LO1 - Know about aspects of cyber security

Slides:



Advertisements
Similar presentations
Electronic Medical Records: Implications of HIPAA for Selecting and Implementing an EMR Todd Frech Senior Partner
Advertisements

HIPAA Security Regulations Jean C. Hemphill Ballard Spahr Andrews & Ingersoll, LLP November 30, 2004.
Auditor General’s Office One key audit focus area – Compliance with Laws and Regulations.
DIGITAL SIGNATURE AND ELECTRONIC DOCUMENTS IN ITALY Prof. Pierluigi Ridolfi AIPA Authority for Information Technology in the Public Administration V. Solferino,
Legal Context Saskia Mermans  Ispa and the legislation  Legal Framework for the Internet: general observation  Highlights of the legislation.
Evolving IT Framework Standards (Compliance and IT)
Computer Legislation The need for computer laws Go to Contents.
13.6 Legal Aspects Corporate IT Security Policy. Objectives Understand the need for a corporate information technology security policy and its role within.
UNIT 12 P3 – SECURITY PROTECTION MECHANISMS Cambridge Technicals.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
Electronic Commerce By: Shannon McManus. Background  The process of buying, selling, or exchanging products through a computer.  Transactions are usually.
Mr C Johnston ICT Teacher
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
ISO DOCUMENT CONTROL. ISO Environmental Management Systems2 Lesson Learning Goals At the end of this lesson you should be able to: 
Bellwork- Date- 1) Plagiarizing-Word Wall 2) “A Push for Online Privacy” paraphrase or plagiarism 3) ECPA article-jigsaw activity Essential Question- What.
DATA PROTECTION 2003 THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA Belgrad.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
MIS5001: Information Technology Management Ethics and Continuity Management Larry Brandolph
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
Prof R T KennedyEMC & COMPLIANCE ENGINEERING 1 EET 422 EMC & COMPLIANCE ENGINEERING.
Cyberlaw Harmonization in the East African Community Cécile Barayre-El Shami Programme Manager, E-Commerce and Law Reform, ICT Analysis Section, Division.
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
Centre de Recherches Informatique et Droit
Explaining strategies to ensure compliance with workplace legislation
MGMT 452 Corporate Social Responsibility
The Possibilities are Endless?
Bigger Picture.
ECE362 Principles of Design
Data Protection Act and Other Laws
Providing Access to Your Data: Handling sensitive data
Exchange of information between Member States
Legal aspects related to regeneration of the industrial areas in Romania Mircea Grigorovschi „This project has been funded with support from the European.
Decrypting Data Compliance in China
Lesson Objectives Aims You should be able to:
Medical Device Cybersecurity Legislative Activities - Overview
GDPR Awareness and Training Workshop
Cybersecurity in Belarus a general overview of support areas
ICT meeting Business needs
Understanding the issues related to the use of information
BIS 320 NERD Lessons in Excellence-- bis320nerd.com.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
Learning Area 1 Information And Communication Technology and Society
GDPR General Data Protection Regulation EU: Coming May 25, 2018
Sue Cawthray, CEO/ Gill Thrush, Catering Manager
Dan Tofan | Expert in NIS 21st Art. 13a WG| LISBON |
Review of the Telecom Framework – Security rules Security rules in the proposed European Electronic Communications Code (EECC) Lisbon, 8 March 2017.
Appropriate Data Sharing in Health and Social Care
From DPA to GDPR: the key elements
Cybersecurity compliance for attorneys
Lesson Objectives Aims The Data Protection Act 1998
Cybersecurity Threats and Opportunities in Latin America
What is Digital Right Management’s Role in Modern Education System’s Play? —A Comparative Research of DRM System’s Influence in.
PREJUDICE, DISCRIMINATION & STEREOTYPES
Unit 8: Lesson 2- The Legislative Branch of Georgia Government
RULE OF LAW Unit 1.
Cyber security policy in an evolving landscape
Essentials of the legal environment today, 5e
By The Data Protection Commissioner
HIPAA Security Standards Final Rule
Tools & Approaches for Ongoing Privacy Compliance
Brian O’Neill Dublin Institute of Technology 9/10 May Florence
The impossible task of regulating IOT
LO1 - Know about aspects of cyber security
Part I – Introduction to Non-Legislative Rules
Mark Denham Glasgow University Library
AOITI WG3 Privacy-in-IoT Taskforce
LO1 - Know about aspects of cyber security
Working in a digital way
GDPR (General Data Protection Regulations) -What do we know about it?
World-Leading Research with Real-World Impact!
Presentation transcript:

LO1 - Know about aspects of cyber security Level 2 Technical IT Unit 2: Essentials of Cyber Security

Legal Implications of cyber security Lesson 4

Objectives Know about the Acts and legislation that can be used when managing cyber security incidents. Be aware of the most up-to-date versions

Task Read through the information on the 2 documents given to you on: Data Protection Act Computer Misuse Act Highlight important sections or information Think about how this relates to Cyber Security Attacks and Incidents. Be ready to share thoughts and ideas.

Rule of Law Read the rule of law document. How does this relate to Cyber Security?

Research Look into how the following acts and legislation may relate to Cyber Security. Official Secrets Act 1989  Communications Act 2003 Privacy and Electronic Communications (EC Directive) Regulations 2003 General Data Protection Regulation 2016/679  Network and Information Security Directive 2016/1148