Workshop 4 Tutor: William Yeoh School of Computer and Information Science Secure and High Integrity System (INFT 3002)

Slides:



Advertisements
Similar presentations
Institutional Telecomms and Computer Network Monitoring Andrew Charlesworth University of Bristol 10 June 2002.
Advertisements

Northside I.S.D. Acceptable Use Policy
Rohas Nagpal, Asian School of Cyber Laws.  Information Technology Act, 2000  Imprisonment upto 10 years  Compensation upto Rs 1 crore  Indian Penal.
Introduction to Information Literacy 1 M06: Economic, Legal, and Social Issues for Use of Information See also: Chapter 7, Riedling.
Security Strategy. You will need to be able to explain:  Data Security  Data Integrity and  Data Privacy  Risks  Hacking  Denial of Service DOS.
Cyber Law & Islamic Ethics CICT3523 COMPUTER CRIMES.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
I NFORMATION T ECHNOLOGY A CT B ACKGROUND 1. Drew inspiration from Model Law on Electronic Commerce adopted by the United Nations Commission of.
Nigel, Lochie, Anika and Martin. As the internet is becoming the most popular area of crime, countries around the world are struggling to update the law.
Chapter 13 Administrative Responsibility Torts & Agencies ► What is a Tort? ► Generally, under the concept of “Sovereign Immunity” it is impossible to.
Law for Business and Personal Use
Security, Privacy, and Ethics Online Computer Crimes.
Riverside Community School District
Chapter 10 Privacy and Security McGraw-Hill
Chapter 9 Information Systems Ethics, Computer Crime, and Security
IT REGULATORY FRAMEWORK IN HONG KONG The Chinese University of Hong Kong Department of Electronic Engineering Sin Chung-kai Legislative Councillor (IT)
Computer and Ethics. Ethical Problems Proliferation of computers and their networks have created new ethical problems The ACM has issued a Code of Ethics.
Computer Ethics – The Ten Commandments
ETHICS, POLICY & SECURITY ISSUES 1CIIT---ETHICS,POLICY AND SECURITY ISSUES.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Police Technology Chapter Eight
24 Legal and Ethical Considerations. 24 Legal and Ethical Considerations.
General Awareness Training
General Purpose Packages
PART THREE E-commerce in Action Norton University E-commerce in Action.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
CLOUD AND SECURITY: A LEGISLATOR'S PERSPECTIVE 6/7/2013.
Chapter 14: Executive Powers Section 2
IS Lecture 10 Legal Control of Computer Crime Information Management and Computer Security, 3, 2, 13-19, 1995.
Matters of Conceptualization and Security in the Building of One-stop-shop e-Government Solutions in Europe: Experiences from the European OneStopGov project.
The Eighth Asian Bioethics Conference Biotechnology, Culture, and Human Values in Asia and Beyond Confidentiality and Genetic data: Ethical and Legal Rights.
Dimensions of E – Commerce Security
Chapter 9 Enhancing Information/Computer Security.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
ETHICS, POLICY & SECURITY ISSUES
ETHICS, POLICY & SECURITY ISSUES
First Look at Security and Privacy Jeremiah Burleson.
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
Chapter 7 Impact of Information Technology. Agenda Shneiderman’s Plagues of the Information era Ethics Issues Corporate Code of IT Ethics Other Impacts.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
Chap1: Is there a Security Problem in Computing?.
1 The Broader Picture Chapter 12 Copyright 2003 Prentice-Hall.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
Workshop 2 Tutor: William Yeoh School of Computer and Information Science Secure and High Integrity System (INFT 3002)
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
Security and Ethics Safeguards and Codes of Conduct.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Welcome to Unit Nine CJ230 Identity Theft Prof. Hulvat.
Presented by Ms. Teki Akuetteh LLM (IT and Telecom Law) 16/07/2013Data Protection Act, 2012: A call for Action1.
Legal Aspects in IT Security Is Your Organisation Up-to-Date?? (Ref : IT Act, 2008 & IT Rules 2011) Adv Prashant Mali [BSc(Phy),MSc(Comp. Sci.),CNA,
An analysis information security in distributed systems
Hacking: public policy
CHAPTER FOUR OVERVIEW SECTION ETHICS
SCHOOL OF LAW L 470- INFORMATION TECHNOLOGY LAW
Cyber Crime Today we will look at: Different types of cyber-crime
BCT 2.00 Analyze Technology Issues
Chapter 13 Security and Ethical Challenges.
Societal Issues in Computing (COMP466)
Ethical Use of Computers
CHAPTER FOUR OVERVIEW SECTION ETHICS
Presentation transcript:

Workshop 4 Tutor: William Yeoh School of Computer and Information Science Secure and High Integrity System (INFT 3002)

The issues Abraham is asking for advice on are: 7. Is there any legislation to help him if his network is hacked into again? 8. What kind of legal or ethical issues will he herself face if the data in his databases or files is lost or damaged?

7. Is there any legislation to help him if his network is hacked into again? The scope of legislation depends on the location of the company Eg. for Hong Kong Telecommunication Ordinance, chapter 106, Law of HK Crime Ordinance, Chapter 2000, Law of HK Theft Ordinance, Chapter 210, Law of HK Control of Obscene and Indecent Articles Ordinance, Chapter 390, Law of HK Copyright Ordinance, Chapter 528, Law of HK Prevention of Copyright Privacy Ordinance, Chapter 544, Law of HK

Scenario: Hacking of the system Referring to section 27A, Telecommunication Ordinance (Cap 106), Law of HK, it states that “unauthorised access to computer by telecommunication’ is a criminal offense. Hence, Police officer is authorised to investigate the case and arrest the criminal This law protects AW from being hacked, if anyone access to AW’s pc via telecommunication means without an authorization

Scenario II: Virus/Trojan Infection or unauthorised program modifications By section 11, Theft Ordinance, Law of HK, it states that ‘unlawfully causing a computer to function other than as it has been established, and altering, erasing or adding any computer program or data is a criminal offense. This section protects AW from being attacked by viral or trojan programs and unauthorised modifications of code to hinder its normal operations eg. DoS

Scenario III: Theft of Information Section 17, Theft Ordinance (Cap 210), Law of HK, it states that ‘Obtaining property by deception’ constitutes a criminal offense. This section interprets that stealing, intercepting and unauthorised access of info constitutes an offense This law protects AW from eavesdropping during info transmission and stealing of sensitive info.

Scenario IV: Damaging of equipment & resources Referring to Section 161, Crime Ordinance (Cap 200), Law of HK This section safeguards the loss of AW caused by intentional destructions, eg, destroying the firewall and DB, and combats illegal gain made by attacker who makes profit from attacking AW’s system

8. What kind of legal or ethical issues will he herself face if the data in his databases or files is lost or damaged? Referring to HK Law, no liability shall be incurred by manager of an authorised institution or any person appointed by the manager According to this interpretation, this law relates to the legal concerns of our customers if the data is lost, neither legal liability is liable to AW nor his staff

Other matters on legal aspects that need to be considered: Bona fide of service – data loss or damage must be caused during AW’s staff exercising their duty in good faith Due diligence – whether the customer has taken all possible steps to protect the system from being attacked Criminal damage and theft – any possibility to show that employees are involved in intentional damage or theft of info

Ethical issues Pfleeger defined ethics as a set of social values or norms to judge whether people are doing things right or wrong Staff/customers may bear no legal liability if duties are done in ‘bona fide’ manner However, ethical issues are highly concerned for business Hence, code of ethics must be formulated

The ethical issues are many and varied, however it’s useful to focus on just four- PAPA: Privacy: What information about one self must a person reveal to others, under what conditions and what safeguards? Accuracy: Who is responsible for the authenticity, fidelity an accuracy of info?

Property: Who owns information? What are the just price for its exchange? Accessibility: What info does a person/org have a privilege to obtain? Under what conditions and with what safeguards?

Q &A Group Discussions