Front Page Title Name Introduction Appropriate Images The Legal Issues -Personal Data -Freedom of Information -Computer Crimes Ethical Issues -

Slides:



Advertisements
Similar presentations
MFA for Business Banking – Security Code Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing these QT sheets.
Advertisements

Hart District Acceptable Use Policy Acceptable Use Policy.
4.00 Understand promotion and intermediate uses of marketing-information Acquire foundational knowledge of marketing-information management to.
Consumer Powers and Protections
Back to Table of Contents
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
What is identity theft, and how can you protect yourself from it?
INTERNET SAFETY FOR STUDENTS
Netiquette Rules.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
IST346: Information Ethics. Ethics  Ethics are the principles of conduct that govern a group of people.  Ethics are not morals.  Morals are the proclamation.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
6/10/2015Cookies1 What are Cookies? 6/10/2015Cookies2 How did they do that?
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
Legislation Who governs e-commerce?. E-commerce is regulated by laws and guidelines. These aim to ensure that sites operate effectively and that online.
ICAICT202A - Work and communicate effectively in an IT environment
Chapter 8 Protecting People and Information: Threats and Safeguards Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Do you know how to keep yourself safe?
INTERNET SAFETY FOR STUDENTS
Free Business Card Website Dr. K. F. Lee, ARPS IT&C (HK) Ltd.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
ETIQUETTE AND EVIDENCE
C4- Social, Legal, and Ethical Issues in the Digital Firm
No, Thanks, I’ll Use a Spreadsheet
Staying Safe Online Keep your Information Secure.
CHAPTER 4 Marketing Information and Research: Analyzing the Business Environment Off-line and Online M A R K E T I N G.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
E-Commerce and the Entrepreneur
Keeping Kids Safe on the Internet John Minelli Educational Technology Specialist Hartford School District
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
The One, Two Punch Facebook Re-Targeting Advertising Guide.
Keeping Safe While Using the Internet. We live in a community. What are some safety rules we have in our community? Cyberspace is also a community. What.
Copyrights and Wrongs Day 03. Essential Question How can I make responsible choices when I use other people’s creative work (pictures, etc)?
Slide 3-1 Chapter 3 Terms Electronic Commerce and Internet Technologies Introduction to Information Systems Judith C. Simon.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
By: Elizabeth Scruggs Digital Citizenship Project.
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
Collect records. Keep sales receipts, repair orders, warranties, cancelled checks, and contracts, as well as a record of your complaint –letter or .
Lecturer: Gareth Jones Class 6: Routine Business Messages.
Internet Safety Internet Safety LPM
Use Facebook to Farm Your Neighborhoods Brought to you by: YOUR NAME YOUR COMPANY Your Phone Number.
Bell Activity Find companies that use following corporate colours… Colour Set 1 Colour Set 2 Colour Set 3 Colour Set 4.
Information Systems Unit 3.
Messages 1. Outline Fields of an Subject line One point per The expected response Be a good correspondent Final tips 2.
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
PRIVACY, LAW & ETHICS MBA 563. Source: eMarketing eXcellence Chaffey et al. BH Overview: Establishing trust and confidence in the online world.
Society & Computers PowerPoint
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
This is Bonus Video 4.1B in the course: Get Paid To Write Copy Module 4: How to speak to clients, quote for work and get paid what you’re worth.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
1 Privacy & Preference Committee Update Ensuring a healthy ecosystem via transparency & trust Date: January 13, 2009 Alan Chapell, President.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Latest Updates on BlackHawk Mines Music : Privacy Policy
© JICMAIL.
marketing can accomplish many different marketing goals.
Being Aware of What You Share
Presentation transcript:

Front Page Title Name Introduction Appropriate Images The Legal Issues -Personal Data -Freedom of Information -Computer Crimes Ethical Issues - Use of Cookies - JW Ethics Operational Issues -PS3 Hackers The direct financial impact Operational Issues -Billabong Hackers The indirect financial impact, brand loyalty and trust. Jack Wills Privacy Policy - What can JW learn from PS3 and Billabong?

The Legal Issues

The Hong Kong Personal Data Ordinance In 1996, the Hong Kong authorities, after consulting the business community, the public, and many trade organizations (including the Hong Kong Direct Marketing Association) put into effect a law to keep a fair balance between legitimate commercial needs and personal privacy protection. The Personal Data (Privacy) Ordinance (Hong Kong Law Chapter 486) was brought into force on December 20, The purpose of the Ordinance is to protect the privacy interests of living individuals in relation to personal data. What sort of information is it appropriate for JW to find / store? Create a sample information gathering sheet for JW. Provide examples of why some questions are inappropriate. What sort of information is it appropriate for JW to find / store? Create a sample information gathering sheet for JW. Provide examples of why some questions are inappropriate.

Freedom of Information In the UK- Freedom of Information Act 2000 This provides individuals or organizations the right to request information held by a public authority. They must reply within 20 days. Dear Department for Education, I would like a list of all educational institutions offering A- Levels within the UK. Ideally the information would be contained within an excel spreadsheet. The information I am looking for is (ideally, the column headings): Name of Institution Specialist status (If Any) L o c a t i on / Tow n Pupil Numbers Number of Pupils Achieving ABB results or Above in 2011 Results It may be that you do not have information in exactly this form, or in a single spreadsheet. Please feel free to phone me to say what information you do have, and in what form, because that may suffice. Many Thanks Code on Access to Information 1995 Fu King-wa is a researcher at the University of Hong Kong’s Centre for Suicide Research and Prevention Fu asked the MTR Corporation for figures on the number of suicides and attempted suicides at MTR stations without screen doors in When they rejected his claim he asked the Environment, Transport and Works Bureau and was again turned down. In January 2007 the ombudsman ruled that they should hand over the information, but it took until late 2008 until he finally got hold of the data. information-laws Describe the situation in HK compared to UK, should we adopt a more ‘Western’ approach? Justify…..

Computer Crimes Ordinance Makes it unlawful in HK against certain activities using computers, such as hacking into other people’s systems, misusing software or helping a person to gain access to protected files on someone else’s computer.

Ethical Issues

Cookies There are a number of different reasons a website might use cookies. Most sites use them to collect demographic data about the viewers. They look at how long you stay on their website, how often you come, and which pages you look at while you do. This can help companies refine their marketing strategies to meet consumer needs. For example, if you always visit the website after one a.m., and lots of other customers do too, they might launch a new ad campaign based on that information. Another reason a website might use cookies is to offer you a personalized experience at the web site. The host server automatically assumes this is the first time you've visited the site if no cookies are present in your system. However, if the site deposits cookies on your hard drive, the host server knows you are a returning customer. You might have seen this before when you return to a website where you've made purchases in the past, and the header at the top says “Hello, Mr. Jones!” You may have wondered how they knew your name. It was the cookies they deposited on your system. Shopping websites may also make recommendations based on other purchases you've made from them in the past as the host server stores which pages you looked at and which pages you purchased from. Are They Bad?

JW Ethics -Do JW have a ‘Privacy Policy’? Is it clearly accessible? Do JW provide the option to ‘opt out’ of information sharing? Is this a simple process? -Do JW justify their reason for collecting personal information? -Do JW send correspondence to home address, personal , social media? Do they have permission to do this? -Do JW communicate with their customers in an ethical way (Opinion)? -In JW Privacy Policy do they make you feel that your information is safe and secure? If no, how may this impact on customer relations? -Should JW ‘back up’ your information on a separate server? -Why might JW consider a ‘continuance plan’? (page 142) -Why might JW need to increase the sophistication of their technology? -Do JW send SPAM? -Does JW website have any pop-ups?

Operational Issues #1

Operational Issues #2