Computer Misuse The Kingsway School. Computer Misuse Computers have improved our standards of living for most of us. Some individuals and organisations.

Slides:



Advertisements
Similar presentations
IT: Communication and Impacts
Advertisements

The IT Workplace Kaye Burton & Karen Le Rossignol Communication in an IT Environment (2000)
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
ICT & Crime Cyberslacking. What is Cyberslacking? Cyberslacking is wasting time (usually online) when you should be working Either at work or at school.
Uintah School District Acceptable Use for Computer and Network Access.
Information Systems Unit 3 – Outcome 3 Legal Obligations of Programmers Student Lecture.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Legislation in ICT.
Security, Privacy, and Ethics Online Computer Crimes.
Software Copyright. Learning Objectives: By the end of this topic you should be able to:
VISD Acceptable Use Policy
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
The Legal Framework Can you work out which slide each bullet point should go on?!
24 Legal and Ethical Considerations. 24 Legal and Ethical Considerations.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Biz Quiz.
General Purpose Packages
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Cyber Crimes.
1 Intellectual Property “Gift of Fire”. 2 Intellectual Property - Have you ever give a CD to a friend that contained a copy of a computer game or a programs?
Programming and Application Packages
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Royal Latin School. Spec Coverage: a) Explain the advantages of networking stand-alone computers into a local area network e) Describe the differences.
Technology in the Bellingham School District. Bellingham School District Network §Connectivity §Communication §Research Practice Responsible Use.
00870B2F.0/Internet%20Safety.jpg.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Copyright legislation Copyright (Computer Programs) Regulations 1992 Elma Graham.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Monitoring Employees on Networks: Unethical or Good Business?
Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and.
Code of Conduct 344 Code of Conduct 344. Code of Conduct 344 Introduction; Do you agree with the following statements? Employers need their employees.
Riding the Internet Highway Internet Safety Rules.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
Internet Safety Internet Safety LPM
Information Systems Unit 3.
Well, sir, from the sounds of it, you've got yourself some pirated software. I'm afraid there's nothing we can do to help you.`
INTERNET SAFETY.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
M ORAL AND ETHICAL ISSUES. Use and Abuse of Personal and Private Data All the information stored on Computer is governed by law or legislation. The main.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Legal issues. Computer Misuse Act 1990 Deals with misuses of ICT systems.
Welcome to the ICT Department Unit 3_4 Code of Conduct.
Laws related to ICT   There are 4 laws that you might be asked about in the exams: Health & Safety at Work Act The Computer Misuse Act 1990 The Copyright,
Computer Technology Timpview High School
Let’s Talk about Intellectual Property Copyright Plagiarism Fair Use.
Over the past 40 years, IT has influenced and really changed the way we live out lives. It’s fair to say that we love our gadgets; with most of us owning.
ICT and the Law You need to know about 3 laws covering the use and misuse of ICT.
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
Scientific data storage: How are computers involved in the following?
Lecture 3 1Norazirah Ayob, FEB. Ch  Technology advances allow individuals to self-select  what,  when, and  where messages are sent and received.
ICT, Communication & related Legislations. Produced by Neil Liggett. Acts of Law – shared data & information.
Legal and ethical issues
Copyright law The law is in place to stop members of the pubic to make illegal copies of anyone else work. You wouldn’t able to get a version of software.
Legislation in ICT.
Regulation of Investigatory Powers Act 2000
BCT 2.00 Analyze Technology Issues
Copyright, Designs and Patents Act 1988
Legislation in ICT.
Ethical Use of Computers
LO3 – Understand Business IT Systems
Presentation transcript:

Computer Misuse The Kingsway School

Computer Misuse Computers have improved our standards of living for most of us. Some individuals and organisations do misuse them. Some misuse can cause serious problems for individuals or organisations.

Privacy Records have always been kept about people. Companies keep records about staff and customers. Schools keep records about students. The difference computers make is that it is easier to: Store large quantities of information Combine information from many sources Retrieve information quickly and in new ways

Who Might Store What? OrganisationExamples of Data Held Place of WorkSalary, work performance. BankIncome, debts Insurance companyHealth data, possessions, amount insured PoliceCriminal convictions, motoring offences, movements Inland RevenueIncome, tax paid Local authorityPostcode, type of house Internet Service Provider Web sites visited Telephone ProviderTelephone numbers called or received.

Concerns about Data If someone had access to all of this data a formidable picture of a persons private life could be built up. People are concerned about their level of privacy and access to their personal details by unauthorised people. Some personal information has found its way onto the internet where anyone can see it. What might cause people concern? This is something you need to know and be prepared to give a detailed answer about.

Examples of Concerns Law abiding people may be subject to investigation without even knowing. The state can exert even more control over individuals and their private lives. Organisations with commercial interests could use data for irritating marketing and junk mail. Criminals could use it to find out who has property worth stealing and when occupants will be on holiday. People could be harassed by stalkers People have lots of reasons, usually legitimate, as to why they do not want their details examined by others.

Misuse of Computers at Work Most companies provide IT facilities for their staff to help them do their jobs. However some employees abuse these resources: Circulating irrelevant or offensive s via the companys system. This can slow the system down by clogging up the servers. Visiting questionable web sites and wasting work time. This can place companies in a dubious position. Installing illegal software, thus placing the company at risk of prosecution. Running private business interests on the company’s equipment Wasting time playing games when they should be working.

Copyright Software developers depend on income from sales. Without this they will not create new programs. Copying software is theft! With modern technology copying software, music and documents is very easy. To keep software distribution under control companies issue licences which outline how and where a piece of software may be used. Schools often buy a site licence which means that software can be used freely in the school but nowhere else. There are severe penalties for those caught using or copying software illegally! Make sure you understand how software is licensed!! ©