Topic 6 - AQA INFO3 ICT

Legislation 

?

Health & safety legislation

  • Health and safety work act 1974 states that employers have a responsibility to make sure that there is minimum risk to employees in the workplace. This legislation was quite general and covers aspects such as carrying equipment. The display screen equipment regualtions 1992 was released to cover more specific aspects. 
  • The main health problems in the use of ICT is: stress, RSI, eye strain, general aches and radiation hazards.
  • The implications of regulations is that an ergonomic workstation is used. 
  • Procedures for risk analysis should be employed and this should be carried out periodically. Eyesight tests shoulld be payed for by the employer, Regular breaks should be taken. Training should be given.
  • Software should be desgined for usability and should have the following: shortcuts, adjustable font, clear error messages, macros etc. 
1 of 5

Data protection act legislation

  • The DPA 1998 put in a set of rules for data subjects and controllers. All data users have to register with the office of the data protection registrar. Anyone who processes personal information should make sure data is fairly and lawfully processed, processed for limited purposes, relevant, up to date, not kept longer than needed, processed in line with your rights, secure and not transferred to other countries without adequate protection. 
  • The data subject has the right to access data held on them, the right to be given compensation if data is inaccurate and compensation if data has been accessed by unauthorised users. 
  • The procedures created should include giving staff instructions on how to fairly and lawfully process data and making sure data is only kept for a limited time, make sure security is adequate,
2 of 5

Computer misuse act

  • CMA 1990 makes unauthorised access to computer material, computer system and the modification of computer material a crime. 
  • Unauthorised access to computer material could include using another's ID and password without proper authority, laying a trap to obtain a password or reading exam papers before exam times. 
  • Unauthorised access to a computer system with intent to commit a serious crime could include using a computer to gain access to financial/admin records with the intention of committing fraud. 
  • Unauthorised modification of computer material could include destroying or modifying files, creation viruses, changing financial information or deliberately causing computer system malfunction. 
3 of 5

Copyright, design and patents act

  • Aims to protect the intellectual property of individuals and organisations that create materials on their own ideas. This is useful in protecting software piracy, theft, copying and downloading.
  • Organisations should make the public aware of their intellectual property rights through documentation that states their designs are copyrighted. 
4 of 5

3 acts

The freedom of information act

  • Provides individuals/organisations with the right to request information held by public authority. The public authority should make sure it has procedures to deal with various requests for information. 

Regulation of investigatory power act 2000

  • Allows government to access ISP, carry out mass surveillance and monitor internet activities. 

The electronic commerce regulations 2002

  • Customers are entitled to clear information about traders such as: name, address, contact etc. 
  • Online trading companies must comply with the regulations. 
5 of 5

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »