Rights and Responsibilities

Slides:



Advertisements
Similar presentations
Institutional Telecomms and Computer Network Monitoring Andrew Charlesworth University of Bristol 10 June 2002.
Advertisements

By Andy Scott, Michael Murray and Adam Kanopa
How to protect yourself, your computer, and others on the internet
_Protecting Our Kids New Technology: New Pitfalls Purpose: To help families ask the right questions, and make an informed decision for their children regarding.
Cyber Bullying Everything you need to know. How is it different from normal bullying? By using technology like mobiles or the internet, this type of bullying.
CYBER BULLYING…. What Is Cyber Bullying??? 0 "Cyber bullying" is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed.
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
RahulMIN KU WHAT TO DO IF CYBER-BULLYING OCCURS Firstly protect your number- only give it to friends and don’t leave your mobile where others can.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Legislation Who governs e-commerce?. E-commerce is regulated by laws and guidelines. These aim to ensure that sites operate effectively and that online.
Copyright, Designs and Patents Act. Introduction You have spent three months working on your coursework. It is absolutely brilliant,, you just know that.
Data Protection Act.
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
General Purpose Packages
Legislation For e-commerce to operate correctly, it needs to adhere to the relevant legislation. These laws protect both the business and the consumer.
Cyber Bullying: Not Something To Be Ignored A Presentation By Tyler Mulford.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Computer Legislation The need for computer laws Go to Contents.
ESafety Presentation Project Unit 1 – eSafety
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Regulation of Personal Information Sally Brierley & Emma Harvey.
Communications Data Consultations on access and a Code of Practice for voluntary retention Simon Watkin Home Office.
What is it? & What can I do to prevent it?. Cyber bullying is when somebody is teasing, taunting, or harassing someone else over the computer. Whether.
Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Staying Safe Online. Who are we ? What do we do ? Why are we here ?
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Legal issues. Computer Misuse Act 1990 Deals with misuses of ICT systems.
Computing, Ethics and The Law
ICT and the Law You need to know about 3 laws covering the use and misuse of ICT.
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
NEVER USE YOUR REAL NAME ALAWYS USE A NICKNAME IS SOMEONE SENDS SOME NASTY OR RUDE DON’T DELET IT SHOW IT TO SOMEONE DON’T GIVE ANYONE YOU DON’T KNOW A.
1. Block the bully's access to your online accounts Perhaps the easiest way to stop cyber bullies is to block the bully's access to your online accounts.
Learning Intention Legislations impact on security of information
Legal and ethical issues
Cyber Safe – WGC Parents
YOU’VE GOT HATE MAIL. Boerne Middle School South.
Welcome to our Online Safety assembly by Year 5/6
Cyber Safe – WGC Wellness Day
DIGITAL CITIZENSHIP What You Should Know!.
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Computer Literacy – Grade 8
Data Protection Act and Other Laws
A Project on CYBER SECURITY
Freedom Independence Transition
Data Protection Act.
#1 Consumer Fraud Complaint – 5th straight year!
STOP CYBER BULLYING.
Cyber bullying and anti bullying
Regulation of Investigatory Powers Act 2000
Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School
How many of these apps do you really know?
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Cyber Crime Today we will look at: Different types of cyber-crime
Learning Area 1 Information And Communication Technology and Society
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Data Protection Act and Computer Misuse Act ANSWERS.
Cyber Bullying Cyber Ethics Cyber Law
Unit 7 – Organisational Systems Security
Presentation Project Year 7
Computer Literacy – Grade 8
Online Safety! Created by Educational Technology Network
Brian O’Neill Dublin Institute of Technology 9/10 May Florence
How it affects policies and procedures
Vulnerabilities in Mobile Applications and Input Systems
Vulnerabilities in Mobile Applications and Input Systems
Presentation transcript:

Rights and Responsibilities By Kamil Janiga

Snoopers' Charter Snooper’s Charter or “Draft Communications Data Bill” is a new UK legislation which basically allows government to look through all of your internet browsing, social media, voice calls, emails, internet gaming and messaging services you’ve used. This data will be stored for 12 months and if asked, ISPs and mobile phone companies are required to provide the stored information to law enforcement as well as government. I personally think this law should not exist as it interrogates people’s lives. In my opinion our security should not come in the cost of our freedom. This whole operation is estimated to cost about £1.8 billion and I’m convinced that money could be spent for a better cause.

RIPA Regulation of Investigatory Powers Act aka RIPA is an Act introduced by the Parliament of the UK in the year 2000 due to a large growth of the information era . The main purpose of this law is to give law enforcement a power to investigate the suspects of crime with methods such as bugging houses or vehicles, using informers and undercover officers. They can also gain access to information about communications such as phone numbers or personal details but not the actual content of information. In my opinion this law is good for the community if it’s not abused and is only used to investigate serious criminal cases. In certain scenarios it could stop a high amount of criminal activity but it should never be abused by the law enforcement for personal gain. It’s definitely moral to save lives by investigating criminals but it’s also immoral to ruin lives by investigating petty crimes which do not directly affect any people.

Computer Misuse Act Computer Misuse Act was put into effect to prevent people at their workplace or home from gaining unauthorized access and modification of computer data. It also refers to people with intent to commit a felony through the unauthorized access to data they’ve previously gained, making their offence even stronger. In my personal opinion this law is very useful in certain scenarios where a serious felony is about to take place. If an employee wants to steal some money from a company by having access to their data, this law would come into effect. It can stop potential online thieves and more criminal activity.

Copyright, Designs and Patents Act CDPA which stands for Copyright, Designs and Patents Act is a law put into effect to prevent people from stealing author’s content without their permission. This law is good to an extend as some people might abuse this law for their own personal gain. People tend to copyright almost anything they’ve ever put their hands on, making this law less rightful. However protection of new designs and patents created by individuals is very important and prevents theft of that content keeping the original author credited for his work.

Data Protection Act Data Protection Act was introduced with intent to keep living people’s personal data safe. It forces companies or individuals to anonymise people’s personal data which will be put into public’s eye. Personal data should only be transferred for lawful purposes. This law is definitely good for the community but could also be improved. Some of the data will still be abused due to lack of specific information displayed in this law. Some new laws came out since this Act to ensure better data protection for identifiable people.

Cyber Bullying Cyber bullying is an act of harassment online which is based around personal attacks on a specific person through the internet. In my opinion cyber bullying isn’t as much for a problem as it’s made out to be. Using social media is entirely optional and if a specific person harasses you, there is always an option to block them or just simply ignore these messages. If you give these people attention you will only make matters worse, so ignoring hateful messages or reporting them is the best solution. In rare cases people ended up committing suicide from allegedly cyber bullying, but the truth is we will never how would they end up if they never used social media in the first place.