Presentation is loading. Please wait.

Presentation is loading. Please wait.

University of Sunderland MSc HIM Computer Legislation.

Similar presentations


Presentation on theme: "University of Sunderland MSc HIM Computer Legislation."— Presentation transcript:

1 University of Sunderland MSc HIM Computer Legislation

2 University of Sunderland MSc HIM Professionalism and Ethics

3 University of Sunderland MSc HIM Objectives By the end of this lecture the student should – –Understand what constitutes professionalism –Understand what constitutes a Professional Institute –Appreciate the Ethical Issues

4 University of Sunderland MSc HIM Overview Professionals are a part of everyday life. But what exactly are professionals? What do they do? What distinguishes them from other ‘workers’? How do Ethics play a part?

5 University of Sunderland MSc HIM Introduction What is professionalism? What constitutes professionalism? What is a professional? Link between professionals Professional Institutes Professional Computing Personnel Ethical Issues

6 University of Sunderland MSc HIM Definitions Professional – –“Person engaged in a profession” Profession – –“Calling or occupation est. Learned or Scientific” (Collins Dictionary) Profession –“Occupation requiring advanced academic training such as Law or Medicine” (Oxford Dictionary)

7 University of Sunderland MSc HIM Professionalism What is a Professional? What Constitutes Professionalism? In Job Terms what links Professionals?

8 University of Sunderland MSc HIM Professional Institutes What are the Institutions? What do the Institutions do?

9 University of Sunderland MSc HIM The need for Professionalism in the Computing Industry Scale of IT Possible Effects DISCUSSION POINT: What make an IT Professional ?

10 University of Sunderland MSc HIM Computing and Professional Institutions Importance of Professionalism Problems Associated Lack of Legislation Who is recognised for IT

11 University of Sunderland MSc HIM Aim of Computer Ethics Make Computer Professionals – –More thoughtful –More careful Produce better computer scientists Provide usable concepts and material for use in an integrated approach for teaching and applying computer ethics

12 University of Sunderland MSc HIM Aim of Computer Ethics (cont) Aim to have Computer Ethics Applied across all computer science Make Computing and People who use Computers more Socially Responsible

13 University of Sunderland MSc HIM Other Ethical Issues Electronic Commerce E-Mail Ethics Policies Software/Hardware Copying/Pirating Software

14 University of Sunderland MSc HIM Other Ethical Issues Most computer security systems are a result of competition between hackers and those attempting to maintain security New challenges appear on every technological horizon WWW programming language JAVA has created an arms race between security protection experts and hackers

15 University of Sunderland MSc HIM Other Ethical Issues Surreptitious malicious applets that delete files and send private information are causing major concern Known Java based attacks can be summarised into five categories

16 University of Sunderland MSc HIM Computer Professionals and Computer Ethics Education Gotterbarn (1995) –Positive guides to ethical behaviour need to be in place in current software engineering courses starting in the early stages and running through the entire program –Discussion of ethics interactively throughout the course is likely to be most effective

17 University of Sunderland MSc HIM Computer Professionals and Computer Ethics Education Martin & Martin (1990) –Ethical dimensions should be integrated into the early stages of education and linked to managing technology –Computer education now begins in elementary school, this is where computer ethics education should begin

18 University of Sunderland MSc HIM Computer Professionals and Computer Ethics Education Lu & Lin (1999) –Challenge to the Educators - integrating computer ethics topics into various modules could be the most effective way

19 University of Sunderland MSc HIM Computer Professionals and Computer Ethics Education Johnson (1998) –Proactive integrated approach to ethical issues in computing –Enhanced ethical behaviour by creating awareness of computer ethics and responsibility in young users of computers

20 University of Sunderland MSc HIM What Using Computer Ethics and Aspiring to Professionalism Can do for YOU Help you get a better JOB Improve the standard of your WORK Help Society make best use of Technology Create Safe environments for people working with and using Computer Technology Create Computer Ethics policies Trust = Confidence

21 University of Sunderland MSc HIM Summary What is professionalism? What constitutes professionalism? What is a professional? Link between professionals Professional Institutes Professional Computing Personnel Ethical Issues

22 University of Sunderland MSc HIM Objectives –Understand what constitutes professionalism –Understand what constitutes a Professional Institute –Appreciate the Ethical Issues

23 University of Sunderland MSc HIM Objectives By the end of this lecture the student should – –Appreciate what constitutes computer crime –Understand the implications of computer crime –Appreciate the major legislation –Understand the background behind the Data Protection Act –Understand the need for the Data Protection Act –Understand the eight principles of the Act –Appreciate the Data subject’s rights –Appreciate the how the Act works

24 University of Sunderland MSc HIM Overview This lecture discusses computer crime, and gives detail surrounding it We will also looks at and gives an overview of the main pieces of legislation relating to computing: Computer Misuse Act 1990 Data Protection Act 1998

25 University of Sunderland MSc HIM Computer Misuse Definitions of Computer Crime Edwards and Savage (IT and the Law)

26 University of Sunderland MSc HIM Background Frequency of Computer Misuse The Offenders The Costs of Computer Crime

27 University of Sunderland MSc HIM The Computer Misuse Act Types of Computer Crime 1Fraud 2Misuse of Resources 3 Sabotage, Arson & Vandalism 4 Blackmail

28 University of Sunderland MSc HIM The Computer Misuse Act (cont) Objectives The Act itself –Offences –User Responsibilities –Enforcement

29 University of Sunderland MSc HIM The Computer Misuse Act (cont) Provisions of the Act Three New Offences –1 The Unauthorised Access Offence –2 The Ulterior Intent Offence –3 The Unauthorised Modification Offence Comments on the Act

30 University of Sunderland MSc HIM Data Protection Act 1998 The Act in Perspective Background The 8 Principles How the Act works Data Subjects Rights

31 University of Sunderland MSc HIM Data Protection Act in Perspective Organisations InformationComputers Why we need legislation

32 University of Sunderland MSc HIM Data Protection Act in Perspective Data Privacy PrivacyProtection Data Privacy

33 University of Sunderland MSc HIM The Act What is it? Purposes of the Act Definitions used in the Act (Full details see DPC's guidelines): –1 Data –2 Personal Data –3 Data Subject –4 Data Controller –5 Data Processor –6 Processing –7 Relevant Filing System

34 University of Sunderland MSc HIM The 8 Principles of the DPA There are eight principles to the data protection act - which should already be good practice – –1 Personal data shall be processed fairly and lawfully. –2 Personal data shall be obtained only for one or more specified and lawful purposes. –3 Personal data shall be adequate, relevant and not excessive.

35 University of Sunderland MSc HIM The 8 Principles of the DPA There are eight principles to the data protection act - which should already be good practice – –4 Personal data shall be accurate and, where necessary, kept up to date –5 Personal data processed for any purpose…shall not be kept for longer than is necessary –6 Personal data shall be processed in accordance with the rights of data subjects under this Act

36 University of Sunderland MSc HIM The 8 Principles of the DPA There are eight principles to the data protection act - which should already be good practice – –7 Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data. –8 Personal data shall not be transferred to a country or territory outside the EEA.

37 University of Sunderland MSc HIM How the Act Works The Commissioner Data Protection Commissioner Data User Registration Data Users Obligations Enforcement and Appeals

38 University of Sunderland MSc HIM How the Act Works Notification Notification information

39 University of Sunderland MSc HIM How the Act Works Exemptions (5 main sections) There are a number of exemptions, the main ones being – –National security –Crime and taxation –Health, education and social work –Regulatory activity –Special purposes

40 University of Sunderland MSc HIM How the Act Works Data Subject Rights –1 The right of access –2 The right to prevent processing –3 The right to compensation

41 University of Sunderland MSc HIM Copyright Introduction Protection Getting a Copyright Length

42 University of Sunderland MSc HIM Patents Introduction Protection Getting a Patent Length

43 University of Sunderland MSc HIM Enforcing Patents and Copyright Introduction Federation Against Software Theft/ European Leisure Software Publishers Association Powers Law Suits

44 University of Sunderland MSc HIM Summary Computer Misuse Background The Computer Misuse Act Copyright, Patents, etc Summary Further Reading

45 University of Sunderland MSc HIM Overview In this lecture we have discussed computer crime. We have also looked at and gives an overview of the main pieces of legislation relating to computing: Computer Misuse Act 1990 Data Protection Act 1998


Download ppt "University of Sunderland MSc HIM Computer Legislation."

Similar presentations


Ads by Google