Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.

Slides:



Advertisements
Similar presentations
By Andy Scott, Michael Murray and Adam Kanopa
Advertisements

POSSIBLE THREATS TO DATA
Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
Legislation in ICT.
Legislation Who governs e-commerce?. E-commerce is regulated by laws and guidelines. These aim to ensure that sites operate effectively and that online.
Health and Safety Legislation
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Data Protection Act.
Data Protection Act. Lesson Objectives To understand the data protection act.
CENTRAL SCOTLAND POLICE Data Protection & Information Security Stuart Macfarlane Information Governance Unit Police Service of Scotland.
3.4 Legal Implications. Overview Demonstrate knowledge and understanding of the Computer Misuse Act. Describe the roles of the BBFC (British Board of.
Computer Legislation The need for computer laws Go to Contents.
NOT PROTECTIVELY MARKED Data Protection Information Management & Information Security.
Unit 13: IT Trouble Shooting and Repair Philomena Dillon ©1 Aims: Evaluate Acts and Regulations that impact the workplace and your role as an IT Technician.
Unethical use of Computers and Networks
OCR Cambridge National ICT Mr Conti 10X 25 th April 2014.
Crime & Malpractice AS Module Heathcote Ch. 10.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
13.6 Legal Aspects Corporate IT Security Policy. Objectives Understand the need for a corporate information technology security policy and its role within.
The Data Protection Act [1998]
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Revision Q1: Explain the term HACKING?
Mr C Johnston ICT Teacher
M ORAL AND ETHICAL ISSUES. Use and Abuse of Personal and Private Data All the information stored on Computer is governed by law or legislation. The main.
LEGAL AND MORAL ISSUES – CODE OF CONDUCT Year 13.
DATA PROTECTION ACT (DPA). WHAT IS THE DATA PROTECTION ACT?  The Data Protection Act The Data Protection Act (DPA) gives individuals the right.
1 Assignment 3 LO This learning outcome is all about how legal, ethical, safety and security issues affect how computers should be used. All businesses.
PROTECTING YOUR CREDIT PG NAME, TEACHER AND DATE.
The Theory of Hospitality and Catering Dynamic Learning published by Hodder Education © 2011 D Foskett and P Paskins Computer legislation.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Information Security January What is Information Security?  Information Security is about the physical security of our equipment and networks as.
ICT and the Law You need to know about 3 laws covering the use and misuse of ICT.
Business Ethics and Social Responsibility GCSE Business and Communication Systems Business and Communication Systems.
Safety & Security By Kieran Bolko. Laws The main law that you should be taking note of is the Data Protection Act 1998 – this law sets rules for the electronic.
252 Legislation AS Edexcel New Specification 2015 Business By Mrs Hilton for.
Information Systems (Engineering) in Industry Legal Implications of System Provision Delivered by Dave Thomas, K235 e:
ICT, Communication & related Legislations. Produced by Neil Liggett. Acts of Law – shared data & information.
Introduction to Data Protection Plan »Brief Introduction to Data Protection  Example  Principles  P3, 4, 7  Sensitive Data  Conditions for Processing.
Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton Remote.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Welcome to the ICT Department Unit 3_5 Security Policies.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
BTEC ICT Level 3 Unit 8 E-Commerce
WORKPLACE LEGISLATION
Data security OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013.
Legal and ethical issues
COMP3357 Managing Cyber Risk
Implications of Digital Technology for Business and Customers
Data protection headaches: GDPR, brexit AND perimeter risk
Data Protection Act and Other Laws
Legislation in ICT.
Data Protection Act.
ICT meeting Business needs
Understanding the issues related to the use of information
COMP3357 Managing Cyber Risk
Legislation in ICT.
LO1 - Know about aspects of cyber security
BTEC ICT Level 3 Unit 8 E-Commerce
Presentation transcript:

Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton Data loss

Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton Legal implications Impact on customers Impact on employees Impact on the business Businesses such as supermarkets must make sure that the data they hold is kept safe and secure. If the data is lost or corrupted, the impact on the business and its customers can be serious. Data Loss

Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton Customers whose personal data is lost or stolen from a business will view the business as untrustworthy and stop using it. Stolen data may used to gain unauthorised access to a customer’s financial details or to steal the customer’s identity – identity theft.unauthorised access identity theft Impact on customers

Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton If an employee’s actions cause data to be lost or corrupted, the employee could: face disciplinary action; be demoted and be paid less; be dismissed from the job; be given a poor reference if they wanted another job; face prosecution if the actions were deliberate. Impact on employees

Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton A business that loses data may not be able to carry on as a business and may close, may be sued by customers, or be subject to prosecution if the data is the personal data of their customers. Being sued or prosecuted may result in the business: having to increase the levels of its security on its computer systems and premises; paying compensation of many thousands of pounds; being fined; being seen as untrustworthy or incompetent or stopped from trading altogether. Impact on the business

Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton The Data Protection Act (DPA) and the Computer Misuse Act (CMA) are two pieces of legislation that will apply if a business loses data.Data Protection Act (DPA) Computer Misuse Act (CMA) Legal implications

Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton The Data Protection Act (DPA) has a principle that requires personal data to be kept secure, so if a business loses data, this principle has been broken.Data Protection Act (DPA) Criminal proceedings may be brought against the business by the Information Commissioner and the business may be fined or have to pay compensation to individuals whose data has been lost. Full contents of the Data Protection Act are to be found on the UK Government website.Data Protection Act are to be found on the UK Government website Data Protection Act (DPA)

Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton The Computer Misuse Act (CMA) applies if the data has been stolen. If the thief (a hacker or even an employee) is found, then the business can allow the police to prosecute the thief.Computer Misuse Act (CMA) The thief could face a fine or imprisonment, and have to pay compensation to the business. Full contents of the Computer Misuse Act are to be found on the UK Government website.Computer Misuse Act are to be found on the UK Government website Computer Misuse Act (CMA)