Data Protection Act 1998: The Data Protection Act ensures that a company or consumer is not able
to take advantage of an individual’s personal information. Another part of the act explains how
information isn’t allowed it be sent to any other party. It also allows people to know what
information is being held about them, therefore is a customer wants to view their information they
should be able to and if they are denied access then it is against the law to do so. The only way that
an organisation receives information about a person is if they are given it by the person themselves
or if it is stored online.
An example of this could be when someone is applying for a job they give their personal information
to the company to prove they can work. LTM follows the act by making sure that customers know
that their information is safely stored. This is all provided in the policies page, which lets customers
know that the information they hold will; not be released anywhere else. LTM can make sure that
they implement this storing their data responsibly within the company and making sure that nobody
has access to the information that they do not need.
Freedom of Information Act 2000: The freedom of information act allows employees to be able to
ask their employers to view the information that they have stored about that person specifically. The
authority will have 20 days to present the information to the individual or company who has asked,
if they have failed to complete this then they are going against the law and may be taken to court if
necessary and they are not providing the information, this could be personal information about an
individual or families. They will not be breaking the law if the information they are withholding is not
included within the act. LTM have included a section that is on their website which stores their
policies and explains how it links with the Freedom of Information Act. This enables customers to be
able to view their information if they require too, there will be training involved to make sure that
LTM are carrying this out correctly which may be of high cost.
Computer Misuse Act 1990: This Act does not allow unauthorised personal to access programmes or
data through another person’s account where they have no access. If someone uses another
person’s log in details and access information which is stored on their device, then it is a misuse of
power. The person who has used another’s details could be prosecuted as it is a serious crime that
they have carried out. Unauthorised modification of the contents of a computer or device which
impairs the operation of the computer or the reliability of data held. This Act includes to help
prevent access to programmes or data so if this is breached then prosecution may follow. LTM
follows this act by using strict rules to help stop employees from going on sites which are prohibited
during the workplace. They could do this by hiring someone in the IT department which will be
aware and can help stop this.
Ethical Issues: A wide amount of businesses will make you sign a code of practice which will state
that you have to follow the rules of the computer and will not use the facilities. The code of practice
will include the internet, so if someone is to use the computer for things such as pornography then
their account could be banned as it is a prohibited site. It also includes emails, so if using a computer
then the person should not use the emails to harass or send emails which could be threatening.
Limited use for personal purposes can sometimes be allowed as it may be related to the work that
they are carrying out, but if not then the person may be breaking the act. If a business has a website,
then they will be a lot more likely to limit the content that can be added to the site as it may be
offensive or not needed. If this type of content was seen on the website, then it may cause people to
Courtney Lowes
to take advantage of an individual’s personal information. Another part of the act explains how
information isn’t allowed it be sent to any other party. It also allows people to know what
information is being held about them, therefore is a customer wants to view their information they
should be able to and if they are denied access then it is against the law to do so. The only way that
an organisation receives information about a person is if they are given it by the person themselves
or if it is stored online.
An example of this could be when someone is applying for a job they give their personal information
to the company to prove they can work. LTM follows the act by making sure that customers know
that their information is safely stored. This is all provided in the policies page, which lets customers
know that the information they hold will; not be released anywhere else. LTM can make sure that
they implement this storing their data responsibly within the company and making sure that nobody
has access to the information that they do not need.
Freedom of Information Act 2000: The freedom of information act allows employees to be able to
ask their employers to view the information that they have stored about that person specifically. The
authority will have 20 days to present the information to the individual or company who has asked,
if they have failed to complete this then they are going against the law and may be taken to court if
necessary and they are not providing the information, this could be personal information about an
individual or families. They will not be breaking the law if the information they are withholding is not
included within the act. LTM have included a section that is on their website which stores their
policies and explains how it links with the Freedom of Information Act. This enables customers to be
able to view their information if they require too, there will be training involved to make sure that
LTM are carrying this out correctly which may be of high cost.
Computer Misuse Act 1990: This Act does not allow unauthorised personal to access programmes or
data through another person’s account where they have no access. If someone uses another
person’s log in details and access information which is stored on their device, then it is a misuse of
power. The person who has used another’s details could be prosecuted as it is a serious crime that
they have carried out. Unauthorised modification of the contents of a computer or device which
impairs the operation of the computer or the reliability of data held. This Act includes to help
prevent access to programmes or data so if this is breached then prosecution may follow. LTM
follows this act by using strict rules to help stop employees from going on sites which are prohibited
during the workplace. They could do this by hiring someone in the IT department which will be
aware and can help stop this.
Ethical Issues: A wide amount of businesses will make you sign a code of practice which will state
that you have to follow the rules of the computer and will not use the facilities. The code of practice
will include the internet, so if someone is to use the computer for things such as pornography then
their account could be banned as it is a prohibited site. It also includes emails, so if using a computer
then the person should not use the emails to harass or send emails which could be threatening.
Limited use for personal purposes can sometimes be allowed as it may be related to the work that
they are carrying out, but if not then the person may be breaking the act. If a business has a website,
then they will be a lot more likely to limit the content that can be added to the site as it may be
offensive or not needed. If this type of content was seen on the website, then it may cause people to
Courtney Lowes