Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and.

Slides:



Advertisements
Similar presentations
The IT Workplace Kaye Burton & Karen Le Rossignol Communication in an IT Environment (2000)
Advertisements

Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
By Andy Scott, Michael Murray and Adam Kanopa
Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Ways in Which Information Can Be Misused. In this information age in which we live information is a precious and powerful commodity Unfortunately it can.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
U.S criminal law’s reinforcement of technological measures protecting property: where the DMCA fits in Elliot N. Turrini Assistant U.S. Attorney Computer.
Legislation in ICT.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
INTERNET and CODE OF CONDUCT
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
The Legal Framework Can you work out which slide each bullet point should go on?!
Issues Raised by ICT.
Computer Misuse Act (1990). What is Computer Misuse Act (1990)? The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities,
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Cyber Crimes.
1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
Computer Misuse The Kingsway School. Computer Misuse Computers have improved our standards of living for most of us. Some individuals and organisations.
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Section 6 Theory Software Copyright, Viruses and Hacking.
3.4 Legal Implications. Overview Demonstrate knowledge and understanding of the Computer Misuse Act. Describe the roles of the BBFC (British Board of.
Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
IS Lecture 10 Legal Control of Computer Crime Information Management and Computer Security, 3, 2, 13-19, 1995.
00870B2F.0/Internet%20Safety.jpg.
By Alexander smart. What is a viruses ? A Computer Virus is a software program that is designed to copy itself over and over again. Viruses do NOT damage.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
PROTECTING YOUR IP RIGHTS Waldo Steyn, Senior Associate, Intellectual Property December 2012.
The Data Protection Act By Ian Hughes Data should not be kept longer than is necessary for the specified purpose. Data processing should meet the.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
Copyright 2000, Marchany Computer Law Threats and Issues VA Computer Crime Act Randy Marchany VA Tech Computing Center ©Marchany,2001.
Granbury I.S.D. Acceptable Use Policy for Technology Resources
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
Computer crimes.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Legal Issues Now that we have looked at ethics, some of these issues are also dealt by the law. We will consider laws in the following catagories: Intellectual.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Legal issues. Computer Misuse Act 1990 Deals with misuses of ICT systems.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
Computing, Ethics and The Law
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
By Alex Mayak.  What is spyware?  History of spyware.  What effect does spyware have on your computer?  What spreads spyware?
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
ICT, Communication & related Legislations. Produced by Neil Liggett. Acts of Law – shared data & information.
Copyright Computer crime and cyber security.
Legal and ethical issues
Legislation in ICT.
MODUS OPERANDI OF CYBER CRIME
Technology Guidelines for Students
Cyber Crimes Chunlian QU 9/18/2018.
Technology Guidelines for Students
Copyright, Designs and Patents Act 1988
Top Five Computer Related Crimes
Legislation in ICT.
Security threats and controls
Presentation transcript:

Ways in which Information can be Misused

Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and Racquel Murray

SUB-TOPICS Ways in which information can be misused and computer crimes  Software piracy Industrial Espionage  Computer Fraud  Electronic Eavesdropping SSurveillance

Misuses Of Information 1. Software piracy  Software Piracy is the unauthorised use, lending, copying, downloading, selling or otherwise distribution of computer programs without the permission of the software licence owner

When we ‘buy’ software all we are really buying is permission to use it, usually on one computer. We do not actually own the software, it remains the property of the programmer or company that created it. We get a licence to use it. To share it or sell it to anyone else is a violation of the copyright law and is called software piracy. Misuses Of Information

 Copyright infringement of this kind is extremely common.  Most countries have copyright laws which apply to software, but they are better enforced in some countries than others.

Misuses Of Information 2. Industrial Espionage  This is an attempt to access information about a company’s plans, product, clients or trade secrets.  While this may have nothing to do with technology, the use of the computer makes industrial espionage easier.  Competitors can hack into the computer network of another organisation and illegally access their information.

Industrial Espionage  Trade Secrets  Bribery  Blackmail  Technological Surveillance Industrial espionage can involve :

3. Computer Fraud  Computer fraud is the act of using a computer to commit fraud (A deception deliberately practiced in order to secure unfair or unlawful gain.).  Computer fraud is a type of computer crime. A computer crime is using the computer to perform an illegal act or using the computer illegally.

4. Electronic eavesdropping  Electronic eavesdropping is the term applied to monitoring electronic radiation from computer equipment and reconstituting it into discernible information  i.e. using electronic means to monitor communication between parties without their permission.

Electronic eavesdropping  Most common type is wiretapping.  Wiretapping monitors telephonic and telegraphic communication.  It was forbidden in the US as early as  In England permission to wiretap is only given in cases of serious offense.  Intercepting and spying on s is also electronic eavesdropping

Misuses Of Information  Surveillance is the observation of people and their activities from a distance by means of electronic equipment or interception of electronically transmitted information Misuses Of Information 5. Surveillance

Misuses Of Information  Surveillance can be done using hardware or software  These methods secretly monitors user’s action without their knowledge.  They acquire private information about an person or organization. Misuses Of Information 5. Surveillance

Misuses Of Information Surveillance  The hardware method key logging  The software method Spyware

Misuses Of Information Fun trivia  W hat is Industrial Piracy?  What is Industrial Espionage?  What are the two(2) types of surveillance?

Misuses Of Information Please do  Be careful what you do on your computer.  Do not ever misuse information.  Report fraud and theft.  Wiretapping is illegal.