How it affects policies and procedures

Slides:



Advertisements
Similar presentations
The IT Workplace Kaye Burton & Karen Le Rossignol Communication in an IT Environment (2000)
Advertisements

Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Unit 4- Assignment 3 P5, P6, M2 BTEC Business Level 3.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 6. Using Networks 1 Network Hardware - Hub Hub - A hub is used when you have.
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Legislation in ICT.
Higher Administration and IT Administrative Practices.
Factors to be taken into account when designing ICT Security Policies
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Health and Safety Act 1974 What does it mean to me and the place where I work?
Health and Safety.
The laws Organizations are covered by lots of different laws
The Legal Framework Can you work out which slide each bullet point should go on?!
CENTRAL SCOTLAND POLICE Data Protection & Information Security Stuart Macfarlane Information Governance Unit Police Service of Scotland.
Issues Raised by ICT.
Administrative Practices Outcome 1
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Information Governance Jym Bates Head of Information Assurance.
General Purpose Packages
Law Additional Exercise ANSWERS. Question #1 (a) Any one of: gain unauthorised access (1st) to computer material (1) gain (unauthorised) access to computer.
Section 6 Theory Software Copyright, Viruses and Hacking.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
The Data Protection Act By Ian Hughes Data should not be kept longer than is necessary for the specified purpose. Data processing should meet the.
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Two of the most important pieces of the health and safety legislation affecting educational establishments across the UK are the Health and Safety at.
Everyone has a duty to comply with the Act, including employers, employees, trainees, self-employed, manufacturers, suppliers, designers, importers of.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Data Security.
Information Systems Unit 3.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
Legal Implications You need to know about the following:
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
Operational Issues. Operational Changes It is important to organisations to ensure that they abide by the Law when caring for the safety of their employees,
Implementation of legislation (Chapter 47) By Haley Court.
Computing and Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
8 – Protecting Data and Security
The Data Protection Act 1998
Learning Intention Legislations impact on security of information
Explaining strategies to ensure compliance with workplace legislation
Implications of Digital Technology for Business and Customers
Administrative Practices Outcome 1
Data Protection Act and Other Laws
Legislation in ICT.
The Data Protection Act 1998
Regulation of Investigatory Powers Act 2000
Unit 7 – Organisational Systems Security
Data Protection What’s new about The General Data Protection Regulation (GDPR) May 2018? Call Kerry on Or .
GDPR (General Data Protection Regulation)
Information management and communication
Health and Safety! By jack Hughes.
Legislation in ICT.
Legal and Organisation requirements for data recording
Protecting Data and Information
G061 - Network Security.
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

How it affects policies and procedures Topic 6 Legislation How it affects policies and procedures

Ensure compliance with: Copyright, Designs and Patents Act 1988 Computer Misuse Act 1990 Data Protection Act 1998 Freedom of Information Act 2000 Telecommunications (Lawful Business Practice) (Interception of Communications) Regulations 2000 Health and Safety at Work Act 1974.

What needs to be done? Policies – staff need clear guidance. Procedures – certain actions need to be taken to ensure compliance.

Enforcing and controlling data protection Ensure data staff do not store personal data on portable devices without permission Appointment of data controller Ensure security of personal data Data Protection Act control/enforcement Ensure accuracy of data Notification process Procedures for subject access Training of users who access/use personal data Ensure data is deleted when no longer needed

Enforcing and controlling data protection Security policy – ensures personal data is kept secure by use of: passwords and usernames/user-IDs levels of access (only certain staff can access very personal details, e.g. medical records) firewalls – to prevent access to hackers encryption – to prevent unauthorised access.

Computer Misuse Act 1990 Covers: Deliberately planting or transferring viruses to computer systems to cause damage to programs and data. Using an organisation’s computers to carry out unauthorised work. Hacking into someone else’s computer system with a view to seeing/altering information. Using computers to commit various frauds.

Procedures to prevent problems under the Computer Misuse Act 1990 Acceptable use policy – set out in employment contract. Training to make staff aware of the problems.

Policies to prevent misuse No downloads - to prevent introduction of viruses. No unauthorised work. Ban on users swapping passwords or usernames. Regular audits. Checks on users’ disk space. Scanning of portable media.

Health and Safety at Work Act 1974 Ensuring the health and safety of employees in the workplace.

Health and Safety at Work Act 1974 Health and safety practices/procedures such as: Inspections of work area (chairs, desks, screens, etc.). Policy to allow staff to change tasks. Training to make staff aware of problems and what they can do to reduce their effects. Arranging and paying for eye tests and corrective treatment (e.g., glasses). Ensuring developed software is not frustrating to use.

Exam tip For questions on this topic: make sure that you deal with policies and procedures and not the details of the acts themselves.