Enw / Name. How legislation affects business computer users How important is health and safety legislation to a business and how does it affect a workers.

Slides:



Advertisements
Similar presentations
Are you Resilient? Diane Howorth Business Development Manager European Telecommunications Resilience & Recovery Association.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
POSSIBLE THREATS TO DATA
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
Mr C Johnston ICT Teacher
Intermediate 1 Internet Safety Section 1: Viruses Section 2: Malware Section 3: Other Internet Threats Section 4: Internet Defences Section5: Legal Aspects.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Chapter 8 Chapter 8 Digital Defense: Securing Your Data and Privacy
Define and identify unethical practices such as hacking, phone fraud, online piracy, cyberstalking, and data vandalism. Use of employer’s computers for.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Factors to be taken into account when designing ICT Security Policies
Chapter 8 Protecting People and Information: Threats and Safeguards Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
SPYWARE  Do you know where your personal information is?
Keeping Data Safe Revision Summer How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised.
The laws Organizations are covered by lots of different laws
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Issues Raised by ICT.
Higher Administration
Security (Computer crime and dangers associated with computer use). Legislation (Data Protection, Computer Misuse and Copyright Acts). 4 th module
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
SWAMI Threats, vulnerabilities & safeguards in a World of Ambient Intelligence David Wright Trilateral Research & Consulting 21 March 2006.
PROTECTING PEOPLE AND INFORMATION Threats and Safeguards
CIS 2200 Kannan Mohan Department of CIS Zicklin School of Business, Baruch College.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Data Protection LO4: How legal, ethical, safety and security issues affect how computers should be used IR Photography would like you to create a document.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
1.1 System Performance Security Module 1 Version 5.
IT security By Tilly Gerlack.
MIS 213 Spring Why are we talking it?  It’s a major problemproblem  What do you think of?
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
CHAPTER 8 PROTECTING PEOPLE AND INFORMATION Threats and Safeguards.
OCR Cambridge National ICT Mr Conti 10X 25 th April 2014.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Anti-virus software THERE ARE MANY ANTI VIRUS SOFTWARES TO KEEP YOU SAFE FROM VIRUS’S. THESE SOFTWARES ARE :  BULL GUARD  MCAFEE.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
Information Systems Ethics (Cyberethics) Dr. Robert Chi Department of Information Systems California State University, Long Beach.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Mr C Johnston ICT Teacher
Security and Ethics Safeguards and Codes of Conduct.
1 Assignment 3 LO This learning outcome is all about how legal, ethical, safety and security issues affect how computers should be used. All businesses.
DoS Attacks Phishing Keylogging Computer Laws/Acts.
Operational Issues. Operational Changes It is important to organisations to ensure that they abide by the Law when caring for the safety of their employees,
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Learning Intention Security of Information. Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
Securing Information Systems
(Title Slide) Your Photoshop collage will eventually go here.
CHAPTER FOUR OVERVIEW SECTION ETHICS
ICT meeting Business needs
Securing Information Systems
Reconnaissance Report Trillium Technologies
HOW DO I KEEP MY COMPUTER SAFE?
Networking for Home and Small Businesses – Chapter 8
CHAPTER FOUR OVERVIEW SECTION ETHICS
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Presentation transcript:

Enw / Name

How legislation affects business computer users How important is health and safety legislation to a business and how does it affect a workers rights and the business productivity. Computer misuse has had major issues affecting business. What can a organisation do to reduce this risk? Copyright has been a major issue for businesses in particular the entertainment industry. How's has changes in copyright legislation affected ordinary people and big business. How does the data protection act affect businesses?

How does the abuse of personal and privet data affect business How can users or business reduce these risks? Companies can monitor their employees or individuals using software. The software can log the following: Monitor / log the worker Cookies Key logging Workers call monitoring / recording Electronic consumer surveillance. Mobile phone triangulation. Why organisations need to do this? What are the benefits of this level of logging? What is Cyber bulling? What can someone do to reduce the risk of cyber bullies? What are the negative effects of this level of logging for the employee? E.g. trust and company relations.

The implications and consequences for organizations of data loss, corruption and theft Issue Data loss Data corruption Theft Legal ImpactImpact on customersImpact on employees or organisation Data LossData corruptionTheft Methods to avoid

With the use of ICT in business and accessing information over the WWW, there are risks involved: Keywords: firewall, anti-virus, anti-spam, data encryption, using automatic and manual updating facilities for operating systems and security software. Threat MeaningHow to reduce the risk Computer Viruses Trojans Worms Phishing

With the use of ICT in business and accessing information over the WWW, there are risks involved: Threat MeaningHow to reduce the risk Spyware Adware Hacking Denial of Service attacks (DOS) Physical threats e.g. theft