Unit 4- Assignment 3 P5, P6, M2 BTEC Business Level 3.

Slides:



Advertisements
Similar presentations
Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Advertisements

Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
The Data Protection (Jersey) Law 2005.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
A01 - Safe Working Practices - Safety Patrol UK Safety Patrol UK are an organisation that travels to businesses to give presentations and advice on using.
Higher Administration and IT Administrative Practices.
Health and Safety Legislation
2. 11 Rights of employers and employees Rights of employer and employees Rights and responsibilities  Both employees and employers have legal rights.
Network security policy: best practices
The laws Organizations are covered by lots of different laws
The Legal Framework Can you work out which slide each bullet point should go on?!
Computer Misuse Act (1990). What is Computer Misuse Act (1990)? The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities,
Administrative Practices Outcome 1
Higher Administration
EthicsEthics, Rules, and LawsRulesLaws Using the computer appropriat ely.
Handling information 14 Standard.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
G041: Lecture 16 Section B Revision Questions
Law Additional Exercise ANSWERS. Question #1 (a) Any one of: gain unauthorised access (1st) to computer material (1) gain (unauthorised) access to computer.
13.6 Legal Aspects Corporate IT Security Policy. Objectives Understand the need for a corporate information technology security policy and its role within.
The Data Protection Act By Ian Hughes Data should not be kept longer than is necessary for the specified purpose. Data processing should meet the.
Information Security Training for People who Supervise Computer Users.
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
Everyone has a duty to comply with the Act, including employers, employees, trainees, self-employed, manufacturers, suppliers, designers, importers of.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
LEGISLATION. DATA PROTECTION ACT (1998) The aim of this act give people the right to know what information is held about them. It also sets out rules.
Information Systems Unit 3.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
Training for Medication Assistants Module One What is delegation? What is Medication Assistant Training?
? Moral principles of right and wrong Used by individuals/organisations To guide behaviour.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Session 12 Information management and security. 1 Contents Part 1: Introduction Part 2: Legal and regulatory responsibilities Part 3: Our Procedures Part.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
Operational Issues. Operational Changes It is important to organisations to ensure that they abide by the Law when caring for the safety of their employees,
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Implementation of legislation (Chapter 47) By Haley Court.
Business Ethics and Social Responsibility GCSE Business and Communication Systems Business and Communication Systems.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
Learning Intention Security of Information. Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption.
Scientific data storage: How are computers involved in the following?
Clark Holt Limited (Co. No ), Hardwick House, Prospect Place, Swindon, SN1 3LJ Authorised and regulated by the Solicitors Regulation.
Welcome to the ICT Department Unit 3_5 Security Policies.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
Learning Intention Legislations impact on security of information
Explaining strategies to ensure compliance with workplace legislation
WORKPLACE LEGISLATION
PowerPoint presentation
Administrative Practices Outcome 1
Data Protection Act and Other Laws
Understand mechanisms to control organisational IT security
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Unit 7 – Organisational Systems Security
Legal and Ethical Issues
Unit 7 – Organisational Systems Security
Legal and Ethical Issues
Unit 3 Information Systems
Information management and communication
General Data Protection Regulations 2018
Privacy Act 1993 EIT, Author Gay Robertson, 2017.
Understand mechanisms to control organisational IT security
How it affects policies and procedures
Standard 6: Educational Leaders understand the social, legal, and ethical issues related to technology and model responsible decision-making related to.
Handling information 14 Standard.
Presentation transcript:

Unit 4- Assignment 3 P5, P6, M2 BTEC Business Level 3

Legal Issues in Business Data Protection Act 1998 Freedom of Information Act 2000 Computer Misuse Act 1990 Unauthorised access to computer materials Unauthorised access to computer systems with intent to commit another offence Unauthorised modifications of computer material

Legal Issues (in brief) Data Protection Act 1998- this act ensures information held about people is used correctly. There are 8 different criteria that a business must follow (see pg 139) Freedom of Information Act 2000- this gives individuals the right to request information about them that is held by a public authority- e.g. You have the right to see your medical records. Computer Misuse Act 1990- this act makes it illegal to carry out certain activities on a computer, e.g. Hacking, misusing software, gaining access to secure files.

Ethical Issues in Business Use of Email Internet Whistle Blowing Organisational Policies Information Ownership

Ethical Issues Email- a code of practice is common in businesses- this gives employees guidelines about appropriate use of email. Internet- similar to email- employees are guided as to what they can and cannot do when using the internet. Whistle Blowing- this is when an employee raises concerns about business practice, these concerns can be raised to management or sometimes the press. Organisational policies- business set policies regarding information to ensure they use information ethically. Information ownership- employees are responsible for the information they have. E.g staff information.

P5- Explain how a business follows the ethical and legal issues associated with business information Explain each issue and then explain how a business ensures it follows these policies, this could be through staff training, through staff policies, through routine checking and reprimanding staff if necessary Legal issues should include Data Protection Act, Freedom of Information Act, Computer Misuse Act 1990. Explain how the organisation follows these acts, what practices are put into place to ensure the business follows these. Ethical information should include; use of email, internet, whistle blowing, organisational policies. Explain how theses issues have an effect on how the company produces information/ the information they provide.

Operational Issues Security of Information Backups Health and Safety Organisational Policies Costs

Operational Issues Security of Information- This ensures digital information, records and knowledge management is kept secure by a business. Including confidential information left on the train!! Backups- a business needs to minimise the risk of loosing vital information using a reliable backup system. This should be common practice in any business Health and Safety- IT equipment must be used safely, this requires a number of criteria for staff who are required to spend a large amount of time using IT equipment. Organisational Policies- these are individual business policies that relate to using information. Cost- this needs to be considered, businesses may see the benefit of implementing some or all of these measures but they do come at a cost, either additional resources needed or the cost of development.

P6- Explain the operational issues in relation to the information a business uses. Using the same business explain which operational issues they follow and how these are implemented in the business.

M2- Analyse the legal, ethical and operational issues in relation to the use of business information. You can incorporate this into P5 and P6, you need to explain how the company will deal with each of these issues – What effects will it have on the business? What action will it cause the business to take?