Presentation is loading. Please wait.

Presentation is loading. Please wait.

James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.

Similar presentations


Presentation on theme: "James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of."— Presentation transcript:

1 James McQuillen

2 Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of people with the respect to the processing of personal data. It provides for people to protect important information such as: age, name, location and bank details. So to keep information safe, both companies and people must keep all information secure. So in this case for the business, they must protect all details about their clients. Copyright, Designs and Patents Act 1988 It allows for the creator the right to control the ways in which their material may be used. The rights cover: Broadcast and public performance, copying, adapting, issuing, renting and lending copies to the public. The creator would identify themselves as the author and can object to distortions of his work. Anyone who believes their work has been copied would be looking at the other companies: Names, titles, short phrases, ideas, presentation, images and colours to see whether or not they are similar to their idea/business. So the business must not copy any designs of other businesses. The computer Misuse Act of 1990 The Computer Misuse Act came was introduced as a countermeasure to make hacking and the introduction of viruses and criminal offences. Offences been carried out on company machines as well as personal equipment. Companies aggrieved enough with the employee who has planted a virus or used company resources to hack other networks can resort to the law or apply their own disciplinary procedures.

3 Malware This is software that is intended to create damage or disable computers to a computer system. Botnet Private network computers are infected with malicious software and controlled as a group without the owners’ knowledge. Trojans This is a piece of malware which appears to perform a certain action but in fact performs many different forms of codes to affect the system. Phishing The practice of sending e-mails pretending to be from legitimate companies in order to gather individuals to reveal personal information. Weak Points Hacking – Many people are hacked every day who attempt to gain unauthorised information. Hacking is often achieved via telecommunications links. Hackers seem to enjoy trying to break into an ICT system/ Viruses, Trojans and Trojan horses- damage files and data which are stored on the system. They damage files stored on a hard disk. An infected computer can also reproduce itself onto a memory stick. Networks – people can access the network if not secure. The big risk is that if data is transferred over a WAN using public communications link. Many people can eavesdrop into conversations from the signal being transmitted. If any of these happen, people can gather information from the business and all contact details can be lost.

4 Don’t give out details such as passwords Do not leave anything left on un protected Do not loose any work with important confidential information on Protect information by putting them in a safe and secure place These are examples of malpractice. Malpractice is when negligent and improper professional behaviour. These can take place within working environment. This can cause harm to the customers and organisation.

5 You could use firewalls and install security programmes such as MacAfee which will protect people from interfering in your network. You could password protect your software meaning that only you have access to information. Keeping all data up to date also helps protect information stored.

6 A back out procedure is used to return a piece of software that has been upgraded or converted to something new. So if the software fails or becomes corrupt then it will be able to return the software back to the existing version before the update which would allow the use of the software and plan out, where the problem went wrong, and what needs to be done.

7 http://www.bbc.co.uk/news/business-21197171 Cyber crime prevention for businesses. http://www.bbc.co.uk/news/world-us-canada-20264826 Computer laws


Download ppt "James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of."

Similar presentations


Ads by Google