The IT Workplace Kaye Burton & Karen Le Rossignol Communication in an IT Environment (2000)

Slides:



Advertisements
Similar presentations
Rockingham County Public Schools Technology Acceptable Use Policy
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
POSSIBLE THREATS TO DATA
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 6. Using Networks 1 Network Hardware - Hub Hub - A hub is used when you have.
Boyertown Area School District Acceptable Use Policy.
Legislation in ICT.
Security, Privacy, and Ethics Online Computer Crimes.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
VISD Acceptable Use Policy
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
INTERNET and CODE OF CONDUCT
1.0 Computer Lab Regulations 1.1 Computer Lab Rules 1.2 User 1.3 Equipment 1.4 Data and User Security.
The Legal Framework Can you work out which slide each bullet point should go on?!
Internet Ethics. Internet Ethics Cyberspace Cyberspace is like a big city. There are libraries, universities, museums, places to have fun, and plenty.
Issues Raised by ICT.
Computer Misuse Act (1990). What is Computer Misuse Act (1990)? The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities,
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
Computer Misuse The Kingsway School. Computer Misuse Computers have improved our standards of living for most of us. Some individuals and organisations.
Section 6 Theory Software Copyright, Viruses and Hacking.
Junior High Computer Lab.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Technology in the Bellingham School District. Bellingham School District Network §Connectivity §Communication §Research Practice Responsible Use.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Crimes of Negligence or Incompetence Presented By: Lisa R. Williams.
Welcome to Ms. Dickson’s Business Class.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
The Computer Labs are a valuable tool for learning at Prattville High School While in the labs, students will Follow appropriate code of conduct. Adhere.
Computer Security 2 Keeping your computer safe. Computer Security 2 Computer Security 2 includes two lessons:  Lesson 3: Protecting yourself and your.
Monitoring Employees on Networks: Unethical or Good Business?
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Are You a Good Digital Citizen? By Abby Buchanan Image from Microsoft Clip Art.
Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and.
Code of Conduct 344 Code of Conduct 344. Code of Conduct 344 Introduction; Do you agree with the following statements? Employers need their employees.
Project 1a Evaluation Section. Using ICT Advantages and Disadvantages of using ICT.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
Ethics. Ethics are the principles and standards we use to decide how to act.
COMPUTER RULES April 26, 2011 Pamela Johnson. Elements of Digital Citizen Copyright Plagiarism Safety on the Web Safety on Computer.
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
A Discussion of Student Responsibility and the Upper Merion Area School District’s Acceptable Use Policy.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
By: Christina Anderson EDTC 630. AUP stands for Acceptable Use Policy  The AUP is an outline of procedures/rules to inform all students and employees.
Information Systems Unit 3.
Computer Ethics & Netiquette
Obj. 1.03: Discuss the security and confidentiality issues and ethics-related to data, hardware and software.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
Security and Ethics Safeguards and Codes of Conduct.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Computer Technology Timpview High School
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
Philip J. Beyer, Information Security Officer John P. Skaarup, Sr. Security Engineer Texas Education Agency Information Security.
Welcome to Challenger Computer Lab.
Welcome to the Computer Lab.
Social Issues in Computing
Social Issues in Computing
Code of conduct Year 13.
What is Information Security?
How it affects policies and procedures
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

The IT Workplace Kaye Burton & Karen Le Rossignol Communication in an IT Environment (2000)

Current status In your new job, you should familiarise yourself with your surroundings, location of people, computers and equipment. In your new job, you should familiarise yourself with your surroundings, location of people, computers and equipment. Investigate any service agreements which are in place. Investigate any service agreements which are in place. Identify what hardware, software and operating systems the organisation uses. Identify what hardware, software and operating systems the organisation uses.

Current status Large organisations generally have an equipment register which identifies the type and location of the equipment and software. Computers and peripherals are usually barcoded for identification purposes. Large organisations generally have an equipment register which identifies the type and location of the equipment and software. Computers and peripherals are usually barcoded for identification purposes.

Downloading & Installing It is important that you understand the laws governing the use of IT equipment to ensure that you are working in an ethical manner. It is important that you understand the laws governing the use of IT equipment to ensure that you are working in an ethical manner. You should never install or use software which is not properly licensed. You should never install or use software which is not properly licensed.

Downloading & Installing Be aware of the dangers in downloading material or installing software which is not from a trusted source. It may infect your computer system with a virus. Be aware of the dangers in downloading material or installing software which is not from a trusted source. It may infect your computer system with a virus. Observe copyright laws. Copying material from the Internet without permission may result in a breach of copyright – personally liable for fines. Observe copyright laws. Copying material from the Internet without permission may result in a breach of copyright – personally liable for fines.

Security Unauthorised access – hackers bypassing the security systems in place, may result violation of privacy and confidentiality of business records. Unauthorised access – hackers bypassing the security systems in place, may result violation of privacy and confidentiality of business records. Unauthorised use – Hacker deliberately enters system to use or damage it in some way, e.g. use service without paying, change or delete files etc. Unauthorised use – Hacker deliberately enters system to use or damage it in some way, e.g. use service without paying, change or delete files etc.

Personal Information Personal information stored in a database within your organisation should never be used inappropriately. Personal information stored in a database within your organisation should never be used inappropriately. Be aware your personal details (including your credit card number) could be misused. Only provide these details to reputable organisations. Be aware your personal details (including your credit card number) could be misused. Only provide these details to reputable organisations.

Be aware that is not always secure. Be aware that is not always secure. Avoid ing material which may be deemed offensive. Avoid ing material which may be deemed offensive. You should take care to only use work facilities for work business and within organisational guidelines. You should take care to only use work facilities for work business and within organisational guidelines. You should never access someone elses files or read another persons without their permission. You should never access someone elses files or read another persons without their permission.