Describe 'Indecency laws (Computer Misuse)' and give a simple example of what a student working with IT in a school/college should look out for?

1 Answer | Add Yours

Top Answer

herappleness's profile pic

M.P. Ossa | College Teacher | (Level 1) Distinguished Educator

Posted on

Indecency laws were passed in the UK Parliament to state regulations against child exploitation, the misuse of personal information, hacking computers for profit, and for regulating the expanding problem of identity theft. They are aimed at the ethical use of computers as tools of research within society. They were implemented to ensure the safety and security of users. Additionally, they differ from country to country because each society has a diverse view of what is indecent and what is not, however, they generally apply similar concepts.

The specific crimes that these laws target have to do with child pornography and indecent exposure of minors. The laws also zero in sending out hate mail, harrasing, and stealing someone's identity to pass out indecent information online.


For this reason, an IT student has to be careful. IT students are more knowledgeable about indecency laws and monitoring than the rest of the population. If an IT student conducts these practices, the punishment would double, because it would show premeditation since the student is in control of the information, and the rules that go about it. Hence, an IT student must be very careful to follow all indecency laws and ensure that those employed under a company which abides by these rules are INFORMED completely and are made to sign an Ethical Use of the Network agreement prior to get access to the Net.

High School students of IT hold a special responsibility because their age group is prone to more computer interaction through social networks, blogs, and role-playing games, and e-mail usage. If an IT student is caught misusing the net and accessing sites that are not allowed, or improper altogether, the blame is double since this student is supposed to have known better. This is why holding the key to computer access makes us become twice as responsible for the information that we share.

We’ve answered 317,806 questions. We can answer yours, too.

Ask a question