Code of conduct Year 13.

Slides:



Advertisements
Similar presentations
The IT Workplace Kaye Burton & Karen Le Rossignol Communication in an IT Environment (2000)
Advertisements

MADISON COUNTY SCHOOLS ACCEPTABLE USE AND INTERNET SAFETY POLICY.
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 6. Using Networks 1 Network Hardware - Hub Hub - A hub is used when you have.
Uintah School District Acceptable Use for Computer and Network Access.
Boyertown Area School District Acceptable Use Policy.
Legislation in ICT.
Riverside Community School District
ICAICT202A - Work and communicate effectively in an IT environment
Factors to be taken into account when designing ICT Security Policies
Health and Safety Legislation
ACCEPTABLE An acceptable use policy (AUP), also known as an acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
The laws Organizations are covered by lots of different laws
Higher Administration
HIPAA PRIVACY AND SECURITY AWARENESS.
Electronic Use Policies.   Social Media  Internet.
Computer Legislation The need for computer laws Go to Contents.
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Donald Constant. Digital Citizenship  For teachers and students, digital citizenship changes as new technology tools are used by the educational world.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Code of Conduct 344 Code of Conduct 344. Code of Conduct 344 Introduction; Do you agree with the following statements? Employers need their employees.
The right item, right place, right time. DLA Privacy Act Code of Fair Information Principles.
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
Network Security & Accounting
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
Security and Ethics Safeguards and Codes of Conduct.
? Moral principles of right and wrong Used by individuals/organisations To guide behaviour.
Welcome to the ICT Department Unit 3_4 Code of Conduct.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Session 12 Information management and security. 1 Contents Part 1: Introduction Part 2: Legal and regulatory responsibilities Part 3: Our Procedures Part.
DON Code of Privacy Act Fair Information Principles DON has devised a list of principles to be applied when handling Protected Personal Information (PPI).
Safety & Security By Kieran Bolko. Laws The main law that you should be taking note of is the Data Protection Act 1998 – this law sets rules for the electronic.
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
© 2013 IBM Corporation IBM Security Systems © 2012 IBM Corporation Offense Magnitude.
Welcome to the ICT Department Unit 3_5 Security Policies.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
Learning Intention Legislations impact on security of information
Explaining strategies to ensure compliance with workplace legislation
WORKPLACE LEGISLATION
Using the Computer Responsibly
Legislation in ICT.
Technology Guidelines for Students
Using a Computer Network
Telecommuting (Teleworking)
Understanding the issues related to the use of information
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Unit 7 – Organisational Systems Security
Technology Guidelines for Students
Legislation in ICT.
Computer Misuse Act 1990 GCSE ICT.
Operational procedures for preventing misuse
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
How it affects policies and procedures
General Data Protection Regulation Q & A Session
Protecting Data and Information
G061 - Network Security.
Kyrene Student Acceptable Use Policy Technology Guidelines
Presentation transcript:

Code of conduct Year 13

Lesson Objectives To define Code of conduct To examine why to have a Code of conduct To understand what a Code of conduct should contain To examine what can happen if a Code of conduct is not followed.

What is a code of conduct? A code of conduct is a set of rules/agreements drawn up by managers and their employees, outlining what they can and can’t do using ICT systems.

Why have a code of conduct? A Code of conduct tries to reduce the likelihood of potential problems, such as: 1. Introduction of viruses. 2. Misuse of ICT. 3. Distribution of material that is racially or sexually offensive. 4. Misuse of data for illicit purposes. 5. Inappropriate use of mobiles phones 6. Blackmail 7. Violating terms of copyright or software agreements.

What should it contain? Responsibilities – abiding by the rules Respecting rights of others – being aware of others rights Abiding by current legislation – i.e. data protection act etc Authorisation and permissions on data access – What can and can’t they do with the data Security – Not disclosing passwords, logging off procedures Protecting hardware and software from malicious damage – Ensuring equipment is not damaged on purpose Complying with licensing agreements – not using company software on own equipment without license

Penalties for misuse Informal warning Written warning Dismissal Given verbally for minor errors such as not logging on Written warning More serious breach such as unauthorised use of software. This would be an official letter and kept on record Dismissal Very serious infringement, employee has ignored pervious warnings; may have lost company data. Prosecution Could be stealing or intentionally damaging equipment or software