10.9 The Legal Framework
| Specification Content/Learning Outcomes |
The Legal Framework looks at the issues relating to the current laws affecting IT related systems. These currently fall into two areas: illegal use of data and health and safety at work. The Legal Framework
Software and data misuse
Data protection legislation
|
Resources - The Legal Framework
| Key to resources: |
|
PowerPoint presentation | Word file | Acrobat file | ||
| Internet resource |
Note: Some of materials referenced here were written specifically for the OCR specification. They're included here because they're a very good source of extra revision. Just make sure you have a current AQA specification in front of you when using these resources! For OCR devotees this page seems to be most relevant to module content 5.1.6.
| Resource |
Type |
Size |
Notes |
| The Legal Framework |
|
n/a | Alcester Grammar School links covering this topic |
| Data Protection Act |
|
52KB | Notes from David Yates. |
| Data Protection Act - Case Studies |
|
22KB | Case studies from David Yates. |
| The RIP Act |
|
42KB | Notes from David Yates. |
| Data Protection Act Website |
|
n/a | Home page of the Information Commissioner |
| Data Protection Legislation |
|
146KB | Short PowerPoint presentation based on Heathcote Ch.12 |
| ICT Legislation |
|
n/a | Notes from Mark Hunter Computing |
| ICT Legislation OCR |
|
165KB | Great PowerPoint from OCR ICT. Covers everything and more! Thanks to Glen Millbery. |
Add/suggest new resources - Click here to suggest new resources relevant to this topic. Do NOT add attachments e.g. Word documents to your suggestions as these will be discarded.
Reading - The Legal Framework
Texts other than Heathcote can be found in the ICT section of the Library
Resource Centre.
| Key to reading: | Heathcote - Core Text | Internet resource | Other book | |||
| Handout/worksheet |
| Reading |
Type |
Size |
Notes |
| Protecting IT Systems |
|
n/a | Heathcote Ch.11 Pages 50 - 53 |
| Data Protection Legislation |
|
n/a | Heathcote Ch.12 Pages 54 - 57 |
| Computer Crime and the Law |
|
n/a | Heathcote Ch.10 pages 44 - 49 |
| Data Protection Act |
|
n/a | Steve Longley's excellent notes. Allow the page to load fully. |
| The Legal Framework |
|
n/a | Greenwood School. Scroll down to the relevant links in 10.8 |
| Computer Misuse Act |
|
n/a | De Watteville & Naughton Page 172 |
| The Legal Framework |
|
n/a | Doyle Ch.3 Pages 55 - 76 |
| ICT Legislation OCR |
|
46KB | Excellent revision resource from Martin Smith. |
| Computer Misuse Act2 |
|
26Kb | Handout from Alcester Grammar School. |
| Copyright |
|
30Kb | Handout from Alcester Grammar School. |
Practice questions/homework - The Legal Framework
| Key to questions: | Past exam question | Heathcote question |
|
Other question | ||
| FatMax assignment | Smokin' Dog assignment | |||||
| Reference |
Type |
Size |
Question |
| 1. January 2001 ICT1 Question 8 |
|
n/a | (a) State five of the
principles of the 1998 Data Protection Act. (5)
(b) Describe two exemptions to the 1998 Data
Protection Act. (4) |
| 1. May 2001 ICT1 Question 10 |
|
n/a | (a) State why an organisation
must apply for entry on to the Data Protection Register. (1)
(b) State three items of information that must
be provided by the data user about the data that is to be stored. (3) |
| 3. January 2002 ICT1 Question 7 |
|
n/a | Data protection legislation
was introduced into the UK in 1984; it has since been superseded by the 1998
Act. (a) State why the legislation was originally introduced. (1) (b) State what type of data is the subject of the Data Protection Act 1998. (2) (c ) A company wishes to collect data from order forms submitted by its customers to sell to other companies. State two actions that the company must take so that it can legally collect and sell that data. (2) (d) The Data Protection Act gives individuals the right to see what data is being held about them. (i) State how an individual must ask to do this. (1) (ii) Could an individual have to pay to
receive a copy of his or her data? (1) |
| 4. Homework question from David Yates. |
|
n/a | The term “data protection”
covers the maintenance of the integrity, quality and ownership of data
handled by information technology systems. There are many ways to protect
data, and there is also legislation to ensure that data is kept private and
secure.
Discuss the Data Protection Act 1984, including reference to:
(15 marks) |
| 5. May 2001 ICT1 Question 7 |
|
n/a | (a) Describe what is meant by
a software licensing agreement. (2) (b) Mr Patel has a single user software licensing agreement for a word processing package which specifies that there must only be one copy in use at any one time. Would he be guilty of breaking the agreement if he installed the package on his laptop PC, as well as on his stand-alone PC at work. Explain your answer. (2) (c) A college network has a server and 20 stations. What type of licensing agreement would be suitable for a word processing package that may be used at the same time on all 20 stations? (2) (d) Breaking the licensing agreement is one type of offence that a computer user can commit. Some other offences are covered by the Computer Misuse Act. Explain, using examples, level 1, 2 and 3
offences under the Computer Misuse Act. (9) |
| AS Modules | ICT1 | Links | Top | Home | FatMax1 |
Copyright/Disclaimer - I think everyone whose work appears on this site has been properly credited. If not, get in touch and I'll make the necessary amendments. FatMax 2002.