European Computer Driving Licence Syllabus version 5.0

Slides:



Advertisements
Similar presentations
Administrative Systems and the Law What you need to know to produce an oral presentation for Unit 7 When the presentations will take place Resources you.
Advertisements

Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
Legislation in ICT.
University of Sunderland Professionalism and Personal Skills Unit 11 Professionalism and Personal Skills Computer Legislation.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Data Protection Act. Lesson Objectives To understand the data protection act.
The Legal Framework Can you work out which slide each bullet point should go on?!
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Data Security GCSE ICT.
1 AQA ICT AS Level © Nelson Thornes Data Protection Act.
General Purpose Packages
Computers, the law and ethics  Lesson Objective: Understand some of the legal & ethical issues in developing computer systems  Learning Outcome: Know.
Pass ECDL41 European Computer Driving Licence Module 1 – Concepts of IT Chapter 1.6 – Legal Issues and Security.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
The Data Protection Act (1998). The Data Protection Act allows you to Check if any organisation keeps information about you on computer or in paper form.
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Everyone has a duty to comply with the Act, including employers, employees, trainees, self-employed, manufacturers, suppliers, designers, importers of.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
The Data Protection Act What the Act covers The misuse of personal data by organisations and businesses.
IT tools to communicate By Suleman Kalam. Podcast What is Podcasts? A podcasts is a downloadable media file which can be downloaded into many electronic.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Data Protection Philip Reed. Introduction What is data? What is data protection? Who needs your data? Who wants your data? Who does not need your data?
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Business Ethics and Social Responsibility GCSE Business and Communication Systems Business and Communication Systems.
Computing and Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
Safety & Security By Kieran Bolko. Laws The main law that you should be taking note of is the Data Protection Act 1998 – this law sets rules for the electronic.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
Data protection act. During the second half of the 20th century, businesses, organisations and the government began using computers to store information.
The Data Protection Act 1998
The Data Protection Act 1998
Learning Intention Legislations impact on security of information
Data Protection GCSE ICT Mrs N Steventon-2005.
Handling Personal Data
Handout 2: Data Protection and Copyright
Legislation in ICT.
Data Protection Act.
How to build a good reputation online
Data Protection Act.
The Data Protection Act 1998
Anonymised information
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Computer Ethics.
BCT 2.00 Analyze Technology Issues
The Data Protection Act & ICT Law
Pam Millington Area 4 co-ordinator
Security of People, Property and Information
Data Protection Act.
Unit 7 – Organisational Systems Security
Unit 1 Effective Communication in Health and Social Care
Legal and Ethical Issues
Part 3.
REDCap and Data Governance
What is the Data Protection Act (DPA)? 1998
Legislation in ICT.
What is Information Security?
How it affects policies and procedures
Communicating in the IT Industry
G061 - Network Security.
Presentation transcript:

European Computer Driving Licence Syllabus version 5.0 Module 1 – Concepts of ICT Chapter 6 – Legal issues and security Module 1 Concepts of ICT Chapter 2 Hardware

Copyright Computer software is copyright material Covered by Copyright, Designs and Patents Act 1988 You don’t ‘buy’ the software You pay for a licence to install and use the software on one machine – see the End User Licence Agreement (EULA) You are breaking the law if you make a copy of software and give/sell it to someone else Module 1 Concepts of ICT Chapter 2 Hardware

Personal privacy Right to privacy is a fundamental human right The advance in computerised technology makes it easier to store and share information See what can go wrong with some case studies! Module 1 Concepts of ICT Chapter 2 Hardware

The Data Protection Act 1998 Sets rules for the processing of personal information Applies to paper records as well as computerised records Intended to protect the privacy of individuals Full details can be found at www.dataprotection.gov.uk Module 1 Concepts of ICT Chapter 2 Hardware

Data protection principles There are eight enforceable principles. Data must be: fairly and lawfully processed obtained for specific purposes only adequate, relevant and not excessive accurate and up-to-date kept no longer than necessary processed in accordance with the data subject’s rights cannot be transferred to other countries without similar protection kept safe and secure from outsiders Module 1 Concepts of ICT Chapter 2 Hardware

Data security Confidential data must be kept securely Passwords Use access controls such as a user ID and password Use access levels so only authorised personnel should have access to confidential data Passwords Do not write them down Do not tell them to anyone Do not use obvious words/names Change them regularly Module 1 Concepts of ICT Chapter 2 Hardware

Backing up data You should always backup your data on a regular basis Keep a second copy of important files on another storage device and store it separately from your PC Your data is much more valuable than your computer equipment You can protect your PC equipment with insurance, but this will not replace your data! Module 1 Concepts of ICT Chapter 2 Hardware

Computer viruses Viruses are small programs which are designed to cause damage to a computer or to whole networks Your PC can be infected with a virus by sharing files on disks/CDs, viewing/downloading files on the web and from e-mail attachments The only protection against this is running up-to-date anti-virus software on your machine Module 1 Concepts of ICT Chapter 2 Hardware

Protection against viruses Scan files for viruses before opening them Make sure you keep your anti-virus software up to date – hundreds of viruses are released every month Install a firewall to keep hackers away from your personal data Module 1 Concepts of ICT Chapter 2 Hardware