Policy and Procedure For CSCL (BIM).

Slides:



Advertisements
Similar presentations
Internet Safety and Standard Operating Procedures School Board Meeting-February 14, 2012.
Advertisements

Confidentiality and Privacy Controls
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Legal, Ethical, and Professional Issues in Information Security
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
INTRODUCTION TO FORENSICS Science, Technology, & Society MR. CANOVA PERIOD 11.
Anti-counterfeiting Activities by the Korean Intellectual Property Office June 2006 KIPO The Korean Intellectual Property Office.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Investigating Cybercrime DATALAWS Information Technology Law Consultants Presented by F. F Akinsuyi (MSc, LLM)MBCS.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
CYBER CRIME.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Chapter 17 E-Commerce and Digital Law
Computer Forensics Principles and Practices
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
 It is a branch of FORENSIC SCIENCE for legal evidence found in computer  It refers to detail investigation of the computers to carry out required tasks.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Lesson 15 : Networks And The Internet
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
CONTROLLING INFORMATION SYSTEMS
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
Security and Ethics Safeguards and Codes of Conduct.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
1 EXPANDING E-BUSINESS OPPORTUNITIES FOR VIETNAM Presented by Russell Pipe Director of E-Government Programs Kenan Institute Asia – Bangkok at the VIETNAM.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
ITC 229 Computer Security and Cyber Law
James A. Senn’s Information Technology, 3rd Edition
PhD Oral Exam Presentation
Intro to Intellectual Property 3.0
MGMT 452 Corporate Social Responsibility
1st Workshop On Transposition Of SADC Cybersecurity Model Laws In National Laws For Namibia Windhoek, Namibia - 30 April 2013 Transposition of SADC.
6.00 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Introduction to Computer Forensics
Legal and Ethical Issues in E-Commerce
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Chapter 17: E-Contracts and Licensing
Section 19.1 Cyberlaw and Cybercrime. Section 19.1 Cyberlaw and Cybercrime.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Digital Signature.
SCHOOL OF LAW L 470- INFORMATION TECHNOLOGY LAW
Video: Digital citizenship is defined as the norms of appropriate,
Introduction to Computer Forensics
U.S. Department of Justice
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Confidentiality and Privacy Controls
Policy and Procedure For CSCL (BIM).
Forensic and Investigative Accounting
– Communication Technology in a Changing World
E-Contracts and Internet Law
Information Systems for Health:
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
INFRASTRUCTURE & ACCESS 4TH JULY 2018
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Policy and Procedure For CSCL (BIM)

Law definition The system of rules which a particular country or community recognizes as regulating the actions of its members and which it may enforce by the imposition of penalties. Law is a system of rules and guidelines which are enforced through social institutions to govern behavior.

Law type Criminal Law Civil Law Cyber law: Cyberlaw or Internet law is a term that encapsulates the legal issues related to use of computer (any digital device) and the Internet (or network).

Computer Crime Computer crime, or Cybercrime, refers to any crime that involves a computer and a network. Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS) - Dr. Debarati Halder and Dr. K. Jaishankar (2011)

Computer Crime Computer as a target Computer as a tool

Cyber crime by country

Cyber Crime Categories Hacking Phishing Computer virus/worms/Trojan horse Identity theft (theft of digital identity) Cyberstalking (cyber harrashment) Spamming Spoofing - Deceiving a system into thinking you are someone you really are not Cyberextortion

Cyber Crime Categories

Digital forensic Forensic: scientific tests or techniques used in connection with the detection of crime. Digital forensics (sometimes known as digital forensic science) is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. (Wikipedia)

Digital Forensic A digital forensic investigation commonly consists of 3 stages: acquisition, analysis, and reporting. The technical aspect of an investigation is divided into several sub-branches, relating to the type of digital devices involved  computer forensics, network forensics, forensic data analysis and mobile device forensics.

Digital Forensic

Digital Evidence Digital evidence or electronic evidence is any probative information stored or transmitted in digital form that a party to a court case may use at trial. Audio Evidence Computer/Internet Crimes Image Analysis Video Analysis

Investigation Procedure Acquiring the evidence Taking care to make sure that the integrity of the data is preserved Authenticating the validity of the extracted data – this involves making sure that the extracted data is as valid as the original Analyzing the data while keeping its integrity.

Categories of evidence Impressions: this includes fingerprints, tool marks, footwear marks, and other types of impressions and marks. Bioforensics: this includes blood, body fluids, hair, nail scrapings, and bloodstain patterns. Infoforensics: this includes binary data fixed in any medium such as on CDs, memory, and fl- oppies. Trace evidence: this includes residues of things used in the committing of a crime like , paint, glass, and fibers. Material evidence: this includes physical materials such as folders, letters, and scraps of papers.

Intellectual property rights Intellectual property (IP) refers to creations of the intellect for which a monopoly is assigned to designated owners by law Intellectual property (IP) rights are the legally recognized exclusive rights to creations of the mind.

Intellectual property rights Copyright Trademark Patent License Agreement Plagiarism (Violation of copy right)

Digital Right Management Digital rights management (DRM) schemes are various access control technologies that are used to restrict usage of proprietary hardware and copyrighted works AKA Copy Protection DRM technologies try to control the use, modification, and distribution of copyrighted works (such as software and multimedia content), as well as systems within devices that enforce these policies.

Digital Right Management (2) The use of digital rights management is not universally accepted. Widely used technique is Restrictive Licensing Agreements

DRM Technology Limited Installation Activation Activate with online server for three to five installation Persistent online authentication Should activate by using temporary key Challenge response system Used by MIDAS Education Kit and many other Product keys Hardware protection like is Play station, Game Boy Controlling unauthorized installation like in iPhone, iPad

Privacy Protection Encrypting with secure algorithm

IT policy of Nepal Declare information technology sectors a prioritized sector. Follow a single-door system for the development of information technology. Prioritize research and development of information technology. Create a conducive environment that will attract investment in the private sector, keeping in view the private sector's role in the development of information technology.  

IT policy of Nepal Provide internet facilities to all Village Development committees of the country in phases. Render assistance to educational institutions and encourage native and foreign training as a necessity of fulfilling the requirement of qualified manpower in various fields pertaining to information technology. Computerize the records of each governmental office and build websites for them for the flow of information. Increase the use of computers in the private sector.

IT policy of Nepal Develop physical and virtual information technology park in various places with the private sector's participation for the development of information technology. Use information technology to promote e-commerce, e-education, e-health, among others, and to transfer technology in rural areas. Establish National Information Technology Centre. Establish a national level fund by mobilizing the resources obtained from His Majesty's Government, donor agencies, and private sectors so as to contribute to research and development of information technology and other activities pertaining to it.

IT policy of Nepal Establish venture capital funds with the joint participation of public and private sectors. Include computer education in the curriculum from the school level and broaden its scope. Establish Nepal in the global market through the use of information technology. Draft necessary laws that provides legal sanctions to the use of information technology.

Electronic Transaction Act(ETA) Preambles To make legal provisions for authentication and regularization of the recognition, validity, integrity and reliability of generation, production, processing, storage communication and transmission system of electronic records. For controlling the unauthorized access of electronic records (violation of the confidentiality) or of making alteration in such records through the illegal manner (violation of the integrity)