10.9 The Legal Framework

Specification Content/Learning Outcomes

The Legal Framework looks at the issues relating to the current laws affecting IT related systems. These currently fall into two areas: illegal use of data and health and safety at work.

The Legal Framework

  • This section applies to current British legislation and its relationship to the Council of Europe Convention directives

 Software and data misuse 

  • Describe the anti-hacking provisions of the Computer Misuse Act.
  • Describe the principles of software copyright and licensing agreements.

 Data protection legislation

  • Recall the nature, purpose and provisions of the current data protection legislation of the Public Register.
  • Recall the type of data covered and various exemptions from the legislation.
  • Describe the definitions of processing and consent to process.
  • Explain how the requirements of the legislation impact on data collection and use.
  • Describe the obligations of data users under the legislation.
  • Recall the rights of individuals under the legislation.
  • Recall the role of the Registrar in encouraging good practice, acting as Ombudsman and enforcing legislation.

Resources - The Legal Framework

Key to resources: PowerPoint presentation Word file Acrobat file
  Internet resource        

Note: Some of  materials referenced here were written specifically for the OCR specification. They're included here because they're a very good source of extra revision. Just make sure you have a current AQA specification in front of you when using these resources! For OCR devotees this page seems to be most relevant to module content 5.1.6.

Resource

Type

Size

Notes
The Legal Framework

n/a Alcester Grammar School links covering this topic
Data Protection Act

52KB Notes from David Yates.
Data Protection Act - Case Studies

22KB Case studies from David Yates.
The RIP Act

42KB Notes from David Yates.
Data Protection Act Website

n/a Home page of the Information Commissioner
Data Protection Legislation

146KB Short PowerPoint presentation based on Heathcote Ch.12
ICT Legislation

n/a Notes from Mark Hunter Computing
ICT Legislation OCR

165KB Great PowerPoint from OCR ICT. Covers everything and more! Thanks to Glen Millbery.

Add/suggest new resources - Click here to suggest new resources relevant to this topic. Do NOT add attachments e.g. Word documents to your suggestions as these will be discarded.

Reading - The Legal Framework

Texts other than Heathcote can be found in the ICT section of the Library Resource Centre.

Key to reading: Heathcote - Core Text Internet resource Other book
  Handout/worksheet        

 

Reading

Type

Size

Notes
Protecting IT Systems

n/a Heathcote Ch.11 Pages 50 - 53
Data Protection Legislation

n/a Heathcote Ch.12 Pages 54 - 57
Computer Crime and the Law

n/a Heathcote Ch.10 pages 44 - 49
Data Protection Act

n/a Steve Longley's excellent notes. Allow the page to load fully.
The Legal Framework

n/a Greenwood School. Scroll down to the relevant links in 10.8
Computer Misuse Act

n/a De Watteville & Naughton Page 172
The Legal Framework

n/a Doyle Ch.3 Pages 55 - 76
ICT Legislation OCR

46KB Excellent revision resource from Martin Smith.
Computer Misuse Act2

26Kb Handout from Alcester Grammar School.
Copyright

30Kb Handout from Alcester Grammar School.

Practice questions/homework - The Legal Framework

Key to questions: Past exam question Heathcote question

Other question
  FatMax assignment Smokin' Dog assignment

 

Reference

Type

Size

Question
1. January 2001 ICT1 Question 8

n/a (a) State five of the principles of the 1998 Data Protection Act. (5)

(b) Describe two exemptions to the 1998 Data Protection Act. (4)
(9 marks)

1. May 2001 ICT1 Question 10

n/a (a) State why an organisation must apply for entry on to the Data Protection Register. (1)

(b) State three items of information that must be provided by the data user about the data that is to be stored. (3)
(4 marks)

3. January 2002 ICT1 Question 7

n/a Data protection legislation was introduced into the UK in 1984; it has since been superseded by the 1998 Act.

(a) State why the legislation was originally introduced. (1)

(b) State what type of data is the subject of the Data Protection Act 1998. (2)

(c ) A company wishes to collect data from order forms submitted by its customers to sell to other companies.

State two actions that the company must take so that it can legally collect and sell that data. (2)

(d) The Data Protection Act gives individuals the right to see what data is being held about them.

(i) State how an individual must ask to do this. (1)

(ii) Could an individual have to pay to receive a copy of his or her data? (1)
(7 marks)

4. Homework question from David Yates.

n/a The term “data protection” covers the maintenance of the integrity, quality and ownership of data handled by information technology systems.  There are many ways to protect data, and there is also legislation to ensure that data is kept private and secure.

Discuss the Data Protection Act 1984, including reference to:

  • Objections to the Act
  • The information that should be recorded when registering with the Office of the Data Protection Registrar;
  • The likely future of the Act and the consequences for data owners/users as a result of the EU directive on Data Protection.

(15 marks)

5. May 2001 ICT1 Question 7

n/a (a) Describe what is meant by a software licensing agreement. (2)

(b) Mr Patel has a single user software licensing agreement for a word processing package which specifies that there must only be one copy in use at any one time. Would he be guilty of breaking the agreement if he installed the package on his laptop PC, as well as on his stand-alone PC at work. Explain your answer. (2)

(c) A college network has a server and 20 stations. What type of licensing agreement would be suitable for a word processing package that may be used at the same time on all 20 stations? (2)

(d) Breaking the licensing agreement is one type of offence that a computer user can commit. Some other offences are covered by the Computer Misuse Act.

Explain, using examples, level 1, 2 and 3 offences under the Computer Misuse Act. (9)
(15 marks)

 

AS Modules ICT1 Links Top Home FatMax1

Copyright/Disclaimer - I think everyone whose work appears on this site has been properly credited. If not, get in touch and I'll make the necessary amendments. FatMax 2002.

Hosted by www.Geocities.ws

1