UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Administrative Systems and the Law What you need to know to produce an oral presentation for Unit 7 When the presentations will take place Resources you.
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Security, Privacy, and Ethics Online Computer Crimes.
Duncan Woodhouse – Assistant Registrar for Information Security, Risk Management and Business Continuity Helen Wollerton – Administrative Officer (Legal.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Data Protection Act.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
The Data Protection Act
Data Protection Act. Lesson Objectives To understand the data protection act.
The Legal Framework Can you work out which slide each bullet point should go on?!
Administrative Practices Outcome 1
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Data Security GCSE ICT.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
General Purpose Packages
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
Health & Social Care Apprenticeships & Diploma
1.1 System Performance Security Module 1 Version 5.
Security and backups GCSE ICT.
Elma Graham. To understand what data protection is To reflect on how data protection affects you To consider how you would safeguard the data of others.
3.3 Digital Communication Security. Overview Demonstrate knowledge and understanding of basic network security measures, e.g. passwords, access levels,
Slide 1 St Andrew’s High School Standard Grade Computing Databases Standard Grade Computing Studies.
Pass ECDL41 European Computer Driving Licence Module 1 – Concepts of IT Chapter 1.6 – Legal Issues and Security.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Data Protection Act AS Module Heathcote Ch. 12.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
The Data Protection Act (1998). The Data Protection Act allows you to Check if any organisation keeps information about you on computer or in paper form.
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
The Data Protection Act - Confidentiality and Associated Problems.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
By Liam Wright Manga comic group Japan SAFETY on your computer.
THE DATA PROTECTION ACT Data Protection Act 1998 DPA 1. Reasons2. People3. Principles 4. Exemptions 4 key points you need to learn/understand/revise.
Information Systems Unit 3.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
DATA PROTECTION ACT DATA PROTECTION ACT  Gives rights to data subjects (i.e. people who have data stored about them on a computer)  Information.
Computing and Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
Safety & Security By Kieran Bolko. Laws The main law that you should be taking note of is the Data Protection Act 1998 – this law sets rules for the electronic.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
ANS File Security Chapter # 29 ( Prepared by : Mazhar Javed ) 1 Data Security “Protection against loss, corruption of, or unauthorized access of data”
Data protection act. During the second half of the 20th century, businesses, organisations and the government began using computers to store information.
The Data Protection Act 1998
Data Protection GCSE ICT Mrs N Steventon-2005.
Handling Personal Data
Administrative Practices Outcome 1
Data Protection Act.
Data Protection Act.
The Data Protection Act 1998
Data Protection Legislation
Computer Ethics.
Security of People, Property and Information
G061 - Network Security.
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

UNIT 3C Security of Information

SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up letters and numbers. Change your password often Leave your password next to your workstation Use upper and lower case (i.e. CAPITALS and small letters) Tell it to anyone Keep your password confidential Use obvious names and numbers DODON’T

HOW SHOULD FLOPPY DISKS BE HANDLED AND STORED? DO DON’T Label all disksPlace near magnets Store with metal strip at the top Place heavy objects on top Keep in storage boxesLeave near radiators or heat Keep storage boxes safe outwith office hours

KEEPING ICT EQUIPMENT SECURE Make use of passwords Make use of ID cards and keys Make use of voiceprint and fingerprint Make use of restricted access to certain information to a select number of employees only

WHAT IS A COMPUTER VIRUS? A computer virus is a program that has been created to interfere with computer systems. The virus may result in the system failing, hard drives being wiped of information or a message – supposedly funny – being displayed on screen. Viruses can be spread around computers by floppy disks, CD ROMs or the Internet Organisations must install anti-virus software (e.g. Norton Antivirus) – this will scan the hard drive and floppy disks etc. looking for viruses and disinfecting any files where a problem is found.

DO’S WHEN LEAVING YOUR WORKSTATION Use a screen saver or password Store floppy disks and CD ROMS in lockable boxes Remove floppy disks or CD ROMs from the disk drives – always! Remove all originals and printouts from public view

Back Up Procedures Computer system faults – resulting in programs failing Fire, flood or computer damage Malicious damage to hardware or software Theft Power failure Computer data should be copied (backed-up) regularly as data held on a computer disk may be lost or corrupted due to: All organisations should have a back-up procedure e.g. always save a copy to the hard drive or network and a floppy disk or CD ROM. The 2 copies should be kept in separate places.

DATA PROTECTION ACTS (1984 & 1998)  Just about everybody has information about themselves stored on computer files e.g. within the school system information would be held about you would include: NAME, ADDRESS, DATE OF BIRTH, TELEPHONE NUMBER, EMERGENCY CONTACT NAME, PRIMARY SCHOOL. Information of this type is called ‘PERSONAL DATA’ but…….  There is a danger of this data falling into the hands of someone who has no right to see it.  When filling in certain forms there will be a small box at the bottom of the form – unless you tick this box, this means your information may be passed onto others.

DATA PROTECTION ACTS (1984 & 1998)  There is also a danger that the information held on a computer about you may be:  Inaccurate  Out of date  Misleading  To overcome this problem the potential problem, the Data Protection Acts 1984 & 1998 were passed  The aim of these Acts is to protect individuals who have information held about them on a computer.

DATA PROTECTION ACTS (1984 & 1998) There are 8 main principles of the Data Protection Acts

DATA PROTECTION ACTS (1984 & 1998) 1.Information must be collected and processed fairly and lawfully- People must be told what use will made of the information they supply about themselves. 2.Data should only be held for specified and lawful purposes - Organisations that hold personal data for use, must register with the Data Protection Registrar.

DATA PROTECTION ACTS (1984 & 1998) 3.Users must use and disclose data only for the registered purpose – All staff must know what the data can be used for – list uses clearly and succinctly (to the point). 4.Data must be adequate, relevant and not excessive for its purpose – when designing forms to enable the collection of data, ensure relevant questions only are asked.

DATA PROTECTION ACTS (1984 & 1998) 5.Data must be accurate and, where necessary, kept up-to-date – Ensure that there are procedures in place to check update or destroy inaccurate information. 6.Data must be held for no longer than is necessary – Procedures should be in place to ensure that data is destroyed as soon as it has been used for the purpose e.g. credit card details should be destroyed once orders are despatched if customers have paid for goods over the telephone.

DATA PROTECTION ACTS (1984 & 1998) 7.People must be allowed to access data about themselves without undue expense at reasonable intervals- Staff should know the procedures to follow if e.g. a customer seeks their credit rating information 8.Data users must take appropriate security measures to prevent unauthorised access, disclosure, alteration or destruction of data – including accidental loss or destruction

DATA PROTECTION ACTS (1984 & 1998) 8. (Continued) - data must not be transferred outside the European Union

DATA PROTECTION ACTS (1984 & 1998) If the principles are disobeyed : The Data Protection Registrar can serve 3 types of notice.

DATA PROTECTION ACTS (1984 & 1998) 1. Enforcement Notice – The data user is required to take specified action to comply with a particular principle. 2.De-registration Notice – This cancels part or the whole of the data users register entry. 3.Transfer Prohibition Notice – This prevents the data user form transferring personal data overseas.