BTEC Level 3 Unit 3: Information Systems Mr Satari Lesson 7 & 8.

Slides:



Advertisements
Similar presentations
By Andy Scott, Michael Murray and Adam Kanopa
Advertisements

Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Unit 4- Assignment 3 P5, P6, M2 BTEC Business Level 3.
Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Legislation in ICT.
1.9 The Legal Framework In this section you must be able to:
University of Sunderland Professionalism and Personal Skills Unit 11 Professionalism and Personal Skills Computer Legislation.
Legislation Who governs e-commerce?. E-commerce is regulated by laws and guidelines. These aim to ensure that sites operate effectively and that online.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
The Data Protection Act The Data Protection Act controls how your personal information is used by organisations, businesses or the government. Everyone.
Data Protection Act. Lesson Objectives To understand the data protection act.
The Legal Framework Can you work out which slide each bullet point should go on?!
CENTRAL SCOTLAND POLICE Data Protection & Information Security Stuart Macfarlane Information Governance Unit Police Service of Scotland.
Computer Misuse Act (1990). What is Computer Misuse Act (1990)? The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities,
WHAT Exam Practice WHY All MUST Most SHOULD Some COULD Be able to understand the requirements of the exam to achieve a grade D Be able to understand the.
General Purpose Packages
Legislation For e-commerce to operate correctly, it needs to adhere to the relevant legislation. These laws protect both the business and the consumer.
I.C.T laws By Luke Honeyfield 12. Laws relating to I.C.T  Copyright, Design, Patents  Data protection ACT  Computer misuse ACT  Health and safety.
LANs and WANs Coatbridge High School Computing Department.
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
Computer Misuse Act 1990 Altering computer material without permission Accessing computer material without permission with intent to commit further criminal.
By Alexander smart. What is a viruses ? A Computer Virus is a software program that is designed to copy itself over and over again. Viruses do NOT damage.
Role of Communication Systems b INTERNET Hardware, Software, ServicesHardware, Software, Services Information searching, Publication of informationInformation.
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.
LEGISLATION. DATA PROTECTION ACT (1998) The aim of this act give people the right to know what information is held about them. It also sets out rules.
Information Systems Unit 3.
Legal Implications You need to know about the following:
Public Services Skills
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
ICT and the Law You need to know about 3 laws covering the use and misuse of ICT.
© University of Reading Lee Shailer 06 June 2016 Data Protection the basics.
Business Ethics and Social Responsibility GCSE Business and Communication Systems Business and Communication Systems.
Information Security TechLink Seminar, 17 April 2013 James Knapton, Information Compliance Officer, Registrary’s Office.
Computing and Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
Computer Misuse Act INTRODUCTION The Computer Misuse Act became law in August Under the Act hacking and the introduction of viruses are criminal.
Computer Misuse Act 1990 Anti-hacking legislation.
Learning Objectives Can I discuss the copyright law Can I identify why organisations must protect data Can I describe how legislation affect computer use.
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
Introduction to Data Protection Plan »Brief Introduction to Data Protection  Example  Principles  P3, 4, 7  Sensitive Data  Conditions for Processing.
Learning Intention Legislations impact on security of information
Previous Lesson Revision
Data Protection Act and Other Laws
The Computer Misuse Act 1990
Legislation in ICT.
Understanding the issues related to the use of information
Anti-hacking legislation
Understanding the issues related to the use of information
Cyber Crime Today we will look at: Different types of cyber-crime
Legal and Ethical Issues
Computer Misuse Act 1990.
Unit 7 – Organisational Systems Security
Legal and Ethical Issues
Legislation in ICT.
Computer Misuse Act 1990 GCSE ICT.
Understand mechanisms to control organisational IT security
How it affects policies and procedures
Presentation transcript:

BTEC Level 3 Unit 3: Information Systems Mr Satari Lesson 7 & 8

Lesson Aim: Lo1 We are learning about: We are learning about: The legal and ethical issues of information and information flow between departments The legal and ethical issues of information and information flow between departments We are learning to be We are learning to be Collaborative Collaborative We are learning to use We are learning to use Literacy skills, fact-finding and team-work Literacy skills, fact-finding and team-work

T1 (15):Access to official information Individuals or organisations have rights to request information Individuals or organisations have rights to request information Public authority, local and central government Public authority, local and central government The police, NHS, colleges / schools The police, NHS, colleges / schools 20 days to provide information 20 days to provide information Only exemption: if releasing information could be a national security or damage commercial interest, cost, time, if someone else has made the same request before Only exemption: if releasing information could be a national security or damage commercial interest, cost, time, if someone else has made the same request before

T2 (15): Computer misuse act Unauthorised access: using logon ID and password of someone else Unauthorised access: using logon ID and password of someone else Unauthorised access with intent to commit a serious crime Unauthorised access with intent to commit a serious crime Unauthorised modification of a computer, i.e. impairing the operation of the computer, a program, reliability of data, preventing access, introduction of virus etc… changing financial data, administrative data Unauthorised modification of a computer, i.e. impairing the operation of the computer, a program, reliability of data, preventing access, introduction of virus etc… changing financial data, administrative data Police and justice act 2006 introduce some bits too, i.e. impairing operation of a PC. Police and justice act 2006 introduce some bits too, i.e. impairing operation of a PC.

Offence 1: up to 6 months in prison and /or heft fine Offence 1: up to 6 months in prison and /or heft fine Offence 2: Up to 5 years in prison and/ or a hefty fine Offence 2: Up to 5 years in prison and/ or a hefty fine Offence 3: Up to 5 years in prison and /or a hefty fine Offence 3: Up to 5 years in prison and /or a hefty fine Office 3a: up to 5 years in prison and / or unlimited fine Office 3a: up to 5 years in prison and / or unlimited fine

Ethical issues (15) Activity: Find a code of practice for IT online and try to create one for you mini-enterprise List the areas that are similar i.e. the one you have made and the one you have found online List areas that are different from each other

Information flow activity (15) Complete the diagram for the example provided Complete the diagram for the example provided Make sure you are using the correct descriptions, arrow and flow Make sure you are using the correct descriptions, arrow and flow

Recap 1. How many principles are there for the DPA? 1. How many principles are there for the DPA? Is all information accessible to everyone? Is all information accessible to everyone? When might information be withheld? When might information be withheld? What is the year linked with computer misuse act? What is the year linked with computer misuse act?