P5:Research the Legal and Ethical Issues and Constraints in Relation to the Use of Business Information in Organizations

P5:Research the Legal and Ethical Issues and Constraints in Relation to the Use of Business Information in Organizations

  • Submitted By: jasabc123
  • Date Submitted: 05/26/2012 6:28 AM
  • Category: Business
  • Words: 607
  • Page: 3
  • Views: 5

There are many different laws which businesses must remember to follow when using business information, the law also protects this information and to what extend it can be used for. If they however fail in doing so they may face prosecution such as paying a fine. I will be exploring the fallowing three main laws which are:
• Data Protection Act 1998
• Freedom of Information Act 2000
• The Computer Misuse Act 1990

Data Protection Act 1998-this act is designed to protect customers from unfair use of their personal information. It affects marketing activity for the reason that customers can buy products without the fear of their information being given out to unidentified sources, so it limits the business as they can’t use all the information they have, because of people being able to opt out. This manly would affect businesses with data bases. For example: Commercial banks, Tesco’s Club card Face book, twitter. It is important for a company to implement this law,as all customers would find it very essential :they do not like their information to be distributed to any other sore that what they have given it to , and that it is securer. When this trust is given to theconsumer: they will come back to the site and Purchas more services and goods.

The Freedom of Information Act 2000 is an act of the United Kingdom (UK) Parliament defining the ways in which the public may obtain access to government-held information. The intent is to allow private individuals and corporations reasonable access to information while minimizing the risk of harm to any entity.




The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities, such as hacking into other people’s systems, misusing software, or helping a person to gain access to protected files of someone else's compute.

Also in this task I will be looking at Ethical issues.Ethical issuesare not laws but are reasonable rules which a business expects its employees to abide by. I...

Similar Essays