 Main Benefit: › The main benefit that is occurred by introducing a new system to work with or instead of the old system, is the forms of cost saving.

Slides:



Advertisements
Similar presentations
Administrative Systems and the Law What you need to know to produce an oral presentation for Unit 7 When the presentations will take place Resources you.
Advertisements

CHAPTER 4 E-ENVIRONMENT
CHARTERED SECRETARIES AUSTRALIA New Privacy Laws 6 June 2013.
Data Protection.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
Identity Management In A Federated Environment Identity Protection and Management Conference Presented by Samuel P. Jenkins, Director Defense Privacy and.
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
Legislation in ICT.
Data Protection & Freedom of Information The Practical Implications of Data Protection and Freedom of Information Caroline Dominey Data Protection Officer.
6/1/2015MINISTRY OF ENERGY, COMMUNICATIONS AND MULTIMEDIA 1 PRESENTATION OF PERSONAL DATA PROTECTION BILL PRESENTATION OF PERSONAL DATA PROTECTION BILL.
Privacy and Data Protection Issues for UCLA Christine Borgman, Professor Information Studies.
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
The Data Protection Act
LAW SEMINARS INTERNATIONAL New Developments in Internet Marketing & Selling November 13 & 14, 2006 San Francisco, California Moderator : Maureen A. Young.
The Social Effect of Information System
Improving productivity with online collaboration © 2015 albert-learning.com Improving productivity with online collaboration.
General Purpose Packages
Privacy: Understanding the Needs, Policy, and Approach Owen Greenspan Director Law and Policy Program.
HIPAA PRIVACY AND SECURITY AWARENESS.
Spring Semester 2009 IT Policy and Technology: Japan and Global IT Environment 世界のなかの日本としての IT 政策と技術 Jun Murai Masaaki Sato Jun Takei May 21, Privacy.
The Data Protection Act 1998 The Eight Principles.
The Eighth Asian Bioethics Conference Biotechnology, Culture, and Human Values in Asia and Beyond Confidentiality and Genetic data: Ethical and Legal Rights.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
Stakeholders. DO NOW Page 71 Tata Nano Divides Opinion answer all questions at the top of page 72.
“What’s Ethics Got To Do With It” Presentation to the Canberra Evaluation Forum Gary Kent Head Governance Australian Institute of Health and Welfare.
Investigating Rights and Responsibilities at work
Monitoring Employees on Networks: Unethical or Good Business?
Data Protection Act AS Module Heathcote Ch. 12.
The Data Protection Act (1998). The Data Protection Act allows you to Check if any organisation keeps information about you on computer or in paper form.
Data Protection Corporate training Data Protection Act 1998 Replaces DPA 1994 EC directive 94/46/EC The Information Commissioner The courts.
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Everyone has a duty to comply with the Act, including employers, employees, trainees, self-employed, manufacturers, suppliers, designers, importers of.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
General Purpose Packages Revision. Why GPPs? Information –Accurate –complete –up-to-date Share information.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Observing the Current System Benefits Can see how the system actually works in practice Can ask people to explain what they are doing – to gain a clear.
Session 12 Information management and security. 1 Contents Part 1: Introduction Part 2: Legal and regulatory responsibilities Part 3: Our Procedures Part.
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
DATA PROTECTION ACT INTRODUCTION The Data Protection Act 1998 came into force on the 1 st March It is more far reaching than its predecessor,
Chapter 16 – Technological Development Technological Development Employees, managers and organisations, as well as the population in general, take for.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
DATA PROTECTION ACT DATA PROTECTION ACT  Gives rights to data subjects (i.e. people who have data stored about them on a computer)  Information.
Aims, objectives and mission statements OCR Diploma.
The Data Protection Act 1998
Making the Connection ISO Master Class An Overview.
PowerPoint presentation
Privacy principles Individual written policies
The General Data Protection Regulation act (GDPR)
General Data Protection Regulation
Data Protection Act.
The Data Protection Act 1998
Data Protection Legislation
FOIP and PIPA: A Little More than Kin and Less than Kind
Data Protection & Freedom of Information- An Introduction
G.D.P.R General Data Protection Regulations
General Data Protection Regulation
Data Protection principles
OECD Guidelines Collection Limitation: should be limited to personal data, obtained by lawful and fair means, and (where appropriate) with knowledge and.
Information management and communication
General Data Protection Regulations 2018
IAPP TRUSTe SYMPOSIUM 9-11 JUNE 2004
Presentation transcript:

 Main Benefit: › The main benefit that is occurred by introducing a new system to work with or instead of the old system, is the forms of cost saving such as reducing the time to get a specific work done, serving a customer in a company, or even security issues in some place.

 The negative side: › Loss of work:  Direct: Replacing the old system (employees) by the new System.  Indirect: By being unable to adapt to change, or to gain training in newer technologies. › Divisions in society between poorly qualified (and less employable) people and better- educated ones.  These divisions also extend to communities and countries.

 Based on the specific methods of change over given in section 1.1.8, we could summarize the social and economic implications as follows: MethodSocial ImplicationsEconomic Implications Parallel Running More work for employees or they may have to work longer hours to cope with extra work Staff may have to be paid more or extra staff employed. Mistakes less critical for the business. Phased Introduction More hours to work in this case also. Different People may be affected in different ways at different times- could cause dissatisfaction. Costs may be still associated with extra work. Longer period of changeover; difficulties with system may become drawn out-the company’s reputation for affiance may suffer. Direct Changeover Staff may feel under pressure during this type of changeover. As with the other methods these are training costs to be considered. The cost of hardware/software may also have to be paid at one time rather than spread out over time.

 Economic consequences: › Competitions between countries on better ways of producing products, will cause in unemployment in the less competitive country between those in the competition field. › Huge changes to towns, cities and lifestyles, out of the big use of high new technologies like Smart phones and their uses. › Software piracy: not a direct consequence, but one industry that has sprung in certain parts of the world.

 Political consequences: The OECD (Organization for Economic Cooperation and Development) has proposed a number of principles which should apply to data held about people: › Collection Limitation Principle › Collection Limitation Principle : There should be limits to the collection of personal data and it should be obtained by lawful means. › Data Quality Principle › Data Quality Principle : Personal data should be relevant to the purposes for which they are to be used, should be accurate, complete and kept up-to-date. › Purpose Specification Principle › Purpose Specification Principle : The purpose for which personal data are collected should be specified not later than at the time of data collection.

› Use Limitation Principle › Use Limitation Principle : Personal data should not be disclosed, made available or otherwise used for purposes other than those specified in accordance with the last principle except: 1.With the consent of the data subject; or 2.By the authority of law. › Security Safeguards Principle › Security Safeguards Principle : Personal data should be protected against such risks as loss or unauthorized access, destruction, use, modification or disclosure of data. › Openness Principle › Openness Principle : There should be a general policy of openness about developments, practices and policies with respect to the personal data.

› Individual Participation Principle › Individual Participation Principle : An individual should have the right: 1.to obtain from a data collector, or otherwise, confirmation of whether or not the data collector has data relating to him. 2.To have communicated to him, data relating to him: a.Within a reasonable time; b.At a charge, if any, that is not excessive; c.In a reasonable manner, and d.In a form that is readily intelligible to him. 3.To be given reasons if a request made under subparagraphs(a) and (b) is denied, and to be able to challenge such denial; and 4.To challenge data relating to him and, if the challenge is successful, to have the data erased, rectified, completed or amended.

 Accountability Principle : A data controller should be accountable for complying with measures which give effect to the principles stated previously.  The increasing amount of personal data held about citizens on governmental or private computer systems has led considerable legislation on data protection based on these guidelines.

 Cultural consequences: › One of the effects of the growth of computer systems has been the spread of the English language via software and operating systems. With language comes culture and cultural bias (some would say cultural “imperialism”). After all, not all cultures read text from left to right or top to bottom of a page. › The computer also offers much in the way of passive entertainment so there are fears that young people spend too much time online or playing computer games. Of course,, the internet offers an ideal way for people to find out more about other cultures and to meet people from other countries online in chat rooms.

 Environmental consequence: › Computers use large amount of energy, although the main power drain does come from the monitor and two developments have helped reduce this. The first is the use of power settings which allow the monitor to sleep after a short time interval. The second is the increasing affordability of low power consumption LED screens. › Use of paper and ink, which needs the use of chemicals and cutting down trees in rainforests. › One environmental benefit is that the ability to communicate in many ways and in many places at the same time reduced automobile or airplane journeys.