Download presentation
Presentation is loading. Please wait.
Published byEmma Peckham Modified over 9 years ago
1
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what data you think they hold. For Example Vodaphone – Name, Address, Data of Birth, Phone number, Bank details. All – Will understand that personal data is stored by companies and needs protecting Most – Will understand some of the ways that data can be protected and evidence this. Some – Will be able to talk about how personal data can be protected along with Legal Issues
2
Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what data you think they hold For Example Name Age Address Bank Details Phone Number Medical historyGrades Pictures Parent details
3
Data Security and legal issues Objectives To work towards the P7 and M4 unit 2 criteria Have an understanding of the Possible Data Security and legal issues when using a computer. Describe how Hardware, software and Data can be protected All – Will understand that personal data is stored by companies and needs protecting Most – Will understand some of the ways that data can be protected and evidence this. Some – Will be able to talk about how personal data can be protected along with Legal Issues
4
Data Security and legal issues All – Will understand that personal data is stored by companies and needs protecting Most – Will understand some of the ways that data can be protected and evidence this. Some – Will be able to talk about how personal data can be protected along with Legal Issues
5
Data Security and legal issues Protecting Hardware, Software and Data Hacking Hacking is where an unauthorised person uses a network, Internet or modem connection to gain access past security passwords or other security to see data stored on another computer.networkInternet modemdata Firewall A security tool that controls traffic too and from a network. All – Will understand that personal data is stored by companies and needs protecting Most – Will understand some of the ways that data can be protected and evidence this. Some – Will be able to talk about how personal data can be protected along with Legal Issues
6
Data Security and legal issues Protecting Hardware, Software and Data Spyware Spyware is computer software that is installed secretly on a personal computer to collect information about a user, their computer or browsing habits without the user's Permissioncomputer softwarepersonal computer Anti - Spyware Software installed on an end user workstation (computer) to detect and remove Spyware and Adware All – Will understand that personal data is stored by companies and needs protecting Most – Will understand some of the ways that data can be protected and evidence this. Some – Will be able to talk about how personal data can be protected along with Legal Issues
7
Data Security and legal issues Protecting Hardware, Software and Data Data Theft Data theft is when data is taken without the owners consent from a computer or storage device Passwords/Physical Security This can be used to stop people physically taking the data from the workstation (Computer) or the workstation its self All – Will understand that personal data is stored by companies and needs protecting Most – Will understand some of the ways that data can be protected and evidence this. Some – Will be able to talk about how personal data can be protected along with Legal Issues
8
Data Security and legal issues Protecting Hardware, Software and Data Computer Crash Computer Crash, this is when a computer fails causing a loss of data, this could be done by accident or on purpose Back up Copying the information onto another medium (storage area) regularly, storing this in another area. All – Will understand that personal data is stored by companies and needs protecting Most – Will understand some of the ways that data can be protected and evidence this. Some – Will be able to talk about how personal data can be protected along with Legal Issues
9
Data Security and legal issues Protecting Hardware, Software and Data Viruses Viruses are programs written by people and designed to cause nuisance or damage to computers or their files.programs Anti - Virus Software installed on an end user workstation (computer) to detect and remove Viruses, Trojan horses and worms from files and e-mails All – Will understand that personal data is stored by companies and needs protecting Most – Will understand some of the ways that data can be protected and evidence this. Some – Will be able to talk about how personal data can be protected along with Legal Issues
10
Data Security and legal issues Protecting Hardware, Software and Data Task 1 (5 minutes) Using the Cards Provided in groups of 2 arrange them to show Name of threat Description Possible Protection All – Will understand that personal data is stored by companies and needs protecting Most – Will understand some of the ways that data can be protected and evidence this. Some – Will be able to talk about how personal data can be protected along with Legal Issues Be ready to talk about your answer if asked
11
Data Security and legal issues Along side physical protection there is also deterrents e.g. Data Protection act and the Computer misuse act TASK 2 - 20 Minute activity – Research and answer the following Questions. Be ready to feedback the information found to the group in a 10 minute plenary at the end All – Will understand that personal data is stored by companies and needs protecting Most – Will understand some of the ways that data can be protected and evidence this. Some – Will be able to talk about how personal data can be protected along with Legal Issues All your Personal Data – Going to the highest bidder. Buy today and get Medical History Free of Charge Sign up to day and learn how to change your grades increase your bank account and change your friends personal data
12
Data Security and legal issues Protecting Hardware, Software and Data Plenary All – Will understand that personal data is stored by companies and needs protecting Most – Will understand some of the ways that data can be protected and evidence this. Some – Will be able to talk about how personal data can be protected along with Legal Issues What is the Data Protection Act A law designed to protect personal data stored on computer. Who is the Information Commissioner The official who supervises the enforcement of the Data Protection Act. Who is the data controller The nominated person in a company who applies to the data commissioner for permission to store and use personal data. Who are the data subject The person about whom data is stored. Who are the data users Anyone who uses the personal data as part of their job. What is personal data Information about a particular person.
13
Data Security and legal issues Protecting Hardware, Software and Data Plenary All – Will understand that personal data is stored by companies and needs protecting Most – Will understand some of the ways that data can be protected and evidence this. Some – Will be able to talk about how personal data can be protected along with Legal Issues Computer misuse act The Computer Misuse Act 1990 was designed to protect the integrity of computer systems by deterring the activities of hackers. It created three new offences: 1.Unauthorised access to computer programs or data 2.Unauthorised access with a further criminal intent 3.Unauthorised modification of computer material
14
Data Security and legal issues Protecting Hardware, Software and Data Plenary All – Will understand that personal data is stored by companies and needs protecting Most – Will understand some of the ways that data can be protected and evidence this. Some – Will be able to talk about how personal data can be protected along with Legal Issues Can you find and list all eight points of the data protection act 1.processed fairly and lawfully 2.used for the lawful purpose it was collected for 3.adequate and relevant to purpose collected for 4.kept accurate and up-to-date 5.kept no longer than necessary 6.processed within the rights of the data subjects 7.kept secure 8.kept only within the EEC
15
The following slides should be made in to cards for the students to arrange
16
Is where an unauthorised person uses a network, Internet or modem connection to gain access past security passwords or other security to see data stored on another computer. networkInternetmodemdata Back up Copying the information onto another medium (storage area) regularly, storing this in another area. Computer Crash this is when a computer fails causing a loss of data, this could be done by accident or on purpose Hacking Firewall A security tool that controls traffic too and from a network.
17
Virus Anti - Virus Software installed on an end user workstation (computer) to detect and remove Viruses, Trojan horses and worms from files and e-mails are programs written by people and designed to cause nuisance or damage to computers or their files.programs Passwords/physical security This can be used to stop people physically taking the data from the workstation (Computer) or the workstation its self is when data is taken without the owners consent from a computer or storage device Data Theft
18
Spyware Name of Threat Anti - Spyware Software installed on an end user workstation (computer) to detect and remove Spyware and Adware is computer software that is installed secretly on a personal computer to collect information about a user, their computer or browsing habits without the user's Permissioncomputer softwarepersonal computer Description of Threat Protection against Threat
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.