Unit 7 – Organisational Systems Security

Slides:



Advertisements
Similar presentations
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
Advertisements

The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
Legislation in ICT.
Higher Administration and IT Administrative Practices.
University of Sunderland Professionalism and Personal Skills Unit 11 Professionalism and Personal Skills Computer Legislation.
Health and Safety Legislation
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
The Data Protection Act The Data Protection Act controls how your personal information is used by organisations, businesses or the government. Everyone.
The Data Protection Act
Data Protection Act. Lesson Objectives To understand the data protection act.
The Legal Framework Can you work out which slide each bullet point should go on?!
General Purpose Packages
The Data Protection Act 1998 The Eight Principles.
Data Protection Act AS Module Heathcote Ch. 12.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
UNIT 15 WEEK 9 CLASS 1 LESSON OVERVIEW Pete Lawrence BTEC National Diploma Organisational System Security.
The Data Protection Act (1998). The Data Protection Act allows you to Check if any organisation keeps information about you on computer or in paper form.
Data Protection Corporate training Data Protection Act 1998 Replaces DPA 1994 EC directive 94/46/EC The Information Commissioner The courts.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
Everyone has a duty to comply with the Act, including employers, employees, trainees, self-employed, manufacturers, suppliers, designers, importers of.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
LEGISLATION. DATA PROTECTION ACT (1998) The aim of this act give people the right to know what information is held about them. It also sets out rules.
Information Systems Unit 3.
Data Protection Act (1998).
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Computing, Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
Session 12 Information management and security. 1 Contents Part 1: Introduction Part 2: Legal and regulatory responsibilities Part 3: Our Procedures Part.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
ICT and the Law You need to know about 3 laws covering the use and misuse of ICT.
© University of Reading Lee Shailer 06 June 2016 Data Protection the basics.
Business Ethics and Social Responsibility GCSE Business and Communication Systems Business and Communication Systems.
BTEC Level 3 Unit 3: Information Systems Mr Satari Lesson 7 & 8.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 7 EMPLOYMENT CONTRACTS & CODES OF CONDUCT.
Welcome to the ICT Department Unit 3_5 Security Policies.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
The Data Protection Act 1998
The Data Protection Act 1998
Learning Intention Legislations impact on security of information
WORKPLACE LEGISLATION
Data Protection GCSE ICT Mrs N Steventon-2005.
PowerPoint presentation
Data Protection and Confidentiality
Administrative Practices Outcome 1
Data Protection Act and Other Laws
Handout 2: Data Protection and Copyright
Legislation in ICT.
Data Protection Act.
The Data Protection Act 1998
Understand mechanisms to control organisational IT security
Regulation of Investigatory Powers Act 2000
Data Protection Legislation
Understanding the issues related to the use of information
Legal and Ethical Issues
The Data Protection Act & ICT Law
Unit 1 Effective Communication in Health and Social Care
Identify the laws and guidelines that affect day-to-day use of IT.
Data Protection What’s new about The General Data Protection Regulation (GDPR) May 2018? Call Kerry on Or .
Legal and Ethical Issues
General Data Protection Regulations 2018
Legislation in ICT.
Understand mechanisms to control organisational IT security
How it affects policies and procedures
Understanding Data Protection
Handling information 14 Standard.
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

Unit 7 – Organisational Systems Security Organisation rules and guidelines Unit 7 – Organisational Systems Security

Employment contracts Explain how employment contracts can affect security.

Employment contracts and security Hiring policy Separation of duties Ensuring compliance/ disciplinary procedures Training and communication of responsibilities

HCT ‘Recruitment & Selection Read the policy (on wiki) Identify areas you think reflect on security

Hiring policy Recruitment and promotion National employment laws Should check potential employee’s: Background Previous employment record References Criminal record Ability to complete an assessment task Probationary period

Separation of Duties What do you think this means? How can it affect security?

Separation of duties Avoid reliance on one individual Give critical tasks to team, each task has a knowledgeable deputy Applies equally to knowledge of system Includes: VPN Firewall Anti-virus System overview

Disciplinary procedures Task: A colleague has suggested that you have downloaded an expensive application from the company’s server and are going to use it at home. This is a breach of company policy and the law. What should happen? Describe the steps you think should occur.

Disciplinary procedures Any infringement needs to be dealt with fairly Process infringements to avoid false accusations. Possible steps: Independent investigation Suspension (with pay) Police involvement (any criminal matter)

Training and Communication Employer has responsibility: to train staff to maintain regular communication To ensure staff are aware of their responsibilities How can this be accomplished?

Task 2 (P5) In this section of your report you should explain how employment contracts can help security. Give examples. This section of your report should be at least 500 words in length. Hints: You should cover: Hiring policy Separation of duties Disciplinary procedures Staff training and responsibilities

Task 3 (P6) In this section of your report you should explain the legislation related to security and privacy of data. This part of the report should be about 500 words in length. Hints: You should cover: Computer Misuse Act (1990) Copyright, Designs and Patents Act (1988) Data Protection Acts (1984, 1998, 2000) Freedom of Information Act (2000)

Task 3 When you introduce the legislation you are talking about use its full title including the date (and capital letters) E.g. Computer Misuse Act (1990) You may quote relevant sections of the act. E.g. This act covers 4 offences “Unauthorised access with intent to commit or facilitate commission of further offences.” Make sure you reference accurately. Explain in your own words what the act does: e.g. This act makes it illegal to interfere with a computer unless authorised to do so. orientated

Data Protection Act 1998 Framework for handling data Gives individuals right to know what info is held If you process data you must register with DPA registrar and ensure that personal information is: Fairly and lawfully processed Processed for limited purposes Adequate, relevant and not excessive Accurate and up-to-date Not kept for longer than necessary Processed in-line with your rights Secure Not transferred to other countries without adequate protection

Data Protection Act 1998 What do the eight principles of the Data Protection Act 1998 cover?

Freedom of Information Act 2000 Access to official information Individuals or organisations have right to request information from: Any public authority – including local and central government The police NHS Colleges and schools They have 20 days to provide the information. May refuse if the information is exempt eg if releasing the information could prejudice national security or damage commercial interests. Examples: https://www.whatdotheyknow.com/ Personal information is NOT covered by this act!

Computer Misuse Act 1990 Three offences: Unauthorised access to any computer programme or data eg using someone else’s logon ID and password Unauthorised access with intent to commit a serious crime Unauthorised modification of computer contents. I.e. impairing the operation of a computer, a program or the reliability of data, includes preventing access to any program or data. E.g. the introduction of a virus, modifying another users files or changing financial or administrative data. Minor changes to tighten up act introduced through Police and Justice Act 2006, made unauthorised acts with intent to impair the operation of a computer illegal.

Copyright, Designs and Patents Act (1988) If you didn’t create it, it isn’t yours! No official registration system Rights start as soon as something is recorded, written, painted etc Don’t need Copyright symbol © Duration 70yrs after death for written work 50yrs from 1st recording for sound recording 70yrs after death for films (director/screenplay/dialogue/soundtrack) http://www.is4profit.com/business-advice/general-advice/copyright-basic-facts.html