Group 7 (G) Ayo Falomo, Saber Hamidi, Eldar Alasgarov, Kym Hulbert, Aaron Cai, Tim Hodgkins & Joe Burrows Tutor: Dr Gary B Willis.

Slides:



Advertisements
Similar presentations
POSSIBLE THREATS TO DATA
Advertisements

Security Strategy. You will need to be able to explain:  Data Security  Data Integrity and  Data Privacy  Risks  Hacking  Denial of Service DOS.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
7 Effective Habits when using the Internet Philip O’Kane 1.
Social media threats. Warning! May contain mild peril.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
Denmark and Cartoons of the Prophet Mohammed: Freedom of speech or hate speech? Mandana Zarrehparvar Senior Advisor Danish Institute for Human Rights
Hacker Ethics Kim Bissett Sabrina Short. Hacker Ethic: In General  Freedom of Information The web is not physical; it couldn’t be interpreted as property,
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
From AV to Internetized Security Solution 马杰 Jeffrey Beijing Rising Tech. Co., Ltd. --- The Analysis Report of Malware Technology in China in 2005.
Unit 28- Website Development Assignment 1- THEORY P3
INTERNET and CODE OF CONDUCT
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
BLOGS The New Contemporary Media Landscape BY LAINE ST. PAUL.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Media has embedded values and points of view.
Digital Citizenship Project
A Guide to Digital Citizenship
PART THREE E-commerce in Action Norton University E-commerce in Action.
Ashley Chambliss ED 505 Fall 2. “Digital Citizenship is a way for teachers to prepare you for a world full of technology.” (Ribble, ) “A means.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
Computers, the law and ethics  Lesson Objective: Understand some of the legal & ethical issues in developing computer systems  Learning Outcome: Know.
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
UDMIS.info Ethics and IS. UDMIS.info The Ethics of IS Ethics and Privacy Ethical Issues Law & Order.
Digital Citizenship Project By: Brandis Cook. Netiquette Netiquette, also known as “network etiquette”, is designed to facilitate communication over networks.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Alisa Ward-Allen Ms. Ray Fall 1, 2011 This is the act of borrowing or copying someone else’s work as your own. This is a serious crime and it is considered.
The Eighth Asian Bioethics Conference Biotechnology, Culture, and Human Values in Asia and Beyond Confidentiality and Genetic data: Ethical and Legal Rights.
© Crown copyright Met Office Dissemination of warnings and forecasts – social networks 29 th November 2012 Sarah Davies, Met Office.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
Digital Citizenship Project Jared Smith ED 505. Netiquette on Social Media Sites  Netiquette on Social Media Sites is “the social code of using social.
Types of Electronic Infection
Project 1: Creating Newsletters Module 1: Censoring Freedom of Expression.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
Digital Citizenship Project Lori Jones Franks University of West Alabama ED 505.
Virus Hits Wikipedia The virus writers created a page on the German Wikipedia that linked to a fake fix for a new version of an old malicious Windows worm.
Cassidy Culligan Digital Citizenship Project ED 505.
Freedom of Speech: Twitter Presented by David Mendel CS 151 Section 2 10/16/2012 Project #3 Group #1 Franklin Snider Luqman Asmat Nabil Hasbulah Clark.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Using Social Media for Fundraising and Communication with Supporters Lindsay Boyle – Communications & Research Coordinator Claire Chapman – Information.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
IT tools to communicate By Suleman Kalam. Podcast What is Podcasts? A podcasts is a downloadable media file which can be downloaded into many electronic.
 Carla Bates Technology and Education ED 505.  Social Media Sites are interactive webpages, blogs, and other user created sites that all others to create,
Digital Citizenship Jacinta Little ED 505. Table of Contents Definition of Digital Citizenship………………………… Slides 3-4 Social networking…………………………………………
Internet safety By Kenan.  Viruses are written by malicious programmers who wish to cause problems for other computer users.  The primary source of.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Project 1: Creating Newsletters Module 1: Censoring Freedom of Expression.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Computing, Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
Freedom of expression: underlying principles and sources
Computer and Internet Security (How to protect your computer from Threats) By: Steven Siggers Instructor: Dr. Marko Puljic.
Group C: Banter, jokes, freedom of speech and defamation By: Lendina Hykaj Aliyu Aliyu Zia Ahmed Baran Sezgin Timur Aliev Panashe Makanza.
Communication with public via media and social media Anu Ots Communications Manager of Statistics Estonia
By: Daleah Elliott Adjective; Unable to be taken away from or given away by the possessor in·al·ien·a·ble /in ˈ ālēənəbəl/ :
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Revision Session 2 Rights and Responsibilities – HUMAN RIGHTS.
Technology Safety By: Stefanie Weston. Netiquette Dos and Don’ts for Children  Do  Respect the topic that is being discussed.  Be polite and make friends.
Introduction to Data Protection Plan »Brief Introduction to Data Protection  Example  Principles  P3, 4, 7  Sensitive Data  Conditions for Processing.
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
7 Tips To Improve Your Website Security. Introduction Use of Content management systems like WordPress, Joomla & Drupal, utilization of various tools,
Legal Aspects in IT Security Is Your Organisation Up-to-Date?? (Ref : IT Act, 2008 & IT Rules 2011) Adv Prashant Mali [BSc(Phy),MSc(Comp. Sci.),CNA,
Chapter 40 Internet Security.
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
How to use the internet safely and How to protect my personal data?
How to use the internet safely and How to protect my personal data?
Computer Security.
Introduction-Cyber Safety
Presentation transcript:

Group 7 (G) Ayo Falomo, Saber Hamidi, Eldar Alasgarov, Kym Hulbert, Aaron Cai, Tim Hodgkins & Joe Burrows Tutor: Dr Gary B Willis

Left to Right: Ayo Falomo, Eldar Alasgarov, Kym Hulbert, Aaron Cai, Tim Hodgkins & Joe Burrows

Universal Declaration of Human Rights (1947), Article 18 “Everyone has the right to freedom of thought, conscience and religion...” (Lauterpacht, 1948)

 Is there anything that cannot be said, or circumstances under which things cannot be said?  If freedom of expression does have limits, just how can these limits be defined?  Is there any kind of right to take offence? (Sturges, 2006)

Universal Declaration of Human Rights, Article 29 “In the exercise of his rights and freedoms, everyone shall be subject only to such limitations as are determined by law solely for the purpose of securing due recognition for the rights and freedoms of others and of meeting the just requirements of morality, public order and the general welfare of a democratic society.” (Lauterpacht, 1948)

(Walls Wallpaper 2012) (Tumblr. n.d.)

 Use of Twitter by employee’s – people liable for whatever they say or post online.  Virgin flight crew lost jobs after Facebook comments. (Smith, 2008)  Twitter censors messages country by country (Moran, 2012) (N, 2011) (Rojas, 2012)

 Companies increasingly making it possible for users to flag/report defamation on social sites. (Report button on Facebook).  Increasingly contracts now include social media agreements. (ACAS n.d.) (Scott, 2011) (N., 2011)

“Malware is short for malicious software and also known as malicious code. Hackers exploit security weaknesses on your server to gain access to your website and install malicious code. They use your website to spread viruses, hijack computers and steal sensitive data such as credit card numbers or other personal information. Malware code is not easily detected and may infect your customers’ computers when they visit your website.” (Symantec, n.d.) (Texnomaniya n.d.)

 UK Data Protection Act (DPA) of UK  “Appropriate technical and organizational measures must be used to ensure the security of customer Personal information.”  Consequences :  Large fines of up to £500,000 on organizations (Get Safe Online, 2012) (Year10a, 2013)

 Regular website malware scanning  Keeping SSL certificates up to date  Always-on SSL  Keeping server software up-to date (Symantec, n.d.)

 Despite there being several laws to ensure freedom of speech, there will always be limitations.  Defamation is one of the reasons for these limitations to protect people and also organizational image.  The examples discussed are prime examples of where the law has conflicted with Freedom of Speech.

 ACAS. Acas.org.uk. n.d. (accessed April 21, 2013).  BBC News. BBC News England. April 20, england (accessed April 20, 2013).  Get Safe Online. Get Safe Online protection-act/ (accessed April 20, 2013).  Lauterpacht, Hersch. The British Year of Book International Law. Oxford: Oxford Press,  Moran, Lee. Daily Mail. January 27, /Twitter-sparks-free-speech-fury-announcing-censor-messages-country- country.html (accessed April 20, 2013).  N, Dian. Logoeps. June 24, eps-crd/1684/ (accessed April 20, 2013).  N., Dian. Logoeps.com. June 24, vector-ai-eps-crd/1684/ (accessed April 20, 2013).  Robinson, Victoria. Stuff.co.nz. December 18, posts (accessed April 20, 2013).  Rojas, John-Paul Ford. The Telegraph. August 16, celebrates-exams-success-days-after-winning-Olympic-bronze.html (accessed April 20, 2013).

 Scott, Tristan. Travel House UK. June 4, fares-to-africa-and-middle-east.htm (accessed April 20, 2013).  Smith, Stevie. The Tech Herald. November 3, flight-crew-fired-for-insulting-passengers-via-Facebook/3032/ (accessed April 14, 2013).  Sturges, Paul. "Limits to freedom of expression? Considerations arising from the Danish cartoons affairs." IFLA, 2006:  Symantec. Malware Scanning FAQ. n.d. resources&tabID=2 (accessed April 19, 2013).  Texnomaniya. Texnomaniya. n.d. pokazivajushhijj-porno.html (accessed April 20, 2013).  Tumblr. Tumblr. n.d. (accessed April 20, 2013).  Walls Wallpaper. Mister Forex. December 8, in_flag/ (accessed April 20, 2013).  West, Ed. The Telegraph. July 31, does-not-extend-to-the-freedom-to-make-death-threats/ (accessed April 14, 2013).  Wheeler, Brian. BBC News Magazine. February 13, (accessed April 20, 2013).  Year10a. YEar10a Wikispaces (accessed April 20, 2013).

Presentation Topic 7: Freedom of speech and defamation Keywords: Hate crime; hatred; hate speech; comparative law; Second Life; virtual worlds Brief Many of us are familiar with tales of individuals arrested because of a flippant post to twitter, or pursued for damages because of sarcastic (and perhaps ill advised) comments on high profile figures subject to journalistic investigation. Legislation exists to protect individuals freedom of expression, and also to and sue for claims of defamation. Prepare and produce a short presentation which provides an introduction to and overview which points out the responsibilities of individuals and organisations in respect of this type of legislation. You should consider all sorts of publications and communications online. You should also identify ways in which ‘owners’ of websites and blogs are bound to ensure that they protect their sites from malicious hacking; being used as a platform for publishing ‘rogue’ views and messages.