City Hall of Iasi Ethics in e-guidance, privacy and security devices Date: 05.06.2009 Author: Cristina Nucuta.

Slides:



Advertisements
Similar presentations
I. Positive IT has had a massive impact in the last 40 years. People rely on using technology to stay in touch with people. Technology has had a positive.
Advertisements

Legal & Regulatory Compliance. Overview What types of information should be included? What issues or problems might there be? What benefits could be obtained?
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Data Quality Considerations
ETHICS. Business Conduct  The Agent agrees to conform to all applicable federal, state and local laws in conducting business under this agreement.
Information Governance An Introduction. Information Governance Outline What is Information Governance What initiatives does IG cover.
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
The Data Protection (Jersey) Law 2005.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Chief Information Officer Branch Gestion du dirigeant principal de l’information “We will have a world class public key infrastructure in place” Prime.
Security Controls – What Works
Data Management Awareness January 23, University of Michigan Administrative Information Services Data Management Awareness Unit Liaisons January.
Social Engineering Jero-Jewo. Case study Social engineering is the act of manipulating people into performing actions or divulging confidential information.
NIST framework vs TENACE Protect Function (Sestriere, Gennaio 2015)
DATA PROTECTION AND PATIENT CONFIDENTIALITY IN RESEARCH Nic Drew Data Protection Manager University Hospital of Wales   
By Drudeisha Madhub Data Protection Commissioner Date:
Data Protection Overview
Protecting information rights –­ advancing information policy Privacy law reform for APP entities (organisations)
Practical Information Management
Security Awareness Norfolk State University Policies.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Ethical Issues Associated with Information and Communication Technology in Guidance James P. Sampson, Jr. Mannheim, Germany - October 2012 Symposium entitled,
Handling information 14 Standard.
Home 1 The Potential for Success and Failure of Computer Applications in Counseling and Guidance James P. Sampson, Jr. Florida State University John W.
Health & Social Care Apprenticeships & Diploma
Care.Data an ICO Update EMIS National User Group Conference East Midlands Conference Centre Nottingham 3 rd October 2013 Lynne Shackley Lead Policy Officer.
Research Paper Presentation Software Engineering in agent systems.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
L, E & P ISSUES1 Follow up on PSP: The PSP is about QUALITY - numerous measures are used - with the obvious commitments to data collection. One of the.
Professional Values and Basic Business Legislation.
From Privacy to Information Governance Dr Petra Wilson Internet Business Solutions Group - Cisco.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
What is personal data? Personal data is data about an individual which they consider to be private.
Section 12.1 Discuss the functions of a Web site Create a feedback form Compare and contrast option buttons and check boxes Section 12.2 Explain the use.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
Working with HIT Systems
Data Protection Property Management Conference. What’s it got to do with me ? As a member of a management committee responsible for Guiding property you.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Organisations and Data Management 1 Data Collection: Why organisations & individuals acquire data & supply data via websites 2Techniques used by organisations.
Information Systems Unit 3.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
Breakaway Session 2: Data Protection and The Role of the Data Protection Supervisor Michael Mingle Director, NTSS Solutions (UK) D ATA P ROTECTION C ONFERENCE.
Personal data protection in research projects
Data Protection and research Rachael Maguire Records Manager.
Session 12 Information management and security. 1 Contents Part 1: Introduction Part 2: Legal and regulatory responsibilities Part 3: Our Procedures Part.
Data Protection Philip Reed. Introduction What is data? What is data protection? Who needs your data? Who wants your data? Who does not need your data?
Able to transfer and adapt their skills Able to understand the consequences of their actions Able to use software and devices efficiently Responsible.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Business Ethics and Social Responsibility GCSE Business and Communication Systems Business and Communication Systems.
Security of, privacy of and access to personal/confidential information/data.
Uses of brain imaging data: privacy and governance implications Dr. Hester Ward Medical Director, Information Services Division, (ISD) Consultant in Public.
Protection of Personal Information Act An Analysis on the impact.
UNHCR‘s Policy on the Protection of Personal Data of Persons of Concern - An introduction (October 2016)
Key management issues in PGP
CISI – Financial Products, Markets & Services
Data Protection and Confidentiality
General Data Protection Regulation
APP entities (organisations)
Public Key Infrastructure (PKI)
EU Directive 95/46/EC (Paragraph 2) “Whereas data-processing systems are designed to serve man; whereas they must Respect their fundamental rights.
Data Protection Act.
General Data Protection Regulations 2018
Certified Information Technology Professional (CITP) Credential
HIPAA Privacy and Security Update - 5 Years After Implementation
Data Protection What can I do? GDPR Principles General Data Protection
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

City Hall of Iasi Ethics in e-guidance, privacy and security devices Date: Author: Cristina Nucuta

City Hall of Iasi Ethics in e-guidance Page 2

City Hall of Iasi Page 3 Possible risks in e-guidance using ICT tools inadequate guidance support for individuals using e-guidance resources problems with distance guidance the validity of career assessments and information available on the Internet.

City Hall of Iasi Page 4 Inadequate Guidance Support for Individuals Using e-Guidance Resources Reading Disabilities Limited Verbal Ability Limited Knowledge, Confidence, and Motivation Negative Career Thoughts

City Hall of Iasi Page 5 Recommendations include links to qualified and credentialed practitioners. indicate the circumstances when self-help is inappropriate and when assistance is likely needed from a guidance practitioner. If the client does not understand the results => refer the client to a qualified career practitioner in one’s geographical area.

City Hall of Iasi Page 6 Problems with distance guidance Informed Consent Emergency Situations Client Suitability for the Nature of Distance Guidance Limited Practitioner Awareness of Multicultural Issues Limited Client Access to the Internet Limited Practitioner Awareness of Local Circumstances that may Impact the Client Lack of Clarity About Practitioner Credentials

City Hall of Iasi Page 7 The validity of career assessments and information available on the Internet Validity of Career Assessment Validity of Career Information

City Hall of Iasi Page 8 Recommendations validated for self-help use evidence of the quality of the assessment assessments originally developed in paper-and-pencil format must have been tested in computer delivery mode identify the intended purpose, the target audience, and the potential use of the information. the date of publication of the career information should be clearly indicated the information provided is accurate and free from distortion caused by self-serving bias, sex stereotyping, or dated resources

City Hall of Iasi Personal data security Page 9

City Hall of Iasi Users’ personal data security The Directive 95/46/CE - protection of people with reference to the treatment of personal data and the free circulation of data personal data processing The Directive 2002/58/CE - treatment of personal data and the protection of personal life in the field of telecommunications. Page 10

City Hall of Iasi Principles of good practice Data must be: ● Fairly and lawfully processed ● Processed for limited purposes ● Adequate, relevant and not excessive ● Accurate ● Not kept longer than necessary ● Processed in accordance with the data subject's rights ● Secure ● Not transferred to countries without adequate protection Page 11

City Hall of Iasi Security policy How sensitive information must be handled How to properly maintain your ID(s) and password(s) How to respond to a potential security incident How to properly make system backups and recovery How to use workstations and Internet connectivity in a secure manner Page 12

City Hall of Iasi Informed consent If Personal Data is being collected then the subject must be informed and their consent sought They must be able to have their information removed at any time Every user has to engage not to diffuse information gathered inside the portal and throught communication tools Page 13

City Hall of Iasi Security devices Page 14

City Hall of Iasi Page 15 Secure communications and access Users that will use e-guidance services; E-practitioners; Project partners.

City Hall of Iasi Page 16 Security devices In order to ensure a good level of security, we have to combine different solution.

City Hall of Iasi Strong Authentication Solutions Two or more of the following forms of authentication Something you know Something you have Something you are Page 17

City Hall of Iasi Page 18 Communication security Non repudiation Confidentiality or secrecy Integrity Accessibility Authenticity Timeliness

City Hall of Iasi Page 19 Communication security The client certificate authentication can be used, along with SSL encryption, to implement a method for verifying the identity of the users. The diagram illustrates the process that guarantees protected communications between a Web server and a client.