Crimes of Negligence or Incompetence Presented By: Lisa R. Williams.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

How to protect yourself, your computer, and others on the internet
Operational Risks Task 13. What is CNP? CNP stands for Card Not Present and is when you order or pay for something online as you are not in front of the.
Presented by: Blue Green Systems. Inspiration Why people buy/sell online  Convenience  Better Prices  Variety  Fewer Expenses  Comparison of Prices.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Mr. Caputo Unit #1 Lesson #7
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Protecting Yourself Against Identity Theft TSCPA Member Name, CPA Firm/Company Name.
Starter for 10 Unit 3: Stay safe online Transform IT SFT03_stay_safe_online.
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
INTERNET SAFETY FOR STUDENTS
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
Security Advice Georgie Pepper Campsmount Acadamy.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Safe online shopping Suitable for: Improver.
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
E-Safety Challenge College. Learning Objectives To assess the risks faced when online and how to use the options available to protect yourself.
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Protect Your Computer from Viruses and Other Threats! 1. Use antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install reputable.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
IT Security for Users By Matthew Moody.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
Why Should I Improve My PowerPoint Backgrounds? Dr. Steve Broskoske Misericordia University.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Jan 11 Encryption and Hacking. Your Answer Encryption is used to keep information safe from unauthorised users. The best way to keep the system safe is.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Agenda Last class: Internet Literacy Lab Today: Internet Safety.
Computer Security By Joey Pawoll. Introduction to computer security Have you been wondering how to be safe online? Well look no further! This powerpoint.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
SURFING THE WEB PRIVACY, SAFETY, AND RELIABLE SOURCES.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Protecting Students on the School Computer Network Enfield High School.
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
Stay Safe Online. Use strong passwords Using the same password for all your accounts makes it easy to remember. However, it also means a hacker needs.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Introduction With the development of the Internet a phenomenon known as 'electronic commerce' or 'ecommerce' for short, has been growing. Ecommerce has.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Any criminal action perpetrated primarily through the use of a computer.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Protecting Yourself Against Identity Theft A Financial Literacy Presentation by.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
BY JENNA SAUDER SLIDE OVERVIEW This presentation will discuss the following This presentation will discuss the following : What a Virus is… How a Virus.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Computer Security Keeping you and your computer safe in the digital world.
1 Web Technologies Website Publishing/Going Live! Copyright © Texas Education Agency, All rights reserved.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Have a Safe Shopping Online Experience. Did You Shop Online Today?  Anything you need today is available online. Whether it’s groceries, jewellery, clothes,
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Internet Safety.
Unit 4 IT Security.
How to build a good reputation online
Presentation transcript:

Crimes of Negligence or Incompetence Presented By: Lisa R. Williams

What is Negligence? NEGLIGENCE -The failure to use reasonable care. The doing of something which a reasonably prudent person would not do, or the failure to do something which a reasonably prudent person would do under like circumstances To prove negligence, one has to show that no reasonable person in your situation would have given the advice that you gave NEGLIGENCE -The failure to use reasonable care. The doing of something which a reasonably prudent person would not do, or the failure to do something which a reasonably prudent person would do under like circumstances To prove negligence, one has to show that no reasonable person in your situation would have given the advice that you gave

What is Incompetence Incompetence- The condition of a person who is unable to properly perform his or her duty. He/she is either: 1 : not legally qualified 2 : inadequate to or unsuitable for a particular purpose 3 a : lacking the qualities needed for effective action b : unable to function properly Incompetence- The condition of a person who is unable to properly perform his or her duty. He/she is either: 1 : not legally qualified 2 : inadequate to or unsuitable for a particular purpose 3 a : lacking the qualities needed for effective action b : unable to function properly

Another Name for Negligence Malpractice-a suit that involves professional negligence Computer malpractice- involves professional negligence when providing computer-related services Malpractice-a suit that involves professional negligence Computer malpractice- involves professional negligence when providing computer-related services

The Difference If someone sues you for ordinary negligence, they will compare your behavior to what any reasonable person would have done under the circumstances. If someone sues for malpractice, they will compare your behavior to what a reasonable member of your profession would have done. Professional standards are much higher and much better If someone sues you for ordinary negligence, they will compare your behavior to what any reasonable person would have done under the circumstances. If someone sues for malpractice, they will compare your behavior to what a reasonable member of your profession would have done. Professional standards are much higher and much better

Side Note Computer malpractice is a losing lawsuit because to be sued for malpractice (professional negligence), you must be (or claim to be) a member of a profession. Software development and software testing are not professions as this term is usually used in malpractice law. Therefore, malpractice suits against programmers and testers fail.

Example of Negligence If a hacker was able to delete a customer's order from a supplier's computer file, the customer could hold the supplier liable for any damages it sustained by not receiving its order. The negligence theory is based on the fact that the supplier should have installed the necessary equipment (hardware and software) to prevent the hackers from invading its computer system. Also, because the supplier did not have the necessary protection on its computer system, it should have known that such an act was likely to occur, and, therefore, guarded against it

Example 2 Consider this example of software support advice. People call you when they have problems running their software. One day, you advise a caller that her problems come from an insufficiently-compatible video card. Actually, the caller has set one of the program's display options incorrectly and replacing the video card won't help. Have you committed negligence? Maybe. We can't tell, just based on these facts, because we don't know what a reasonable support advisor would have done.

The facts First, suppose that you have a database of common problems and this problem was in the database. Second, suppose that the caller's description was specific enough that you would have easily found the problem (and the solution) in the database if you looked. Third, suppose that most software support providers would have used this database if they had it. This last point establishes a standard of care - most support advisors would have checked the database. If you don't check the database, and you provide expensive bad advice, you can be accused of acting unreasonably-negligence First, suppose that you have a database of common problems and this problem was in the database. Second, suppose that the caller's description was specific enough that you would have easily found the problem (and the solution) in the database if you looked. Third, suppose that most software support providers would have used this database if they had it. This last point establishes a standard of care - most support advisors would have checked the database. If you don't check the database, and you provide expensive bad advice, you can be accused of acting unreasonably-negligence

Prevention When shopping online, be careful before entering your credit card number or other personal information Read the privacy policy and look for opportunities to opt out of information sharing Only enter personal information on secure Web pages with “https” in the address bar and a padlock symbol at the bottom of the browser window. These are signs that your information will be encrypted or scrambled, protecting it from hackers Steer clear of spyware When shopping online, be careful before entering your credit card number or other personal information Read the privacy policy and look for opportunities to opt out of information sharing Only enter personal information on secure Web pages with “https” in the address bar and a padlock symbol at the bottom of the browser window. These are signs that your information will be encrypted or scrambled, protecting it from hackers Steer clear of spyware

Prevention Continued Use firewall. This is virus and spyware protection software that you update regularly Download free software only from sites you know and trust. Don’t install software without knowing what it is Set Internet Explorer browser security to at least “medium” Don’t click on links in pop-up windows or in spam Use strong passwords with at least eight characters, including a combination of letters, numbers, and symbols, easy for you to remember, but difficult for others to guess Use firewall. This is virus and spyware protection software that you update regularly Download free software only from sites you know and trust. Don’t install software without knowing what it is Set Internet Explorer browser security to at least “medium” Don’t click on links in pop-up windows or in spam Use strong passwords with at least eight characters, including a combination of letters, numbers, and symbols, easy for you to remember, but difficult for others to guess

References &bold=|||| 314&bold=|||| &p=negligence+computer+system &p=negligence+computer+system erlaw.htm erlaw.htm nce&ei=UTF-8&fr=slv1-&x=wrt nce&ei=UTF-8&fr=slv1-&x=wrt &bold=|||| 314&bold=|||| &p=negligence+computer+system &p=negligence+computer+system erlaw.htm erlaw.htm nce&ei=UTF-8&fr=slv1-&x=wrt nce&ei=UTF-8&fr=slv1-&x=wrt