University of Sunderland Professionalism and Personal Skills Unit 7 Professionalism and Personal Skills Lecture 7: Computer Crime.

Slides:



Advertisements
Similar presentations
BT2103 Developing Small Systems for Business Lecture 2 Databases, Data Management, And The Legal Framework.
Advertisements

Cyber Law & Islamic Ethics CICT3523 COMPUTER CRIMES.
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
AN INTERNATIONAL SOLUTION TO A GLOBAL PROBLEM. A Global Problem What is cybercrime? How does it affect us ? The solution.
INTRODUCTION An ICT policy is in the final stages of being adopted; Provisions in the policy and related strategies which are meant to facilitate policy.
Legislation in ICT.
University of Sunderland Professionalism and Personal Skills Unit 11 Professionalism and Personal Skills Computer Legislation.
Legislation Who governs e-commerce?. E-commerce is regulated by laws and guidelines. These aim to ensure that sites operate effectively and that online.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
The Data Protection Act The Data Protection Act controls how your personal information is used by organisations, businesses or the government. Everyone.
Supporting further and higher education Digital Preservation: Legal Issues Chinese National Academy of Sciences July04 Neil Beagrie, BL/JISC Partnership.
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J w/ T. Scocca.
The Legal Framework Can you work out which slide each bullet point should go on?!
Computer Misuse Act (1990). What is Computer Misuse Act (1990)? The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities,
Legislation For e-commerce to operate correctly, it needs to adhere to the relevant legislation. These laws protect both the business and the consumer.
I.C.T laws By Luke Honeyfield 12. Laws relating to I.C.T  Copyright, Design, Patents  Data protection ACT  Computer misuse ACT  Health and safety.
Computer Law University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and Information.
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
University of Sunderland Professionalism and Personal Skills Unit 8 Professionalism and Personal Skills Lecture 8: Ergonomics, Computers and Health and.
3.4 Legal Implications. Overview Demonstrate knowledge and understanding of the Computer Misuse Act. Describe the roles of the BBFC (British Board of.
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
IS Lecture 10 Legal Control of Computer Crime Information Management and Computer Security, 3, 2, 13-19, 1995.
Crime & Malpractice AS Module Heathcote Ch. 10.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
The Data Protection Act By Ian Hughes Data should not be kept longer than is necessary for the specified purpose. Data processing should meet the.
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Federation Against Software Theft. What Is Copyright? What is copyright infringement? What are the penalties for copyright infringement? What is a trade.
Patents, Copyrights and Trademarks Patents are a primary intellectual property right for entrepreneurs to flourish. Patents, Copyrights and Trademarks.
Introduction to Intellectual Property Class One: TYPES OF IP Prof. Susanna Frederick Fischer The Catholic University of America August 25, 2003.
Everyone has a duty to comply with the Act, including employers, employees, trainees, self-employed, manufacturers, suppliers, designers, importers of.
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
Dr. Hilton CHAN Technology Crime Division Commercial Crime Bureau
University of Sunderland Professionalism and Personal Skills Unit 8 Professionalism and Personal Skills Lecture 8: Professionalism and Ethics.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
LEGISLATION. DATA PROTECTION ACT (1998) The aim of this act give people the right to know what information is held about them. It also sets out rules.
Aim: How much crime is there in the United States?
University of Sunderland Professionalism and Personal Skills Unit 6 Professionalism and Personal Skills Lecture Ethics.
Computer Systems D Stainton. Computer Misuse What is computer misuse? Criminal offences which can be committed using a computer.
University of Sunderland MSc HIM Computer Legislation.
Legal issues. Computer Misuse Act 1990 Deals with misuses of ICT systems.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
Computing, Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
The Place of Cyberlaw in the MSIS Curriculum Ramesh Subramanian Bruce White Quinnipiac University.
The Theory of Hospitality and Catering Dynamic Learning published by Hodder Education © 2011 D Foskett and P Paskins Computer legislation.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
Computing, Ethics and The Law
ICT and the Law You need to know about 3 laws covering the use and misuse of ICT.
Business Ethics and Social Responsibility GCSE Business and Communication Systems Business and Communication Systems.
Computing and Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
NEVER USE YOUR REAL NAME ALAWYS USE A NICKNAME IS SOMEONE SENDS SOME NASTY OR RUDE DON’T DELET IT SHOW IT TO SOMEONE DON’T GIVE ANYONE YOU DON’T KNOW A.
Learning Objectives Can I discuss the copyright law Can I identify why organisations must protect data Can I describe how legislation affect computer use.
ICT, Communication & related Legislations. Produced by Neil Liggett. Acts of Law – shared data & information.
Legal and ethical issues
SECURITY STANDARDS AND CYBER LAWS
Paper 1 | GCSE Computer Science | Ethical, legal, cultural & environmental issues | Required knowledge How to investigate & discuss Computer Science technologies.
Legislation in ICT.
Section 19.1 Cyberlaw and Cybercrime. Section 19.1 Cyberlaw and Cybercrime.
Uppingham Community College
Learning Area 1 Information And Communication Technology and Society
Computer Systems D Stainton.
Lesson Objectives Aims The Data Protection Act 1998
Copyright, Designs and Patents Act 1988
Legislation in ICT.
Computer Misuse Act 1990 GCSE ICT.
Ethical Use of Computers
ENTREPRENEURSHIP Lecture No: 19 BY CH. SHAHZAD ANSAR
End User Support By Dominique Stainton.
Presentation transcript:

University of Sunderland Professionalism and Personal Skills Unit 7 Professionalism and Personal Skills Lecture 7: Computer Crime

University of Sunderland Professionalism and Personal Skills Unit 7 I.T and People Objectives By the end of this lecture the student should – –Appreciate what constitutes computer crime –Understand the implications of computer crime –Appreciate the major legislation

University of Sunderland Professionalism and Personal Skills Unit 7 I.T and People Overview This lecture discusses computer crime, and gives detail surrounding it such as costs and problems with statistics It also looks at and gives an overview of the main pieces of legislation

University of Sunderland Professionalism and Personal Skills Unit 7 I.T and People Introduction Computer Misuse Background The Computer Misuse Act Copyright, Patents, etc Summary Further Reading

University of Sunderland Professionalism and Personal Skills Unit 7 I.T and People Computer Misuse Definitions of Computer Crime Edwards and Savage (IT and the Law)

University of Sunderland Professionalism and Personal Skills Unit 7 I.T and People Background Frequency of Computer Misuse The Offenders The Costs of Computer Crime

University of Sunderland Professionalism and Personal Skills Unit 7 I.T and People The Computer Misuse Act Types of Computer Crime 1Fraud 2Misuse of Resources 3 Sabotage, Arson & Vandalism 4 Blackmail

University of Sunderland Professionalism and Personal Skills Unit 7 I.T and People The Computer Misuse Act (cont) Objectives The Act itself –Offences –User Responsibilities –Enforcement

University of Sunderland Professionalism and Personal Skills Unit 7 I.T and People The Computer Misuse Act (cont) Provisions of the Act Three New Offences –1 The Unauthorised Access Offence –2 The Ulterior Intent Offence –3 The Unauthorised Modification Offence Comments on the Act

University of Sunderland Professionalism and Personal Skills Unit 7 I.T and People Copyright Introduction Protection Getting a Copyright Length

University of Sunderland Professionalism and Personal Skills Unit 7 I.T and People Patents Introduction Protection Getting a Patent Length

University of Sunderland Professionalism and Personal Skills Unit 7 I.T and People Enforcing Patents and Copyright Introduction Federation Against Software Theft/ European Leisure Software Publishers Association Powers Law Suits

University of Sunderland Professionalism and Personal Skills Unit 7 I.T and People Summary Computer Misuse Background The Computer Misuse Act Copyright, Patents, etc Summary Further Reading

University of Sunderland Professionalism and Personal Skills Unit 7 I.T and People Objectives –Appreciate what constitutes computer crime –Understand the implications of computer crime –Appreciate the major legislation

University of Sunderland Professionalism and Personal Skills Unit 7 I.T and People Further Reading Carr H, Arnold R: "Computer Software: Legal Protection in the UK" C07 Flint F, Thorne C D, Williams A P, "Intellectual Property: The New Law A guide to the Copyright, Designs & Patents Act 1988" F43 Jacob R, Alexander D, "A Guidebook to Intellectual Property" J01

University of Sunderland Professionalism and Personal Skills Unit 7 I.T and People Further Reading Flint M, "A users guide to Copyright 3rd Edition" F43 Denning P J (Editor), "Computers Under Attack". Addison-Wesley Pounder C P, Kosten F, "Managing Data Protection". Butterworth Heinmann