General Purpose Packages

Slides:



Advertisements
Similar presentations
Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Advertisements

Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
Legislation in ICT.
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Data Protection Act.
The Data Protection Act The Data Protection Act controls how your personal information is used by organisations, businesses or the government. Everyone.
The Copyright, Designs and Patent Act.  Software copyright is protected by law for 50 years after it is published  It also includes data stored on computer.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
The Data Protection Act
Data Protection Act. Lesson Objectives To understand the data protection act.
The Legal Framework Can you work out which slide each bullet point should go on?!
CENTRAL SCOTLAND POLICE Data Protection & Information Security Stuart Macfarlane Information Governance Unit Police Service of Scotland.
Administrative Practices Outcome 1
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
1 AQA ICT AS Level © Nelson Thornes Data Protection Act.
Slide 1 St Andrew’s High School Standard Grade Computing Databases Standard Grade Computing Studies.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
The Data Protection Act (1998). The Data Protection Act allows you to Check if any organisation keeps information about you on computer or in paper form.
The Data Protection Act By Ian Hughes Data should not be kept longer than is necessary for the specified purpose. Data processing should meet the.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
Data Protection Act (1984, 1998). 2 Data Protection Act There are many organisations which hold personal information about individuals Examples: Loyalty.
Everyone has a duty to comply with the Act, including employers, employees, trainees, self-employed, manufacturers, suppliers, designers, importers of.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
General Purpose Packages Revision. Why GPPs? Information –Accurate –complete –up-to-date Share information.
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
Computing and Information Science 1 Databases START.
LEGISLATION. DATA PROTECTION ACT (1998) The aim of this act give people the right to know what information is held about them. It also sets out rules.
Information Systems Unit 3.
Data Protection Act (1998).
Legal Implications You need to know about the following:
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Laws related to ICT   There are 4 laws that you might be asked about in the exams: Health & Safety at Work Act The Computer Misuse Act 1990 The Copyright,
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Computing, Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
Computing, Ethics and The Law
Data Protection Act The Kingsway School. What is Covered? The act was made law in 1984 and was updated in It covers the storage of personal data.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
ICT and the Law You need to know about 3 laws covering the use and misuse of ICT.
Business Ethics and Social Responsibility GCSE Business and Communication Systems Business and Communication Systems.
Computing and Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
1 AQA ICT AS Level © Nelson Thornes Safety and security Chip and Pin.
Learning Intention Legislations impact on security of information
Handling Personal Data
Administrative Practices Outcome 1
Handout 2: Data Protection and Copyright
Legislation in ICT.
Data Protection Act.
Data Protection Act.
Understanding the issues related to the use of information
Data Protection Act.
Unit 7 – Organisational Systems Security
Legal and Ethical Issues
Legislation in ICT.
How it affects policies and procedures
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

General Purpose Packages The Law of Information General Purpose Packages

Why Do We Need Laws? Flow of information A wide area network such as the Internet allows users to access and share the same information from anywhere in the world. The exchange of accurate and up to date information can help to make a company more efficient. However this information could possibly get into the wrong hands

Why Do We Need Laws? Personal Privacy With all this information potentially changing hands some people are very worried that information about them could be accessed. What if the data held about YOU was incorrect or out of date. How might it affect you? So we have the Data Protection Act. It was brought in to protect people and their personal data. The act was introduced in 1984 and updated in 1998.

Data Protection Act 1984 Data Controller Data User Data Subject The person, business or organisation controlling the collection, contents and use of personal data. E.g. The school Data User An authorised user within the organisation or business. E.g. The teacher. Data Subject The people who have information held about them. E.g. YOU! Data Protection Register Holds the details about who holds information on members of the public. This can be found in a public library.

The data protection principals Data Protection Act 1984 The data protection principals Data must be: Obtained Lawfully & Fairly Held for reasons listed by data user Used for reasons listed by data user Adequate, relevant & not excessive Accurate & up-to-date Kept no longer than necessary Made available to data subject on request Protected against unauthorised use.

Data Protection Act 1984 Data Subject Rights The Data Subject has the right to: Know what & why information held about them. Inspect the information Have incorrect information changed Apply for compensation if incorrect information has causes distress. Certain exceptions exist, for example the police, government and your doctor do not need to show you this information.

Computer Misuse Act 1990 It is illegal to: Access computer material without authorisation Unauthorised access with intent to commit other offences

Computer Misuse Act 1990 Unauthorised modification of computer material Changing software or data to perform different operations or changes the content. Preventing access to authorised users Interfering with system so that it doesn’t run properly Penalties are up to five years in prison and fines!

Precautions Once data is stored in the computer system the data controller must protect it against loss or damage. This can be done by: Creating regular backups including multiple copies. Taking measures to prevent unauthorised hacking.

Data Security Measures Physical security measures Fit security locks on computer rooms Have security keys on computer workstations Install workstations without disk drives

Data Security Measures System security measures Set up IDs and passwords for access to different levels Encode data (encryption) Install anti-virus software Use audit software to trace who has accessed accounts Advanced security systems fingerprint or voice recognition

Computer Designs & Patents Act 1988 Most published material (including text, images, video, music, software etc) is protected by the Copyright, Design and Patents Act 1988.

Computer Designs & Patents Act 1988 Copyright may be infringed if you: Copy a work (including scanning or storing electronically) Issue copies to the public Perform, show or play the work in public Broadcast the work or include it in a cable programme Make an adaptation of the work

Computer Designs & Patents Act 1988 If you do any of these without permission, you are liable to be held personally responsible. Infringing the law may be a criminal offence. To avoid this always ask permission first!