Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.

Slides:



Advertisements
Similar presentations
By Andy Scott, Michael Murray and Adam Kanopa
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
POSSIBLE THREATS TO DATA
Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
Legislation in ICT.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Data Protection Act.
The Data Protection Act
Data Protection Act. Lesson Objectives To understand the data protection act.
The Legal Framework Can you work out which slide each bullet point should go on?!
Issues Raised by ICT.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
General Purpose Packages
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Section 6 Theory Software Copyright, Viruses and Hacking.
Data Protection and Computer Misuse Act material Modified by Eric from Mary’s slides.
IT security By Tilly Gerlack.
3.4 Legal Implications. Overview Demonstrate knowledge and understanding of the Computer Misuse Act. Describe the roles of the BBFC (British Board of.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Slide 1 St Andrew’s High School Standard Grade Computing Databases Standard Grade Computing Studies.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
ICT Homework- ICT Security Consultant PowerPoint.
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
Internet Safety Internet Safety LPM
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Data Protection Act (1998).
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Personal data protection in research projects
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
Safety & Security By Kieran Bolko. Laws The main law that you should be taking note of is the Data Protection Act 1998 – this law sets rules for the electronic.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
1 AQA ICT AS Level © Nelson Thornes Safety and security Chip and Pin.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Data protection act. During the second half of the 20th century, businesses, organisations and the government began using computers to store information.
Learning Intention Legislations impact on security of information
Data Protection GCSE ICT Mrs N Steventon-2005.
Legislation in ICT.
Data Protection Act.
TB2 Lesson 5 Data Protection
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Data Protection Act and Computer Misuse Act ANSWERS.
HOW DO I KEEP MY COMPUTER SAFE?
Faculty of Science IT Department By Raz Dara MA.
Unit 4 IT Security Kerris Davies.
Legislation in ICT.
Computer Security By: Muhammed Anwar.
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what data you think they hold. For Example Vodaphone – Name, Address, Data of Birth, Phone number, Bank details. All – Will understand that personal data is stored by companies and needs protecting Most – Will understand some of the ways that data can be protected and evidence this. Some – Will be able to talk about how personal data can be protected along with Legal Issues

Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what data you think they hold For Example Name Age Address Bank Details Phone Number Medical historyGrades Pictures Parent details

Data Security and legal issues Objectives To work towards the P7 and M4 unit 2 criteria Have an understanding of the Possible Data Security and legal issues when using a computer. Describe how Hardware, software and Data can be protected All – Will understand that personal data is stored by companies and needs protecting Most – Will understand some of the ways that data can be protected and evidence this. Some – Will be able to talk about how personal data can be protected along with Legal Issues

Data Security and legal issues All – Will understand that personal data is stored by companies and needs protecting Most – Will understand some of the ways that data can be protected and evidence this. Some – Will be able to talk about how personal data can be protected along with Legal Issues

Data Security and legal issues Protecting Hardware, Software and Data Hacking Hacking is where an unauthorised person uses a network, Internet or modem connection to gain access past security passwords or other security to see data stored on another computer.networkInternet modemdata Firewall A security tool that controls traffic too and from a network. All – Will understand that personal data is stored by companies and needs protecting Most – Will understand some of the ways that data can be protected and evidence this. Some – Will be able to talk about how personal data can be protected along with Legal Issues

Data Security and legal issues Protecting Hardware, Software and Data Spyware Spyware is computer software that is installed secretly on a personal computer to collect information about a user, their computer or browsing habits without the user's Permissioncomputer softwarepersonal computer Anti - Spyware Software installed on an end user workstation (computer) to detect and remove Spyware and Adware All – Will understand that personal data is stored by companies and needs protecting Most – Will understand some of the ways that data can be protected and evidence this. Some – Will be able to talk about how personal data can be protected along with Legal Issues

Data Security and legal issues Protecting Hardware, Software and Data Data Theft Data theft is when data is taken without the owners consent from a computer or storage device Passwords/Physical Security This can be used to stop people physically taking the data from the workstation (Computer) or the workstation its self All – Will understand that personal data is stored by companies and needs protecting Most – Will understand some of the ways that data can be protected and evidence this. Some – Will be able to talk about how personal data can be protected along with Legal Issues

Data Security and legal issues Protecting Hardware, Software and Data Computer Crash Computer Crash, this is when a computer fails causing a loss of data, this could be done by accident or on purpose Back up Copying the information onto another medium (storage area) regularly, storing this in another area. All – Will understand that personal data is stored by companies and needs protecting Most – Will understand some of the ways that data can be protected and evidence this. Some – Will be able to talk about how personal data can be protected along with Legal Issues

Data Security and legal issues Protecting Hardware, Software and Data Viruses Viruses are programs written by people and designed to cause nuisance or damage to computers or their files.programs Anti - Virus Software installed on an end user workstation (computer) to detect and remove Viruses, Trojan horses and worms from files and s All – Will understand that personal data is stored by companies and needs protecting Most – Will understand some of the ways that data can be protected and evidence this. Some – Will be able to talk about how personal data can be protected along with Legal Issues

Data Security and legal issues Protecting Hardware, Software and Data Task 1 (5 minutes) Using the Cards Provided in groups of 2 arrange them to show Name of threat Description Possible Protection All – Will understand that personal data is stored by companies and needs protecting Most – Will understand some of the ways that data can be protected and evidence this. Some – Will be able to talk about how personal data can be protected along with Legal Issues Be ready to talk about your answer if asked

Data Security and legal issues Along side physical protection there is also deterrents e.g. Data Protection act and the Computer misuse act TASK Minute activity – Research and answer the following Questions. Be ready to feedback the information found to the group in a 10 minute plenary at the end All – Will understand that personal data is stored by companies and needs protecting Most – Will understand some of the ways that data can be protected and evidence this. Some – Will be able to talk about how personal data can be protected along with Legal Issues All your Personal Data – Going to the highest bidder. Buy today and get Medical History Free of Charge Sign up to day and learn how to change your grades increase your bank account and change your friends personal data

Data Security and legal issues Protecting Hardware, Software and Data Plenary All – Will understand that personal data is stored by companies and needs protecting Most – Will understand some of the ways that data can be protected and evidence this. Some – Will be able to talk about how personal data can be protected along with Legal Issues What is the Data Protection Act A law designed to protect personal data stored on computer. Who is the Information Commissioner The official who supervises the enforcement of the Data Protection Act. Who is the data controller The nominated person in a company who applies to the data commissioner for permission to store and use personal data. Who are the data subject The person about whom data is stored. Who are the data users Anyone who uses the personal data as part of their job. What is personal data Information about a particular person.

Data Security and legal issues Protecting Hardware, Software and Data Plenary All – Will understand that personal data is stored by companies and needs protecting Most – Will understand some of the ways that data can be protected and evidence this. Some – Will be able to talk about how personal data can be protected along with Legal Issues Computer misuse act The Computer Misuse Act 1990 was designed to protect the integrity of computer systems by deterring the activities of hackers. It created three new offences: 1.Unauthorised access to computer programs or data 2.Unauthorised access with a further criminal intent 3.Unauthorised modification of computer material

Data Security and legal issues Protecting Hardware, Software and Data Plenary All – Will understand that personal data is stored by companies and needs protecting Most – Will understand some of the ways that data can be protected and evidence this. Some – Will be able to talk about how personal data can be protected along with Legal Issues Can you find and list all eight points of the data protection act 1.processed fairly and lawfully 2.used for the lawful purpose it was collected for 3.adequate and relevant to purpose collected for 4.kept accurate and up-to-date 5.kept no longer than necessary 6.processed within the rights of the data subjects 7.kept secure 8.kept only within the EEC

The following slides should be made in to cards for the students to arrange

Is where an unauthorised person uses a network, Internet or modem connection to gain access past security passwords or other security to see data stored on another computer. networkInternetmodemdata Back up Copying the information onto another medium (storage area) regularly, storing this in another area. Computer Crash this is when a computer fails causing a loss of data, this could be done by accident or on purpose Hacking Firewall A security tool that controls traffic too and from a network.

Virus Anti - Virus Software installed on an end user workstation (computer) to detect and remove Viruses, Trojan horses and worms from files and s are programs written by people and designed to cause nuisance or damage to computers or their files.programs Passwords/physical security This can be used to stop people physically taking the data from the workstation (Computer) or the workstation its self is when data is taken without the owners consent from a computer or storage device Data Theft

Spyware Name of Threat Anti - Spyware Software installed on an end user workstation (computer) to detect and remove Spyware and Adware is computer software that is installed secretly on a personal computer to collect information about a user, their computer or browsing habits without the user's Permissioncomputer softwarepersonal computer Description of Threat Protection against Threat