University of Sunderland MSc HIM Computer Legislation.

Slides:



Advertisements
Similar presentations
Administrative Systems and the Law What you need to know to produce an oral presentation for Unit 7 When the presentations will take place Resources you.
Advertisements

The Data Protection (Jersey) Law 2005.
Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
Legislation in ICT.
University of Sunderland Professionalism and Personal Skills Unit 11 Professionalism and Personal Skills Computer Legislation.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Data Protection Act Description The Data Protection Act controls how your personal information can be used and protects from the misuse of your.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Data Protection Overview
The Data Protection Act
 The Data Protection Act 1998 is an Act of Parliament which defines UK law on the processing of data on identifiable living people and it is the main.
CENTRAL SCOTLAND POLICE Data Protection & Information Security Stuart Macfarlane Information Governance Unit Police Service of Scotland.
The Information Commissioner’s Office David Evans.
Health & Social Care Apprenticeships & Diploma
EHRs and the European Union – current legislation and future directions. Dr Richard Fitton.
Research Paper Presentation Software Engineering in agent systems.
Computers, the law and ethics  Lesson Objective: Understand some of the legal & ethical issues in developing computer systems  Learning Outcome: Know.
L, E & P ISSUES1 Follow up on PSP: The PSP is about QUALITY - numerous measures are used - with the obvious commitments to data collection. One of the.
The Data Protection Act 1998 The Eight Principles.
GEOG3025 Confidentiality and social implications.
University of Sunderland Professionalism and Personal Skills Unit 7 Professionalism and Personal Skills Lecture 7: Computer Crime.
Data Protection Act AS Module Heathcote Ch. 12.
The Data Protection Act (1998). The Data Protection Act allows you to Check if any organisation keeps information about you on computer or in paper form.
Data Protection Corporate training Data Protection Act 1998 Replaces DPA 1994 EC directive 94/46/EC The Information Commissioner The courts.
Processing personal health data: the regulator’s perspective Ken Macdonald Assistant Commissioner Information Commissioner’s Office.
The Data Protection Act [1998]
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
Everyone has a duty to comply with the Act, including employers, employees, trainees, self-employed, manufacturers, suppliers, designers, importers of.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
Data Protection Property Management Conference. What’s it got to do with me ? As a member of a management committee responsible for Guiding property you.
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
The Data Protection Act What the Act covers The misuse of personal data by organisations and businesses.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
University of Sunderland Professionalism and Personal Skills Unit 8 Professionalism and Personal Skills Lecture 8: Professionalism and Ethics.
Data protection and compliance in context 19 November 2007 Stewart Room Partner.
LEGISLATION. DATA PROTECTION ACT (1998) The aim of this act give people the right to know what information is held about them. It also sets out rules.
Data Protection Act The Data Protection Act (DPA) is a balance between rights of the DATA SUBJECT and obligations of the DATA CONTROLLER DATA CONTROLLER.
Information Systems Unit 3.
Data Protection Act (1998).
University of Sunderland Professionalism and Personal Skills Unit 6 Professionalism and Personal Skills Lecture Ethics.
Computing, Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
What is the Data Protection Act (DPA)? 1998 The Data Protection Act 1998 seeks to strike a balance between the rights of individuals and the sometimes.
Data Protection Philip Reed. Introduction What is data? What is data protection? Who needs your data? Who wants your data? Who does not need your data?
DATA PROTECTION ACT INTRODUCTION The Data Protection Act 1998 came into force on the 1 st March It is more far reaching than its predecessor,
DATA PROTECTION ACT DATA PROTECTION ACT  Gives rights to data subjects (i.e. people who have data stored about them on a computer)  Information.
© University of Reading Lee Shailer 06 June 2016 Data Protection the basics.
Business Ethics and Social Responsibility GCSE Business and Communication Systems Business and Communication Systems.
Computing and Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
Security of, privacy of and access to personal/confidential information/data.
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
Workshop Understanding your responsibilities under the Data Protection Act 1998 and the Freedom of Information Act 2000 Adele Rhodes Girling.
Clark Holt Limited (Co. No ), Hardwick House, Prospect Place, Swindon, SN1 3LJ Authorised and regulated by the Solicitors Regulation.
The Data Protection Act 1998
The Data Protection Act 1998
Trevor Ellis Trainee Programmer (1981 – 28 years ago)
Legislation in ICT.
Data Protection Act.
The Data Protection Act 1998
Understanding the issues related to the use of information
Data Protection Act.
Legal and Ethical Issues
Legislation in ICT.
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

University of Sunderland MSc HIM Computer Legislation

University of Sunderland MSc HIM Professionalism and Ethics

University of Sunderland MSc HIM Objectives By the end of this lecture the student should – –Understand what constitutes professionalism –Understand what constitutes a Professional Institute –Appreciate the Ethical Issues

University of Sunderland MSc HIM Overview Professionals are a part of everyday life. But what exactly are professionals? What do they do? What distinguishes them from other ‘workers’? How do Ethics play a part?

University of Sunderland MSc HIM Introduction What is professionalism? What constitutes professionalism? What is a professional? Link between professionals Professional Institutes Professional Computing Personnel Ethical Issues

University of Sunderland MSc HIM Definitions Professional – –“Person engaged in a profession” Profession – –“Calling or occupation est. Learned or Scientific” (Collins Dictionary) Profession –“Occupation requiring advanced academic training such as Law or Medicine” (Oxford Dictionary)

University of Sunderland MSc HIM Professionalism What is a Professional? What Constitutes Professionalism? In Job Terms what links Professionals?

University of Sunderland MSc HIM Professional Institutes What are the Institutions? What do the Institutions do?

University of Sunderland MSc HIM The need for Professionalism in the Computing Industry Scale of IT Possible Effects DISCUSSION POINT: What make an IT Professional ?

University of Sunderland MSc HIM Computing and Professional Institutions Importance of Professionalism Problems Associated Lack of Legislation Who is recognised for IT

University of Sunderland MSc HIM Aim of Computer Ethics Make Computer Professionals – –More thoughtful –More careful Produce better computer scientists Provide usable concepts and material for use in an integrated approach for teaching and applying computer ethics

University of Sunderland MSc HIM Aim of Computer Ethics (cont) Aim to have Computer Ethics Applied across all computer science Make Computing and People who use Computers more Socially Responsible

University of Sunderland MSc HIM Other Ethical Issues Electronic Commerce Ethics Policies Software/Hardware Copying/Pirating Software

University of Sunderland MSc HIM Other Ethical Issues Most computer security systems are a result of competition between hackers and those attempting to maintain security New challenges appear on every technological horizon WWW programming language JAVA has created an arms race between security protection experts and hackers

University of Sunderland MSc HIM Other Ethical Issues Surreptitious malicious applets that delete files and send private information are causing major concern Known Java based attacks can be summarised into five categories

University of Sunderland MSc HIM Computer Professionals and Computer Ethics Education Gotterbarn (1995) –Positive guides to ethical behaviour need to be in place in current software engineering courses starting in the early stages and running through the entire program –Discussion of ethics interactively throughout the course is likely to be most effective

University of Sunderland MSc HIM Computer Professionals and Computer Ethics Education Martin & Martin (1990) –Ethical dimensions should be integrated into the early stages of education and linked to managing technology –Computer education now begins in elementary school, this is where computer ethics education should begin

University of Sunderland MSc HIM Computer Professionals and Computer Ethics Education Lu & Lin (1999) –Challenge to the Educators - integrating computer ethics topics into various modules could be the most effective way

University of Sunderland MSc HIM Computer Professionals and Computer Ethics Education Johnson (1998) –Proactive integrated approach to ethical issues in computing –Enhanced ethical behaviour by creating awareness of computer ethics and responsibility in young users of computers

University of Sunderland MSc HIM What Using Computer Ethics and Aspiring to Professionalism Can do for YOU Help you get a better JOB Improve the standard of your WORK Help Society make best use of Technology Create Safe environments for people working with and using Computer Technology Create Computer Ethics policies Trust = Confidence

University of Sunderland MSc HIM Summary What is professionalism? What constitutes professionalism? What is a professional? Link between professionals Professional Institutes Professional Computing Personnel Ethical Issues

University of Sunderland MSc HIM Objectives –Understand what constitutes professionalism –Understand what constitutes a Professional Institute –Appreciate the Ethical Issues

University of Sunderland MSc HIM Objectives By the end of this lecture the student should – –Appreciate what constitutes computer crime –Understand the implications of computer crime –Appreciate the major legislation –Understand the background behind the Data Protection Act –Understand the need for the Data Protection Act –Understand the eight principles of the Act –Appreciate the Data subject’s rights –Appreciate the how the Act works

University of Sunderland MSc HIM Overview This lecture discusses computer crime, and gives detail surrounding it We will also looks at and gives an overview of the main pieces of legislation relating to computing: Computer Misuse Act 1990 Data Protection Act 1998

University of Sunderland MSc HIM Computer Misuse Definitions of Computer Crime Edwards and Savage (IT and the Law)

University of Sunderland MSc HIM Background Frequency of Computer Misuse The Offenders The Costs of Computer Crime

University of Sunderland MSc HIM The Computer Misuse Act Types of Computer Crime 1Fraud 2Misuse of Resources 3 Sabotage, Arson & Vandalism 4 Blackmail

University of Sunderland MSc HIM The Computer Misuse Act (cont) Objectives The Act itself –Offences –User Responsibilities –Enforcement

University of Sunderland MSc HIM The Computer Misuse Act (cont) Provisions of the Act Three New Offences –1 The Unauthorised Access Offence –2 The Ulterior Intent Offence –3 The Unauthorised Modification Offence Comments on the Act

University of Sunderland MSc HIM Data Protection Act 1998 The Act in Perspective Background The 8 Principles How the Act works Data Subjects Rights

University of Sunderland MSc HIM Data Protection Act in Perspective Organisations InformationComputers Why we need legislation

University of Sunderland MSc HIM Data Protection Act in Perspective Data Privacy PrivacyProtection Data Privacy

University of Sunderland MSc HIM The Act What is it? Purposes of the Act Definitions used in the Act (Full details see DPC's guidelines): –1 Data –2 Personal Data –3 Data Subject –4 Data Controller –5 Data Processor –6 Processing –7 Relevant Filing System

University of Sunderland MSc HIM The 8 Principles of the DPA There are eight principles to the data protection act - which should already be good practice – –1 Personal data shall be processed fairly and lawfully. –2 Personal data shall be obtained only for one or more specified and lawful purposes. –3 Personal data shall be adequate, relevant and not excessive.

University of Sunderland MSc HIM The 8 Principles of the DPA There are eight principles to the data protection act - which should already be good practice – –4 Personal data shall be accurate and, where necessary, kept up to date –5 Personal data processed for any purpose…shall not be kept for longer than is necessary –6 Personal data shall be processed in accordance with the rights of data subjects under this Act

University of Sunderland MSc HIM The 8 Principles of the DPA There are eight principles to the data protection act - which should already be good practice – –7 Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data. –8 Personal data shall not be transferred to a country or territory outside the EEA.

University of Sunderland MSc HIM How the Act Works The Commissioner Data Protection Commissioner Data User Registration Data Users Obligations Enforcement and Appeals

University of Sunderland MSc HIM How the Act Works Notification Notification information

University of Sunderland MSc HIM How the Act Works Exemptions (5 main sections) There are a number of exemptions, the main ones being – –National security –Crime and taxation –Health, education and social work –Regulatory activity –Special purposes

University of Sunderland MSc HIM How the Act Works Data Subject Rights –1 The right of access –2 The right to prevent processing –3 The right to compensation

University of Sunderland MSc HIM Copyright Introduction Protection Getting a Copyright Length

University of Sunderland MSc HIM Patents Introduction Protection Getting a Patent Length

University of Sunderland MSc HIM Enforcing Patents and Copyright Introduction Federation Against Software Theft/ European Leisure Software Publishers Association Powers Law Suits

University of Sunderland MSc HIM Summary Computer Misuse Background The Computer Misuse Act Copyright, Patents, etc Summary Further Reading

University of Sunderland MSc HIM Overview In this lecture we have discussed computer crime. We have also looked at and gives an overview of the main pieces of legislation relating to computing: Computer Misuse Act 1990 Data Protection Act 1998