Safety & Security By Kieran Bolko. Laws The main law that you should be taking note of is the Data Protection Act 1998 – this law sets rules for the electronic.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Administrative Systems and the Law What you need to know to produce an oral presentation for Unit 7 When the presentations will take place Resources you.
POSSIBLE THREATS TO DATA
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
TAX-AIDE Computer Security Chris Hughes Chairman NTC 1 NLT Meeting Aug 2014.
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
Training prepared by Geoff Webb Information Security & Governance Consultant Data Protection isn’t a choice, it’s the law What all CPH staff must do 17/07/2013.
Legislation in ICT.
Security, Privacy, and Ethics Online Computer Crimes.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Data Protection Act.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
The Data Protection Act
Data Protection Act. Lesson Objectives To understand the data protection act.
The Legal Framework Can you work out which slide each bullet point should go on?!
Administrative Practices Outcome 1
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Data Security GCSE ICT.
General Purpose Packages
IT Security for Users By Matthew Moody.
1.1 System Performance Security Module 1 Version 5.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
Files are at risk from loss if your computer breaks or if you get a virus. Files can also become corrupted. Solutions: Make regular back ups of files Use.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
The Data Protection Act (1998). The Data Protection Act allows you to Check if any organisation keeps information about you on computer or in paper form.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
ICT Homework- ICT Security Consultant PowerPoint.
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
Data Protection Property Management Conference. What’s it got to do with me ? As a member of a management committee responsible for Guiding property you.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Topic 5: Basic Security.
12/12/2015 Data Protection Act /12/2015 The DP Act A law that protects personal privacy and upholds individual’s rights Anyone who handles personal.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Data Protection Philip Reed. Introduction What is data? What is data protection? Who needs your data? Who wants your data? Who does not need your data?
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Computer Security Sample security policy Dr Alexei Vernitski.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Data protection act. During the second half of the 20th century, businesses, organisations and the government began using computers to store information.
Data Protection GCSE ICT Mrs N Steventon-2005.
Handling Personal Data
Administrative Practices Outcome 1
Data Protection Act and Other Laws
Legislation in ICT.
Data Protection Act.
Data Protection Act.
Security of People, Property and Information
Legislation in ICT.
Communicating in the IT Industry
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

Safety & Security By Kieran Bolko

Laws The main law that you should be taking note of is the Data Protection Act 1998 – this law sets rules for the electronic processing of personal information. As you will receiving a lot of your customer’s data such as addresses, DOBs, mobile numbers and bank details, you will be classed as a ‘data controller’. Meaning you must follow information-handling practices including the eight data protection principles, you also have to register with the Information Commissioner to tell him/her you are storing personal data. You must provide the information commissioner with the following details: -Your full name and address. -A description of the data being processed. -The purpose for which the information will be used. -From whom the information was obtained. -To whom the information will be disclosed and countries to which the may be transferred.

Laws continued … After registering with the Information Commissioner, you must follow the eight principles behind the Act: -The data must be fairly and lawfully processed. -The data must be only processed for registered reasons. -The data must be adequate, relevant and not excessive. -The data must be kept accurate and up to date. -The data must be not kept for longer than is necessary. -The data must be processed in line with the data subject’s right. -The data must be kept secure at all times. -The data must not be transferred to countries without adequate protection.

Case Studies … The above story outlines how two massive high street brands broke the Data Protection Act, the two companies were Orange and Littlewoods. The Information Commissioner reported that Orange had not kept their customer’s data secure (breaking principle 7) while Littlewoods did not process their customer’s details properly (breaking principle 1 and 2). prison-sentences-protection-act-breaches prison-sentences-protection-act-breaches This story also reports on how the British government is demanding harsher punishments for people/companies that break the Data Protection Act.

Potential threats Due to the presence of your business and the fact that you store a huge quantity of personal data on your system, you will be increasing your risk of being targeted by computer crime. For example - monster-data-recruitment monster-data-recruitment The theft of information is a type of computer crime and a severe case of it is reported in the above news article where 4.5 million people’s personal data was stolen by hackers. With this in mind, computer crime and even malpractice may mean you could face threats in the future – An example of malpractice would be if you left your computer in your shop logged on and then someone saw information in a database opened up on the screen, which may result in theft of information.

Weak points Other potential threats result from weak points within ICT systems, including: -Data being wrongly entered into a system –fraudulent acts by which employees enter data with criminal intent are unlikely with your business situation but there is always a possibility. -Viruses, worms and Trojan horses – These could pose a big threat to your business, as viruses and Trojan horses can be programmed to steal data, so the large quantity of personal data you have on your system is at risk. -Data being stored offline, such as on an USB memory stick – Such data is vulnerable to loss or theft, this is relevant to you and your business as you may opt to use USB or CD-Rs to back up your databases, but if left unattended they could end up lost or stolen. -Internal staff not following procedures – Your employees must be trained to know how to efficiently and securely manage all the personal data being stored, if not, then all that information is at risk of theft. -Data being transmitted using a network – Because it is likely that you will need to transmit the personal data at some point, you will be using a network to do so, and there in itself increases your vulnerability to external threats due to the ease of unpermitted access.

Hardware measures These could include: Introducing CCTV and alarm systems to the shop in order to prevent any thieves from physically stealing ICT equipment. The computer/ICT system inside the shop could hold technologies such as voice recognition or biometric scanners to stop any unwanted people from accessing information stored on these devices, protecting customers’ personal data such as addresses/bank details. Other additional measures may include introducing passive infra-red alarm systems to the shop itself, to detect any movement, this would be appropriate to your business as this technology is relatively inexpensive.

Software measures hacked?page=1 – Passwords are no longer as safe as they used to be so in order to maximise the protection of a password, you need to make sure all your passwords are a mixture of letters, numbers and capital letters, they shouldn’t be dictionary words, you should also try to make it as long as possible – an ideal password length is no less than 8 characters long. hacked?page=1 Other software measures include: - Installing anti-virus software on all computers to ensure protection against malware. An example is Kaspersky which can detect a virus and destroy it instantly. - Changing the level of access on certain files depending on what is stored on the file. For example making the database full of your customer’s addresses only have access for a certain user, this user then needs to enter a password to edit or look at the file.

Procedural measures Procedural precautions are vital to ensure your business on and offline is secure, most procedures are very simple but greatly improve your security. One obvious measure is to make sure all your passwords are kept secret and only the correct people know them, they should never be revealed and to optimise security, they could be regularly changed every month. Additionally, your files should be stored in the correct places and under proper filenames to decrease the likelihood of loss.