Information Processing Lecture 3A Information Technology and The Law.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

By Andy Scott, Michael Murray and Adam Kanopa
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
1.8 Malpractice and Crime In this section you must be able to: Explain the consequences of malpractice and crime on information systems. Describe the possible.
Implications and Security Issues of the Internet By Neelesh Patel.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Unit 11 Communication & Collaboration.  Identify different communication methods  Identify advantages of electronic communication  Identify common.
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 10 Privacy and Security.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter.
By Connie Lopez. Main Points 1. Computer Technology Arises Concerns 2. Computer Ethics & Guidelines that Govern the morally acceptable use of Computers.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 10 Privacy and Security.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Legislation Who governs e-commerce?. E-commerce is regulated by laws and guidelines. These aim to ensure that sites operate effectively and that online.
Presented by Student Name Workplace Issues – Lecture 4.
CYBER CRIME AND SECURITY TRENDS
Issues Raised by ICT.
Higher Administration
Author: Andy Reedftp://topsurf.co.uk/reed FdSc IT/Computer Networking & IT(e-commerce) Communications Network Management An Introduction to Security.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Computing ESSENTIALS     CHAPTER Privacy and Security computing ESSENTIALS.
Enw / Name. How legislation affects business computer users How important is health and safety legislation to a business and how does it affect a workers.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
I.C.T laws By Luke Honeyfield 12. Laws relating to I.C.T  Copyright, Design, Patents  Data protection ACT  Computer misuse ACT  Health and safety.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Computer Law University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and Information.
Essential Standard 2.00 Understand the nature of business. 1.
Essential Standard 2.00 Understand the nature of business. 1.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Essential Standard 2.00 Understand the nature of business. 1.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Understand the nature of business. 1. Understand applications and issues of technology. 2.
UNIT 12 P3 – SECURITY PROTECTION MECHANISMS Cambridge Technicals.
The Data Protection Act By Ian Hughes Data should not be kept longer than is necessary for the specified purpose. Data processing should meet the.
Computer Crimes Career & Technology Education Department.
CptS 401 Adam Carter. Question  Which of the following is commonly cited as a benefit to telecommuting? A. Increased productivity B. Higher job satisfaction.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Security and Ethics Safeguards and Codes of Conduct.
Health and Safety. Positive effects of ICT on physical health and mental well being Friendship using social networking Easy to keep contact with friends.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
ESSENTIAL STANDARD 2.00 Understand the nature of business. 1.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
Essential Standard 2.00 UNDERSTAND THE NATURE OF BUSINESS. 1.
Essential Standard 2.00 Understand the nature of business. 1.
Essential Standard 2.00 Understand the nature of business. 1.
Computers: Tools for an Information Age
6.00 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Unit 11 Communication & Collaboration
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Health & Safety ICT & the law
By Carly Shannon Digital Citizenship By Carly Shannon
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Computers and the Individual
Computers and the Individual
Presentation transcript:

Information Processing Lecture 3A Information Technology and The Law

Topics covered in this Session We will look briefly at these issues: Computer Crime Computers and Privacy Health & Safety Issues

Computer Crime Categories of Crime Fraud Data appropriation Data misuse Software Piracy Hacking Malicious intent Obscenity Racism Incitement Most crime goes unreported or unnoticed

Hacking and Viruses Hacking is defined as ‘accessing data without authorisation’. It is a criminal offence under the Computer Misuse Act (1990)

Hacking and Viruses Viruses are programs written and introduced with an intent to disrupt a computer system Main Types: Trojan Horses Worms Logic Bombs

Computer Innovation and the Law On the one hand, Computer development and innovation is rapid. Machines upgrade specifications regularly, and become faster, more complex. Things which were once impossible, or achievable only with a lot of time, money and effort now become routine. On the other hand, Legal process tend to be slow and cumbersome. Changes in legislation require detailed scrutiny by government and the judiciary. The consequences is: Legal processes are forever “trying to catch up” with behaviour which although currently not technically criminal, may well be socially undesirable.

Computers and Privacy The Data Protection Acts (1984 and 1998): give rights to individuals, in that you have the right to see any data held on you. do not prevent individuals or organisations from holding information about you, but they must do so according to certain constraints. cover all types of information, not just that held in electronic form.

Discussion Activity 1 Read Page 8, 9 on the notes and follow up the internet links on pages 9,14. Discuss the following: You suspect that your ISP is monitoring and recording your internet use and your on-line transactions, including the number of times you have visited particular websites and the credit-card payments that you have made to various.coms. Subsequently, you get junk mail through your door offering you cut-price subscription rates to a particular websites, clearly identifying that you have visited similar sites in the past. What rights do you have in this matter?

Health and Safety Issues The major Health Issues are: Eyesight (eyestrain, headaches) Back/Neck Pain Electromagnetic Fields Repetitive Strain Injury Noise

Discussion Activity 2 Read Page 11 of the notes, and conduct a brief internet search on “Carpel Tunnel Syndrome (CTS)” Discuss the following: Suppose you were designing a website to help workers in an office to avoid contracting CTS. What elements would you include in this, and what would the consequences be for your employers?

Resources