bankrupt, it's still being broken on a day-to-day basis. Piracy has become so world-wide and common that it's incredibly hard to stop it altogether. Sometimes, the act is also unjustified in what it does. For example, while Limewire did allow people to download a lot of music for free, it was provided by Limewire peers meaning Limewire users themselves were the ones who spread the copyrighted media. The owners of Limewire are made to take the blame for all the apparent loss the copyrighted creators have accumulated. This, however, is entirely subjective as it doesn't mean that every download would have equated a purchase. Due to this, they are being sued for a ridiculous 72 trillion dollars. It shows that the law doesn't always work perfectly. Conclusion These three lawful acts all help keep the cyber world safe and justified. They are all bound by their own rules and help make technology easier for all kinds of people, including the community itself. And other than the three acts mentioned, there are also acts such as health and safety at work and health and safety regulations. These acts account towards the safety and health of workers. They account for what employees work with, the risk and formulate an ethical/moral response to their work from that. If a certain technology has the risk of giving cancer or producing radiation, then that has to be accounted and employees have to be given fair treatment. ?? ?? ?? ?? Name: Sadian Choudhury Candidate number: 7027 Leytonstone School 13411 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Marked by a teacher

    Ict and the law

    4 star(s)

    It means that the data they hold must abide to the 8 principles of the act. Both men also have information stored like I do; this means they have the same rights as me. The CMA helps to protect my user areas at home and school.

  2. The purpose of legislation is to control and regulate the use of ICT

    -Duration of copyright For literary, dramatic, musical or artistic works. 70yrs from the end of the calendar year in which the last remaining author of the work dies, or the work is made available to the public. Films 70 years from the end of the calendar year in which the

  1. The impact of ICT on the environment

    so that can be used to purchase resources, and if the company that they are working for want their employees to have the most recent hardware and software and also an internet connection they should provide them with extra money to help with the expenses.

  2. The Legislation that protects individuals and groups from the misuse of ICT

    If St. Richard's Hospital or Dr. Kumar fails to comply with any of the policies mentioned in the Data Protection Act, the data subjects can ask the Data Commissioner to intervene or they can sue the hospital. Computer Misuse Act (1990)

  1. ICT Legislation

    CD with them all on and sold them on to other people before they had reached Europe or the UK that would be against the copyright act. Most of these games which you can buy normally has that it should only be used by one person and not to be

  2. Assets table - recording the copyright information on the logos and pictures I used.

    The purpose of it is because it was a perfect sized picture of biscuits that I was able to use on my information point.

  1. 3E-The legislation that protects individuals and groups from the misuse of ICT

    data is going to be used for and who the data may effect or relate to. Under the Data Protection Act, if an individual was to face changes or deletion of data which relates to that specific person, the person can sue the company under the act and which can be a relatively serious matter.

  2. The legislation that protects individuals and groups from the misuse of ICT

    Clients are given the right to access all information that is stored about them and it can be changed if there are any mistakes. The data protection act gives a statutory responsibility to Mr. Clements for the storing of clients information, this means that the clients should have the assurance

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work