Download presentation
Presentation is loading. Please wait.
Published byMadlyn Gibson Modified over 8 years ago
1
University of Sunderland MSc HIM Computer Legislation
2
University of Sunderland MSc HIM Professionalism and Ethics
3
University of Sunderland MSc HIM Objectives By the end of this lecture the student should – –Understand what constitutes professionalism –Understand what constitutes a Professional Institute –Appreciate the Ethical Issues
4
University of Sunderland MSc HIM Overview Professionals are a part of everyday life. But what exactly are professionals? What do they do? What distinguishes them from other ‘workers’? How do Ethics play a part?
5
University of Sunderland MSc HIM Introduction What is professionalism? What constitutes professionalism? What is a professional? Link between professionals Professional Institutes Professional Computing Personnel Ethical Issues
6
University of Sunderland MSc HIM Definitions Professional – –“Person engaged in a profession” Profession – –“Calling or occupation est. Learned or Scientific” (Collins Dictionary) Profession –“Occupation requiring advanced academic training such as Law or Medicine” (Oxford Dictionary)
7
University of Sunderland MSc HIM Professionalism What is a Professional? What Constitutes Professionalism? In Job Terms what links Professionals?
8
University of Sunderland MSc HIM Professional Institutes What are the Institutions? What do the Institutions do?
9
University of Sunderland MSc HIM The need for Professionalism in the Computing Industry Scale of IT Possible Effects DISCUSSION POINT: What make an IT Professional ?
10
University of Sunderland MSc HIM Computing and Professional Institutions Importance of Professionalism Problems Associated Lack of Legislation Who is recognised for IT
11
University of Sunderland MSc HIM Aim of Computer Ethics Make Computer Professionals – –More thoughtful –More careful Produce better computer scientists Provide usable concepts and material for use in an integrated approach for teaching and applying computer ethics
12
University of Sunderland MSc HIM Aim of Computer Ethics (cont) Aim to have Computer Ethics Applied across all computer science Make Computing and People who use Computers more Socially Responsible
13
University of Sunderland MSc HIM Other Ethical Issues Electronic Commerce E-Mail Ethics Policies Software/Hardware Copying/Pirating Software
14
University of Sunderland MSc HIM Other Ethical Issues Most computer security systems are a result of competition between hackers and those attempting to maintain security New challenges appear on every technological horizon WWW programming language JAVA has created an arms race between security protection experts and hackers
15
University of Sunderland MSc HIM Other Ethical Issues Surreptitious malicious applets that delete files and send private information are causing major concern Known Java based attacks can be summarised into five categories
16
University of Sunderland MSc HIM Computer Professionals and Computer Ethics Education Gotterbarn (1995) –Positive guides to ethical behaviour need to be in place in current software engineering courses starting in the early stages and running through the entire program –Discussion of ethics interactively throughout the course is likely to be most effective
17
University of Sunderland MSc HIM Computer Professionals and Computer Ethics Education Martin & Martin (1990) –Ethical dimensions should be integrated into the early stages of education and linked to managing technology –Computer education now begins in elementary school, this is where computer ethics education should begin
18
University of Sunderland MSc HIM Computer Professionals and Computer Ethics Education Lu & Lin (1999) –Challenge to the Educators - integrating computer ethics topics into various modules could be the most effective way
19
University of Sunderland MSc HIM Computer Professionals and Computer Ethics Education Johnson (1998) –Proactive integrated approach to ethical issues in computing –Enhanced ethical behaviour by creating awareness of computer ethics and responsibility in young users of computers
20
University of Sunderland MSc HIM What Using Computer Ethics and Aspiring to Professionalism Can do for YOU Help you get a better JOB Improve the standard of your WORK Help Society make best use of Technology Create Safe environments for people working with and using Computer Technology Create Computer Ethics policies Trust = Confidence
21
University of Sunderland MSc HIM Summary What is professionalism? What constitutes professionalism? What is a professional? Link between professionals Professional Institutes Professional Computing Personnel Ethical Issues
22
University of Sunderland MSc HIM Objectives –Understand what constitutes professionalism –Understand what constitutes a Professional Institute –Appreciate the Ethical Issues
23
University of Sunderland MSc HIM Objectives By the end of this lecture the student should – –Appreciate what constitutes computer crime –Understand the implications of computer crime –Appreciate the major legislation –Understand the background behind the Data Protection Act –Understand the need for the Data Protection Act –Understand the eight principles of the Act –Appreciate the Data subject’s rights –Appreciate the how the Act works
24
University of Sunderland MSc HIM Overview This lecture discusses computer crime, and gives detail surrounding it We will also looks at and gives an overview of the main pieces of legislation relating to computing: Computer Misuse Act 1990 Data Protection Act 1998
25
University of Sunderland MSc HIM Computer Misuse Definitions of Computer Crime Edwards and Savage (IT and the Law)
26
University of Sunderland MSc HIM Background Frequency of Computer Misuse The Offenders The Costs of Computer Crime
27
University of Sunderland MSc HIM The Computer Misuse Act Types of Computer Crime 1Fraud 2Misuse of Resources 3 Sabotage, Arson & Vandalism 4 Blackmail
28
University of Sunderland MSc HIM The Computer Misuse Act (cont) Objectives The Act itself –Offences –User Responsibilities –Enforcement
29
University of Sunderland MSc HIM The Computer Misuse Act (cont) Provisions of the Act Three New Offences –1 The Unauthorised Access Offence –2 The Ulterior Intent Offence –3 The Unauthorised Modification Offence Comments on the Act
30
University of Sunderland MSc HIM Data Protection Act 1998 The Act in Perspective Background The 8 Principles How the Act works Data Subjects Rights
31
University of Sunderland MSc HIM Data Protection Act in Perspective Organisations InformationComputers Why we need legislation
32
University of Sunderland MSc HIM Data Protection Act in Perspective Data Privacy PrivacyProtection Data Privacy
33
University of Sunderland MSc HIM The Act What is it? Purposes of the Act Definitions used in the Act (Full details see DPC's guidelines): –1 Data –2 Personal Data –3 Data Subject –4 Data Controller –5 Data Processor –6 Processing –7 Relevant Filing System
34
University of Sunderland MSc HIM The 8 Principles of the DPA There are eight principles to the data protection act - which should already be good practice – –1 Personal data shall be processed fairly and lawfully. –2 Personal data shall be obtained only for one or more specified and lawful purposes. –3 Personal data shall be adequate, relevant and not excessive.
35
University of Sunderland MSc HIM The 8 Principles of the DPA There are eight principles to the data protection act - which should already be good practice – –4 Personal data shall be accurate and, where necessary, kept up to date –5 Personal data processed for any purpose…shall not be kept for longer than is necessary –6 Personal data shall be processed in accordance with the rights of data subjects under this Act
36
University of Sunderland MSc HIM The 8 Principles of the DPA There are eight principles to the data protection act - which should already be good practice – –7 Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data. –8 Personal data shall not be transferred to a country or territory outside the EEA.
37
University of Sunderland MSc HIM How the Act Works The Commissioner Data Protection Commissioner Data User Registration Data Users Obligations Enforcement and Appeals
38
University of Sunderland MSc HIM How the Act Works Notification Notification information
39
University of Sunderland MSc HIM How the Act Works Exemptions (5 main sections) There are a number of exemptions, the main ones being – –National security –Crime and taxation –Health, education and social work –Regulatory activity –Special purposes
40
University of Sunderland MSc HIM How the Act Works Data Subject Rights –1 The right of access –2 The right to prevent processing –3 The right to compensation
41
University of Sunderland MSc HIM Copyright Introduction Protection Getting a Copyright Length
42
University of Sunderland MSc HIM Patents Introduction Protection Getting a Patent Length
43
University of Sunderland MSc HIM Enforcing Patents and Copyright Introduction Federation Against Software Theft/ European Leisure Software Publishers Association Powers Law Suits
44
University of Sunderland MSc HIM Summary Computer Misuse Background The Computer Misuse Act Copyright, Patents, etc Summary Further Reading
45
University of Sunderland MSc HIM Overview In this lecture we have discussed computer crime. We have also looked at and gives an overview of the main pieces of legislation relating to computing: Computer Misuse Act 1990 Data Protection Act 1998
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.