EuroCRIS Conference Brussels Legal Issues Heather Weaver Business & Information Technology Department Legal & Ethical Issues Heather Weaver (Internet Legal.

Slides:



Advertisements
Similar presentations
Preventing Infringement of Intellectual Property (IP) Rights in the Workplace Awareness raising to prevent infringement within [business name] September.
Advertisements

Preventing Infringement of Intellectual Property (IP) Rights in the Workplace Awareness raising to how to prevent infringement within [business name] September.
Northside I.S.D. Acceptable Use Policy
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
4. Intellectual Property and Ethics on the Web 59.
C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 10 Privacy Policy © Routledge Richard.
Information Systems Unit 3 – Outcome 3 Legal Obligations of Programmers Student Lecture.
EuroCRIS Conference Brussels Legal Issues Heather Weaver Business & Information Technology Department Open Access – disentangling the legal conundrum Heather.
Your Rights Under the Internet Law By: Sannita S. Lam.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
MEDIA LAW Copenhagen University SESSION 10 Dirk VOORHOOF Ghent University (->contact)
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
BACKGROUND  Hawkes Bay Holdings/Aquila Underwriting LLP  Established 2009 utilising Lloyd’s capacity: Canopius % Hiscox 33 50% to May 2010, replaced.
Legislation Who governs e-commerce?. E-commerce is regulated by laws and guidelines. These aim to ensure that sites operate effectively and that online.
INTERNET and CODE OF CONDUCT
Cyber Risk Enhancement Coverage. Cyber security breaches are now a painful reality for virtually every type of organization and at every level of those.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
CENTRAL SCOTLAND POLICE Data Protection & Information Security Stuart Macfarlane Information Governance Unit Police Service of Scotland.
Higher Administration
Business Law and the Regulation of Business Chapter 48: CyberLaw By Richard A. Mann & Barry S. Roberts.
Law as an enterprise skill: ‘Intellectual property and project commercialisation in engineering enterprise’ Professor Jim Roach Design Computing & Engineering.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Chapter 1. Electronic Commerce  Brief History of Commerce and Communication  Introduction to Electronic Commerce  Laws Guiding E-commerce  Are we.
Moffatt Thomas Practical Suggestions for Electronic Device and Internet Use in the Workplace C. Clayton Gill December 18, 2012.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Intellectual Property, Nondisclosure agreements, Electronically Monitored Workplaces, And high level thinking questions.
Restricted and Permitted Acts Richard McCracken Head of Intellectual Property The Open University.
Electronic Use Policies.   Social Media  Internet.
Legal aspects Based on Law in the Internet Age Sharon K. Black.
Data and You. Computer Crime Less Cash money Credit cards types credit, debit, cash cards, and checks ATMs.
Law Additional Exercise ANSWERS. Question #1 (a) Any one of: gain unauthorised access (1st) to computer material (1) gain (unauthorised) access to computer.
ELearning Backpack Initiative Exciting Opportunity for Freshman Raiders.
COM531 Multimedia Technologies Lecture 11 – Legal Issues.
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved E-Commerce Specialist.
©euroCRIS/Keith G JefferyCRIS Seminar Brussels Discussion Topics Keith G Jeffery President, euroCRIS
Computer Legislation The need for computer laws Go to Contents.
CHAPTER 8 PROTECTING PEOPLE AND INFORMATION Threats and Safeguards.
Legal and Ethical Issues. Overview Issues of responsibility for libel, obscenity and indecency Aspects of copyright Issues involved in user agreement.
Class Discussion Notes MKT April 10, 2001.
Concept #14.  In order to be successful on the job, what technology skills do you think you should develop?
Copyright legislation Copyright (Computer Programs) Regulations 1992 Elma Graham.
COMPUTER ETHICS Owda Shaqalih Hussam Hamada Nedal ALshorafa.
Electronic Technology Issues UK Employment Law Gillian Leach TAGLaw October 2007.
1 Managing IT and security Risks from Social Media in Your business By Boris Agranovich Copyright.
What is Copyright? Copyright is a form of intellectual property protection granted under Indian law to the creators of original works of authorship such.
The law on Intermediary Liability in India
Jeopardy: Digital Citizenship Please use presentation mode!
Federation Against Software Theft. What Is Copyright? What is copyright infringement? What are the penalties for copyright infringement? What is a trade.
ELearning Backpack Initiative Exciting Opportunity for Freshman Raiders.
THE LEGAL ENVIRONMENT OF BUSINESS © 2009 Pearson Education, Inc. publishing as Prentice Hall Ch. 6-1 The Legal Environment of Business A Critical Thinking.
Computer Ethics Chapter 14 – Computers: Understanding Technology.
Understanding Business Ethics 2 nd Edition © 2014 SAGE Publications, Inc. Chapter 9 Ethics and Information Technology Understanding Business Ethics Stanwick.
1104B – Dr. Jackie.  Papers were great!  Everyone hit the mark  Remember to contact me ◦ ◦ On AIM at
THE LEGAL ENVIRONMENT OF BUSINESS © 2006 Prentice Hall Ch. 6-1 A Critical Thinking Approach Fourth Edition Nancy K. Kubasek Bartley A. Brennan M. Neil.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Computing and Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
Creating your Global Electronic Business: LEGAL Pitfalls & Opportunities Presentation: Andres Felipe Rodriguez C. CybeRegulation Consulting Group.
ELearning Backpack Initiative Exciting Opportunity for Freshman.
Cyber Liability: New Exposures Presented by: Henriott Group © 2007, , Zywave Inc. All rights reserved.
Cyber Liability Insurance for an unsecure world
Learning Intention Legislations impact on security of information
Privacy and the Law.
ETHICAL & SOCIAL IMPACT OF INFORMATION SYSTEMS
CHAPTER 22 E-COMMERCE 2011 Thomson Reuters Legal & Regulatory Ltd. All Rights Reserved. PowerPoint slides to accompany A Guide to Business Law, 19th.
SCHOOL OF LAW L 470- INFORMATION TECHNOLOGY LAW
Online Legal and Ethical Issues
Intellectual Property Rights
Cyber Law and E-Commerce
Presentation transcript:

euroCRIS Conference Brussels Legal Issues Heather Weaver Business & Information Technology Department Legal & Ethical Issues Heather Weaver (Internet Legal Adviser) Business and Information Technology Department

Legal & Ethical Issues Martini Computing ! (any time, any place, anywhere…) we’ve feasted on a full measure of leveraging Research Information Assets for driving the ERA and learned about the technologies that deliver them but what about taking a “health check”? Before getting into the driving seat you do well to pause …….

Table of Contents Legal & Ethical Issues Prohibited and Regulated activities Ethics Intellectual Property Rights Content Liability and Protection Data Protection Defamatory Statements Freedom of Information

Prohibited and Regulated Activities Drink Driving - the dreaded breath- analyser Prohibited and Regulated Activities Pornography and sexual offences Computer Misuse Gambling Financial Services Advertising Cross-border content Encryption Pharmaceuticals

Ethics Is this your car sir ? Ethics Plagiarism Scientific/Fraudulent Misconduct Peer Review

Intellectual Property Rights Can I see your licence ? Intellectual Property Rights Copyright Trade Marks Trade Mark Infringement Domain Names

Copyright Rights Infringement Database infringement Electronic publishing on the Internet Linking liability Caches & mirrors Remedies for infringement

Content liability and protection Are you insured to drive this vehicle ? Content liability and protection Incorrect information Protecting content Liability of on-line intermediaries Restricting liability Employer liability Employer access to workplace communications Viruses

Data Protection Would you open the trunk please ? Data Protection Publishing personal data Sending personal information by internet Holding/processing personal data

Data Protection The 8 Data Protection Principles Cross-border disclosure Have you driven this car overseas?

Defamatory Statements Before complaining to the Chief Constable Defamatory Statements What is defamation? Damage to reputation Liability for defamatory statements

Freedom of Information General provisions of the Act Publication Schemes Exemptions Requirement to store public records electronically

All systems go…………. The open road Good map – opens up all the possibilities ( Information portals ) Well signposted – helps you steer your way through ( Knowledge management tools ) No traffic jams – gets you there unhindered ( Regulations ) Freedom ……………..