Role of Communication Systems b INTERNET Hardware, Software, ServicesHardware, Software, Services Information searching, Publication of informationInformation.

Slides:



Advertisements
Similar presentations
1.8 Malpractice and Crime In this section you must be able to: Explain the consequences of malpractice and crime on information systems. Describe the possible.
Advertisements

Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Implications and Security Issues of the Internet By Neelesh Patel.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
INTERNET SAFETY FOR STUDENTS
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
Legislation in ICT.
Higher Administration and IT Administrative Practices.
University of Sunderland Professionalism and Personal Skills Unit 11 Professionalism and Personal Skills Computer Legislation.
Legislation Who governs e-commerce?. E-commerce is regulated by laws and guidelines. These aim to ensure that sites operate effectively and that online.
Legalities of ICT Chapter 7.
Factors to be taken into account when designing ICT Security Policies
Roles of IT Personnel Unit Customer Service This is a facility that helps customers with wide-ranging questions relating to a specific company,
Health and Safety Legislation
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
INTERNET SAFETY FOR STUDENTS
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
The Legal Framework Can you work out which slide each bullet point should go on?!
CENTRAL SCOTLAND POLICE Data Protection & Information Security Stuart Macfarlane Information Governance Unit Police Service of Scotland.
Higher Administration
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
C4- Social, Legal, and Ethical Issues in the Digital Firm
G041: Lecture 16 Section B Revision Questions
© Pearson Education Copying permitted for purchasing institution only. This material is not copyright free. Functional areas Unit 1: Investigating.
Level 2 IT Users Qualification – Unit 1 Improving Productivity
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
Law Additional Exercise ANSWERS. Question #1 (a) Any one of: gain unauthorised access (1st) to computer material (1) gain (unauthorised) access to computer.
Computer Legislation The need for computer laws Go to Contents.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Investigating Rights and Responsibilities at work
13.6 Legal Aspects Corporate IT Security Policy. Objectives Understand the need for a corporate information technology security policy and its role within.
Code of Conduct 344 Code of Conduct 344. Code of Conduct 344 Introduction; Do you agree with the following statements? Employers need their employees.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Information Systems Unit 3.
ICT4 October Networks  Choosing a network for a company  cost of network  size of organisation  how the system will be used  existing systems.
Legal Implications You need to know about the following:
Mr C Johnston ICT Teacher
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Welcome to the ICT Department Unit 3_4 Code of Conduct.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Implementation of legislation (Chapter 47) By Haley Court.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
ICT, Communication & related Legislations. Produced by Neil Liggett. Acts of Law – shared data & information.
Welcome to the ICT Department Unit 3_5 Security Policies.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
8 – Protecting Data and Security
Learning Intention Legislations impact on security of information
PowerPoint presentation
Data Protection Act and Other Laws
Legislation in ICT.
Unit 7 – Organisational Systems Security
Unit 3 Information Systems
Legislation in ICT.
Computer Misuse Act 1990 GCSE ICT.
Handout 9: Organisational policies and procedures
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

Role of Communication Systems b INTERNET Hardware, Software, ServicesHardware, Software, Services Information searching, Publication of informationInformation searching, Publication of information b Electronic Communication Systems Telephone, FaxTelephone, Fax , videoconferencing, teleconferencing , videoconferencing, teleconferencing teletextteletext remote databasesremote databases

Question January 2002 What do the following features, available with most software, allow the user to do? (a) Forward(2 marks) (b) Reply(2 marks) (c) Send/receive(2 marks) (d) Attach(2 marks) (e) Prioritise(2 marks)

Part Question June 2003 A company that makes cricket bats intends to set up a website to advertise its range of products, and to take orders on-line. (c) Describe two ways in which the company could use the facilities available on the Internet to encourage visitors to use their site. (4 Marks)

Information & the Professional What is working in ICT like? What are typical jobs in ICT? What skills do you need to be successful? What do you know from experience? Look at personal qualities and general characteristics NOT TECHNICAL SKILLS

Information & the Professional Personal Qualities required Willing to work flexible hours Willing to work flexible hours Be able to communicate well orally Be able to communicate well orally Good written communication skills Good written communication skills Ability to work as part of a team Ability to work as part of a team Organisational skills/work under pressure Ability to listen/patience Ability to listen/patience Perseverance/problem solving Perseverance/problem solving

Question January 2002 Professionals involved with ICT systems often have to work with people who have little, or no, understanding of the ICT systems that they are using. State two personal qualities that IT professionals should have that will enable them to help such people effectively, and give an example of when each quality would be needed. (4 marks)

Question January 2001 A company is recruiting a new member of staff for their IT support desk. The head of personnel asks the manager of the support desk what personal qualities the new employee must have in order to carry out the job effectively. State, with reasons, four personal qualities that the manager would want a new employee to have. (8 marks)

Information systems malpractice and crime b Explain the consequences of malpractice and crime on information systems b Describe the possible weak points within information technology subsystems

A sample AS question Explain, using examples, the difference between malpractice and crime as applied to Information Systems. Explain, using examples, the difference between malpractice and crime as applied to Information Systems. (4 marks)

Scenario A If I add 1p to every bill and then move it to my account…

Scenario B Let’s just look for cheap holidays in Ibiza…

SIMILARITIES BETWEEN A and B b BOTH INTENTIONAL b BOTH USING ICT SYSTEMS

DIFFERENCES BETWEEN A and B bbAbbA A CRIME – DEFRAUDING PEOPLE PUNISHABLE BY COUNTRY’S LEGAL SYSTEM AGAINST THE LAW OF THE LAND PENALTIES IMPOSED BY LEGAL SYSTEM

DIFFERENCES BETWEEN A and B bbBbbB NOT AGAINST THE LAW BUT IF IT IS AGAINST A CODE OF PRACTICE I.E. THE ORGANISATION’S RULES THEN IT IS MALPRACTICE (BAD PRACTICE) AND IS PUNISHABLE BY THE ORGANISATION’S PENALTIES

JUST BECAUSE SOMETHING IS UNINTENTIONAL DOES NOT MEAN IT IS NOT A CRIME b “ I DIDN’T MEAN TO BREAK THE SPEED LIMIT, I WAS BUSY TALKING..” b “I ONLY VISITED THE WEBSITE BY ACCIDENT..”

Malpractice and Crime Describe the measures that can be taken to protect information technology systems against internal and external threats

Sample Question Describe, with reasons, three measures, other than passwords, that may be taken to maintain the integrity of data against malicious or accidental damage. (6 Marks)

Malpractice and Crime b Describe the particular issues surrounding access to, and use of, the Internet, e.g. censorship, security and ethics.

INTERNET ISSUES b What Information Is Available on the Internet? b How Do You Know If It Is Genuine and Reliable? b How can you be sure any details you give are secure? b What should be allowed to be published on the Internet? b Does, or should, anyone control what information is available?

INTERNET ISSUES b What information should we put on the Internet? b How can we make sure people know it is reliable and genuine? b Is there anything we must make sure doesn’t go on our website? b Are there any regulations we need to follow? And should we have someone to control what goes on our own site and procedures to follow?

Software and Data misuse b Describe the provisions of the Computer Misuse Act b Describe the principles of software copyright and licensing agreements

Misuse b What is it really about? b Why was the legislation introduced? b How effective is the legislation? b Search websites for stories – e.g. b Search websites for stories – e.g. b Why have there not been more prosecutions?

Misuse b Do not just learn the sections parrot fashion- b Make sure that you actually understand what they mean b E.g just what does unauthorised mean? b Where do viruses come in?

Question Jan 2004 The Computer Misuse Act was introduced to allow the prosecution of people who accessed computer systems without authorisation. (a)State and give an example of, each of the three sections of the Computer Misuse Act.(6 marks) (a)State and give an example of, each of the three sections of the Computer Misuse Act.(6 marks) (b) Explain why few companies ever prosecute people under the Computer Misuse Act.(2 marks)

Question June 2001 Describe what is meant by a software licensing agreement. (2 marks)

Question June 2001 Mr Patel has a single user software licensing agreement for a word processing package, which specifies that there must only be one copy in use at any one time. Would he be guilty of breaking the agreement if he installed the package on his laptop PC, as well as on his stand-alone PC at work? Explain your answer. (2 marks)

Question June 2001 A college network has a server and 20 stations. What type of licensing agreement would be suitable for a word processing package that may be used at the same time on all 20 stations? A college network has a server and 20 stations. What type of licensing agreement would be suitable for a word processing package that may be used at the same time on all 20 stations? (2 marks)

Data Protection Legislation Recall the nature, purpose and provisions of the current data protection legislation and the Public Register.

Data Protection Legislation b Recall the type of data covered and various exemptions from the legislation b Recall the definitions of processing and consent to process

Data Protection Legislation b Explain how the requirements of the legislation impact on data collection and use b Describe the obligations of data users under the legislation b Recall the rights of individuals under the legislation

Data Protection Legislation b Recall the role of the Commissioner in encouraging good practice, acting as Ombudsman and enforcing legislation. b They are now called the Information Commissioner – why? b Freedom of Information Act 2002

Question January 2002 A company wishes to collect data from order forms submitted by its customers to sell to other companies. State two actions that the company must take so that they can legally collect and sell that data. (2 marks)

Health and Safety b Risks associated with using ICT equipment b Workstations/hardware b No general points e.g. comfortable chairs b The importance of explaining

Health and Safety b Risks associated with software what are they?what are they? how can they be avoided/reduced?how can they be avoided/reduced? Making software more useableMaking software more useable More important in some situations than othersMore important in some situations than others –Clerk taking orders all day every day –Manager checking s

Health and Safety Part Question A company provides all new employees with an induction booklet including guidelines for working with ICT. State, giving a reason for each one: (a) Three health and safety guidelines (6 marks)

IMPORTANCE TO YOU b YOUR RIGHTS UNDER DATA PROTECTION LEGISLATIONDATA PROTECTION LEGISLATION HEALTH AND SAFETY LEGISLATIONHEALTH AND SAFETY LEGISLATION b YOUR RESPONSIBILITIES REGARDING COPYRIGHTCOPYRIGHT AUDITAUDIT MISUSEMISUSE

Make sure you get every mark!! Answer ALL the questions on the paper