Using Information at the University University Secretarys Office

Slides:



Advertisements
Similar presentations
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 2.1 Chapter 2.
Advertisements

By D. Fisher Geometric Transformations. Reflection, Rotation, or Translation 1.
ASYCUDA Overview … a summary of the objectives of ASYCUDA implementation projects and features of the software for the Customs computer system.
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination.
CREATE & SUBMIT eEEMPR USING DEP ONLINE PORTAL
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
HIPAA AWARENESS TRAINING
606 CMR 14.00: Background Record Checks What you need to know!
0 - 0.
1 ICOTS (Interstate Compact Offender Tracking System) Attachments Training.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
Institutional Telecomms and Computer Network Monitoring Andrew Charlesworth University of Bristol 10 June 2002.
Data Protection Act 1998 University Secretarys Office
IMPS Information Management and Policy Services Information Services Directorate A briefing for all University staff November 2004 New Information Legislation.
1 An Introduction to Filtering: Issues and Possible Solutions Sarah Ormes UKOLN University of Bath Bath, BA2 7AY UKOLN is funded by the Library and Innovation.
ZMQS ZMQS
How To Use OPAC.
1 SLIDE Insurance Company Regulation Division Insurance Market Regulation Division Medical Professional Liability Insurance Claim Reports Online Claim.
Workplace Occupational Health, Safety and Security
BT Wholesale October Creating your own telephone network WHOLESALE CALLS LINE ASSOCIATED.
Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
Cyber Safety Assessment Review
Hart District Acceptable Use Policy Acceptable Use Policy.
ABC Technology Project
2 1.Client protection principles 2.Principle #6 in practice 3.The client perspective 4.Participant feedback 5.Tools for improving practice 6.Conclusion.
ONE® Mail Training Presentation North York General Hospital North York General Hospital.
Squares and Square Root WALK. Solve each problem REVIEW:
Research and the Data Protection and Freedom of Information Acts.
2 3 There are two basic areas where there is a need to have resources available. Internal:  Financial  Personnel  Assets  Time External  Consultants.
1 A DMINISTRATION of E MPLOYEE N EEDS. 2 Lecture Outline  Differentiate between the different types of leave generally available in Australian companies.
Addition 1’s to 20.
25 seconds left…...
Freedom of Information Act 2000 and the PCT Audit Procedure Background: The Act was passed in November The Act will be fully in force by January.
Week 1.
1 If You Are Me, Then Who Am I? Beating Identity Theft Office of the California Attorney General.
We will resume in: 25 Minutes.
Slide 1 of 16 An Overview of Legal Issues Relating to BCE and pointers to specific legal resources Supporting Professional Development for Engagement:
SGTM 5 A: Code of Conduct Slide 1 SGTM 5 A: Code of Conduct.
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
NAU HIPAA Awareness Training
Policy 6460 Staff Use of Computerized Information Resources Regulation 6460 R-Staff Use of Computerized Information Resources Regulation 6460 R.2 Staff.
Phoenix Union High School District Governing Board Policy In-Service Technology Usage Electronic Information System (EIS) 2014/2015 School Year.
Transparency in Public Administration – FOI and EIR
INTERNET and CODE OF CONDUCT
Grade 5 Student Assistants
The Data Protection Act
Data Protection Act. Lesson Objectives To understand the data protection act.
Regulation of Personal Information Daniel Pettitt, Leon Sewell and Matthew Pallot.
Elma Graham. To understand what data protection is To reflect on how data protection affects you To consider how you would safeguard the data of others.
Privacy and Information Management ICT Guidelines.
HIPAA (health insurance portability and accountability act)
Data Protection Act & Freedom of Information Simon Mansell Corporate Governance and Information Team.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Introduction Data protection is relevant to every individual, business or organisation today, not just Local Government. As well as protecting privacy,
Awareness Training Seminar Freedom of Information 20 th September 2004.
School Accounts Presented by: Mrs. Mazzola.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
© University of Reading Lee Shailer 06 June 2016 Data Protection the basics.
What is HIPAA? Health Insurance Portability and Accountability Act of HIPAA is a major law primarily concentrating on the prolongation of health.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
Data Protection Act.
The Data Protection Act & ICT Law
Information management and communication
General Data Protection Regulations 2018
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Presentation transcript:

Using Information at the University University Secretarys Office

2 Secretarys Office Property/Commercial Law Employment Law Contracts Student complaints/discipline Insurance Equal Opportunities/Diversity Data Protection/Freedom of Information

3 Relevant Acts Regulation of Investigatory Powers Act 2000 (monitoring use of computers) Data Protection Act 1998 (protecting information about people) Freedom of Information Act 2000 (revealing information about everything else)

4 Use of Computers Regulations for the use of computer facilities All UoB computers All computers connected to the UoB network

5 Users must not: Use computers to break the law: –e.g. accessing information without authorisation –giving others access to the network –disclosing passwords –illegally copying or downloading software –Accessing criminal material

6 Do not access/send material that is: Discriminatory Homophobic Excessively violent Obscene Libellous Blasphemous Seditious Inciting racial hatred Offensive Defamatory Threatening Abusive

7 Monitoring Computer Use UoB legally monitors/logs computer use Policy for the Investigation of Computers UoB reports criminal activity to the police

8 Data Protection

9 Why have a Data Protection Act? Personal data collected in UK –e.g. loyalty cards –mobile phones –CCTV Personal data collected by UoB –e.g. medical/sickness records –staff/student disciplinary records –confidential research –personnel files

10 The Data Protection Act Personal Privacy Individuals in an organisation The organisation itself Damage or distress

11 The Act obliges the University to: Collect information about people only with their permission, unless there is a legal reason to do so Show individuals the information it holds about them if they request it Be very careful when giving this information to anyone else

12 Personal Data Any information that identifies a living person –e.g. name and/or address –NI number –postcode –ethnic origin –religion –photograph

13 The Act Applies to all records and documents Covers anything you do with those documents, including reading

14 Rights under the Act Access to information, including references and s To prevent damage or distress, including objecting to direct marketing Compensation Rectification of inaccurate data

15 Security Keep paper records under lock and key Use passwords Use confidential waste No personal data on home computers Dont give personal data to people outside UoB, even the police Seek advice

16 Freedom of Information

17 The Act public authorities legal right to know more open and accountable encourages publishing in advance fully retrospective some exemptions personal data still protected

18 Requirements of the Act to adopt a Publication Scheme (a guide to publicly available information) by 2004 to deal with individual requests for information from 2005

19 Individual Rights to know whether UoB holds information to be given the information within 20 working days if information is refused, to be told reasons why

20 Right to Know anyone, anywhere in the world journalists, campaigning groups, MPs any request from the public is an FOI request

21 Summing Up

22 Summing up Use computers responsibly Use professional language Write s as if they were memos Write open references Remember that everything you write could be made public to somebody (or everybody!) Get some training

23 Any Questions? Thank you