Preview

P5 Explain The Legal And Ethical Issues In Research

Good Essays
Open Document
Open Document
1135 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
P5 Explain The Legal And Ethical Issues In Research
P5: Explain the legal and ethical issues in relation to the use of business information
In this task I am going to explain about each of the legal issues and the ethical issues individually and explain how businesses use these.
What is the Data Protection Act 1998? This Act came into force in 1998 and this aims to protect an individual’s right to privacy of their personal data of which is taken and handled by businesses. Personal data does not just mean personal information; it means any data relating to a living person. This means it could include information about current employees and includes their address, bank details and date of birth. This can only be stored with the consent from the person or if it is necessary for the performance of the person’s
…show more content…
The Computer Misuse Act 1990 was designed to enclose legislation and controls over computer crime and Internet fraud. The legislation was created to:
- Criminalise unauthorised access to computer systems.
- Discourage serious criminals from using a computer in the commission of a criminal offence or seek to get in the way or impair access to data stored within a computer.
The Computer Misuse Act 1990 has raised concerns among privacy supporters and those who believe in limiting government authority on daily life and behaviour. However, the Computer Misuse Act has served as a model for computer crime legislation in other Commonwealth countries.
How businesses comply with this Act
In order for College to comply with this Act they must not:
- Display any information which enables others to gain unauthorised access to computer material including instructions for gaining access, computer codes or other devices which assist hacking.
- Display any information that may lead to any unauthorised modification of computer materials.
- Display any material which may provoke or encourage others to carry out unauthorised access to or modification of computer

You May Also Find These Documents Helpful

  • Good Essays

    WGU LIT1 Task 1

    • 3614 Words
    • 15 Pages

    Lau, T., & Johnson, L. (2013). The legal and ethical environment of business. (1st ed., p. 11.2-11.5).…

    • 3614 Words
    • 15 Pages
    Good Essays
  • Powerful Essays

    mgmt 368

    • 4592 Words
    • 20 Pages

    Analysis of principles used to evaluate ethical issues facing today's business community as well as to formulate possible solutions. This course satisfies the General Education Ethics requirement for Business Administration and Computer Information Systems majors.…

    • 4592 Words
    • 20 Pages
    Powerful Essays
  • Satisfactory Essays

    The federal Privacy Act 1988 is designed to promote the protection of individuals’ privacy in Australia by imposing obligations on those who collect and handle personal information to manage it responsibly and transparently. It does so by reference to a number of principles known as the Australian Privacy Principles. These principles are similar to those found in other jurisdictions such as Canada and Europe.…

    • 64 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    After a close examination of the journal article “The Unconstitutionality of the Computer Fraud and Abuse Act”, Michael C. Mikulic addressed the following points:…

    • 1035 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    By explaining the importance of keeping confidential information such as daily recordings or daily activities in a secure place and not to pass on any information to anyone outside of the individual’s direct team. When using the computer you must make sure when you are accessing the individual personal information that you do not leave it on and go and do something else. Make sure you have an active password that is only known to those that need to know.…

    • 724 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    Level 3 Ptlls Unit 001

    • 1754 Words
    • 8 Pages

    - The Data Protection Act 1998 is a framework to protect the rights of peoples personal data and is designed to safeguard…

    • 1754 Words
    • 8 Pages
    Best Essays
  • Satisfactory Essays

    Diploma Level 3 Hsc 38

    • 299 Words
    • 2 Pages

    Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental lost or destruction of, or damage to personal data.…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    4.What are the key legal and ethical considerations relevant to this case? How would you address these…

    • 289 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Mid Term Exam

    • 323 Words
    • 2 Pages

    Discuss the evolution of business ethics as a field of study from before 1960 to the present. Include examples exemplifying positive impacts of these changes.…

    • 323 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The two Acts discussed in this paper are the Video Privacy Protection Act (1988), and the Controlling the Assault of Non-solicited Pornography and Marketing (CAN-SPAM) Act, (2003). These two acts were both enacted because along with the development of technology new issues arose in which no legal precedence had yet been established. These Acts were also both created nearly immediately after it was realized that there was a need for them.…

    • 554 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Week 7 : Ethical, Social, Political, and Security Issues for 21st Century Companies - Homework…

    • 916 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Cyberlaws in India

    • 11241 Words
    • 45 Pages

    Objectives: This chapter presents the meaning and definition of cyber crime, the legislation in India dealing with offences relating to the use of or concerned with the abuse of computers or other electronic gadgets. The Information Technology Act 2000 and the I.T. Amendment Act 2008 have been dealt with in detail and other legislations dealing with electronic offences have been discussed in brief.…

    • 11241 Words
    • 45 Pages
    Powerful Essays
  • Good Essays

    Computer crimes such as malicious attacks on software, identity theft, and illegal distribution are quickly becoming big problems that are not easily enforceable. When average people hear the words "computer crime", they often think of obscene pictures available on the Internet or solicitation of children for sex by pedophiles via the Internet. The legal problem of obscenity on the Internet is the same as the legal problem of obscenity in books and magazines. It is not as pressing as other Internet crimes. There are no precise, reliable statistics on the amount of computer crime and the loss to victims. These silent crimes are not detected by victims and therefore are not reported to authorities. This in turn leads to a miscalculation about both the number of computer crimes committed and the damage. Nevertheless, there is a consensus among both law enforcement personnel and computer scientists who specialize in security that both the number of computer crime incidents and the sophistication of computer criminals is rapidly increasing. There are three major classes of criminal activity with computers: unauthorized use of a computer (stealing a username and password), creating or releasing a malicious computer program (computer virus, worm, Trojan Horse), and harassment and stalking in cyberspace.…

    • 485 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Bibery and Corruption

    • 495 Words
    • 2 Pages

    All businesses increasingly want to be perceived as good citizens. Different types of business face different ethical issues.…

    • 495 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Cyberwar

    • 2001 Words
    • 9 Pages

    According to the Department of Justice, computer crimes are violations of criminal laws involving knowledge of computer technology for their investigation, perpetration or prosecution. The numbers of crimes are as much as the criminals in the information technology. These criminals could be dissatisfied empolyees , youthful hackers, international spies and terrorists and the company…

    • 2001 Words
    • 9 Pages
    Powerful Essays