Business Ethics and Social Responsibility GCSE Business and Communication Systems Business and Communication Systems.

Slides:



Advertisements
Similar presentations
Unit 4- Assignment 3 P5, P6, M2 BTEC Business Level 3.
Advertisements

The Data Protection (Jersey) Law 2005.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
Legislation in ICT.
University of Sunderland Professionalism and Personal Skills Unit 11 Professionalism and Personal Skills Computer Legislation.
Health and Safety Legislation
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
The Data Protection Act The Data Protection Act controls how your personal information is used by organisations, businesses or the government. Everyone.
Data Protection Overview
The Data Protection Act
Data Protection Act. Lesson Objectives To understand the data protection act.
 The Data Protection Act 1998 is an Act of Parliament which defines UK law on the processing of data on identifiable living people and it is the main.
The Legal Framework Can you work out which slide each bullet point should go on?!
CENTRAL SCOTLAND POLICE Data Protection & Information Security Stuart Macfarlane Information Governance Unit Police Service of Scotland.
Administrative Practices Outcome 1
General Purpose Packages
Handling information 14 Standard.
Health & Social Care Apprenticeships & Diploma
Law Additional Exercise ANSWERS. Question #1 (a) Any one of: gain unauthorised access (1st) to computer material (1) gain (unauthorised) access to computer.
3.4 Legal Implications. Overview Demonstrate knowledge and understanding of the Computer Misuse Act. Describe the roles of the BBFC (British Board of.
Elma Graham. To understand what data protection is To reflect on how data protection affects you To consider how you would safeguard the data of others.
NOT PROTECTIVELY MARKED Data Protection Information Management & Information Security.
The Data Protection Act 1998 The Eight Principles.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
Data Protection Corporate training Data Protection Act 1998 Replaces DPA 1994 EC directive 94/46/EC The Information Commissioner The courts.
What is personal data? Personal data is data about an individual which they consider to be private.
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
Everyone has a duty to comply with the Act, including employers, employees, trainees, self-employed, manufacturers, suppliers, designers, importers of.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
IT Applications Theory Slideshows By Mark Kelly Vceit.com Privacy Laws.
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
12/12/2015 Data Protection Act /12/2015 The DP Act A law that protects personal privacy and upholds individual’s rights Anyone who handles personal.
Mastering Administration Secretary Training. Icebreaker.
LEGISLATION. DATA PROTECTION ACT (1998) The aim of this act give people the right to know what information is held about them. It also sets out rules.
Information Systems Unit 3.
Computing, Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
INFORMATION GOVERNANCE AND CONFIDENTIALITY Information Governance Facilitator.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
DATA PROTECTION ACT (DPA). WHAT IS THE DATA PROTECTION ACT?  The Data Protection Act The Data Protection Act (DPA) gives individuals the right.
Data Protection Philip Reed. Introduction What is data? What is data protection? Who needs your data? Who wants your data? Who does not need your data?
DATA PROTECTION ACT INTRODUCTION The Data Protection Act 1998 came into force on the 1 st March It is more far reaching than its predecessor,
Computing, Ethics and The Law
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Session 11 Data protection. 1 Contents Part 1: Introduction Part 2: Applicability and responsibility Part 3: Our procedures on data protection Part 4:
ICT and the Law You need to know about 3 laws covering the use and misuse of ICT.
© University of Reading Lee Shailer 06 June 2016 Data Protection the basics.
Computing and Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
Presented by Ms. Teki Akuetteh LLM (IT and Telecom Law) 16/07/2013Data Protection Act, 2012: A call for Action1.
Clark Holt Limited (Co. No ), Hardwick House, Prospect Place, Swindon, SN1 3LJ Authorised and regulated by the Solicitors Regulation.
Data protection act. During the second half of the 20th century, businesses, organisations and the government began using computers to store information.
Learning Intention Legislations impact on security of information
Data Protection GCSE ICT Mrs N Steventon-2005.
Data Protection and Confidentiality
Data Protection Act and Other Laws
Mastering Administration
Handout 2: Data Protection and Copyright
Legislation in ICT.
Understanding the issues related to the use of information
Data Protection & Freedom of Information- An Introduction
Data Protection principles
Data Protection and You
Unit 7 – Organisational Systems Security
Unit 1 Effective Communication in Health and Social Care
Legal and Ethical Issues
Legislation in ICT.
Presentation transcript:

Business Ethics and Social Responsibility GCSE Business and Communication Systems Business and Communication Systems

Students should be able to:  Demonstrate knowledge and understanding of the ethical responsibilities of businesses, with particular emphasis on the role played by ICT in the following areas:  Data protection;  Copyright, designs and patents; and  Computer misuse; Business and Communication Systems

 Ethical responsibilities in business includes dealing honestly with partners, providing products and services as promised and fully disclosing all necessary information.  Contracts are often written up to ensure that agreements get followed, although they cannot possibly account for every interaction. Ethical Responsibilities in Business Business and Communication Systems

Data Protection  The Date Protection Act controls how your personal information is used by organisation, businesses or the government.  Everyone who is responsible for using data has to follow strict rules called ‘data protection principles’. They must make sure the information is:  Used fairly and lawfully  Used for limited, specially stated purposes  Used in a way that is adequate, relevant and not excessive  Accurate  Kept for no longer than is absolutely necessary  Handled according to people’s data protection rights  Kept safe and secure  Not transferred outside the UK without adequate protection Business and Communication Systems

Cont.  There is stronger legal protection for more sensitive information, such as:  Ethical background  Political opinions  Religious beliefs  Health  Sexual health  Criminal records Business and Communication Systems

Copyright, Designs and Patents  In terms of the Copyright, Designs and Patents Act 1988, copyright is a property right which is granted to an owner in terms of certain ‘works’.  The owner of copyright has exclusive right to:  Copy the work  Issue copies of the work to the public  Perform, show or play the work in public  Broadcast the work  Make an adaption of the work. e.g. Logo, slogans, name. Music, shape of bottles etc. Business and Communication Systems

Computer Misuse The Act identifies three specific offences: 1.Unauthorised access to computer material (that is, a program or data). 2.Unauthorised access to a computer system with intent to commit or facilitate the commission of a serious crime. 3.Unauthorised modification of computer material e.g. Employees not to use computers for their own use, use of firewall. Business and Communication Systems