Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

By Andy Scott, Michael Murray and Adam Kanopa
Administrative Systems and the Law What you need to know to produce an oral presentation for Unit 7 When the presentations will take place Resources you.
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Legislation in ICT.
Security, Privacy, and Ethics Online Computer Crimes.
University of Sunderland Professionalism and Personal Skills Unit 11 Professionalism and Personal Skills Computer Legislation.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Data Protection Act Description The Data Protection Act controls how your personal information can be used and protects from the misuse of your.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
The Data Protection Act
Data Protection Act. Lesson Objectives To understand the data protection act.
The Legal Framework Can you work out which slide each bullet point should go on?!
CENTRAL SCOTLAND POLICE Data Protection & Information Security Stuart Macfarlane Information Governance Unit Police Service of Scotland.
Computer Misuse Act (1990). What is Computer Misuse Act (1990)? The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities,
Administrative Practices Outcome 1
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
1 AQA ICT AS Level © Nelson Thornes Data Protection Act.
General Purpose Packages
Data Protection and Computer Misuse Act material Modified by Eric from Mary’s slides.
3.4 Legal Implications. Overview Demonstrate knowledge and understanding of the Computer Misuse Act. Describe the roles of the BBFC (British Board of.
The Data Protection Act 1998 The Eight Principles.
Slide 1 St Andrew’s High School Standard Grade Computing Databases Standard Grade Computing Studies.
Crime & Malpractice AS Module Heathcote Ch. 10.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
The Data Protection Act (1998). The Data Protection Act allows you to Check if any organisation keeps information about you on computer or in paper form.
The Data Protection Act By Ian Hughes Data should not be kept longer than is necessary for the specified purpose. Data processing should meet the.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Data Protection Act (1984, 1998). 2 Data Protection Act There are many organisations which hold personal information about individuals Examples: Loyalty.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Computing and Information Science 1 Databases START.
LEGISLATION. DATA PROTECTION ACT (1998) The aim of this act give people the right to know what information is held about them. It also sets out rules.
Information Systems Unit 3.
Legal Implications You need to know about the following:
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
M ORAL AND ETHICAL ISSUES. Use and Abuse of Personal and Private Data All the information stored on Computer is governed by law or legislation. The main.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Legal issues. Computer Misuse Act 1990 Deals with misuses of ICT systems.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
ICT and the Law You need to know about 3 laws covering the use and misuse of ICT.
Computing and Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
Safety & Security By Kieran Bolko. Laws The main law that you should be taking note of is the Data Protection Act 1998 – this law sets rules for the electronic.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Data protection act. During the second half of the 20th century, businesses, organisations and the government began using computers to store information.
Legal and ethical issues
Legislation in ICT.
TB2 Lesson 5 Data Protection
Understanding the issues related to the use of information
Data Protection Act.
Legal and Ethical Issues
Legislation in ICT.
Computer Misuse Act 1990 GCSE ICT.
Data Protection.
How it affects policies and procedures
Presentation transcript:

Commercial Data Processing Computer Crime

Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data files. Computer fraud is sometimes used to steal money. Two common ways of interfering with data: Hacking and Computer Viruses.

Hacking Hacking is gaining access to a computer system, usually illegally, and interfering with the data on it. Can be done remotely using a modem. Can lead to prosecution if you are caught. Can be made more difficult by changing passwords regularly, and keeping them secure.

Computer Viruses A virus is a rogue program that someone has deliberately created. Invisible to the computer until it passes into memory. Reproduces itself on all software being used. Can be detected and eradicated.

Viruses Continued Some viruses are relatively harmless. An example would be a virus which displays Happy New Year on the screen on the 1st of January. Others are more destructive. These may overwrite all the data on a system with rubbish. Can be passed on through disks/networks.

Data Protection Act Introduced in 1987, revamped in Allows you to: Check if any organisation keeps information about you on computer to see a copy of this personal data These are called subject access rights because people about whom information is held are called data subjects.

Data Protection Act The person or organisation holding the data is called a data user. Data users must: obtain and process the information fairly and lawfully. register the purposes for which they hold it. not use or disclose the information in a way contrary to these purposes. hold only information which is adequate, relevant, and not excessive for the purposes.

Data Protection Act As well as the above, data users must also: hold only accurate information, and, where necessary, keep it up to date. not keep the information any longer than is necessary. Give individuals access to information about themselves, and, where appropriate, correct or erase the information. Take appropriate security measures.

Computer Misuse Act (1990) Before 1990, the only criminal offence being committed by someone breaking into a computer system was theft of electricity. The Computer Misuse Act makes hacking and computer fraud illegal.

Computer Misuse Act (1990) A person is guilty of an offence if: he causes a computer to perform any function with intent to secure access to any program or data held in any computer; The access he intends to secure is unauthorised; he knows at the time that he causes the function that that is the case.