Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,

Slides:



Advertisements
Similar presentations
Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Advertisements

Unit 4- Assignment 3 P5, P6, M2 BTEC Business Level 3.
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Legislation in ICT.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Data Protection Act.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Software Development Unit 2 Databases What is a database? A collection of data organised in a manner that allows access, retrieval and use of that data.
Data Protection Overview
The Data Protection Act
Data Protection Act. Lesson Objectives To understand the data protection act.
The Legal Framework Can you work out which slide each bullet point should go on?!
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
1 AQA ICT AS Level © Nelson Thornes Data Protection Act.
General Purpose Packages
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
Computer Security By Charlotte Foster 8P Computer viruses are small software programs that are designed to spread from one computer to another and to.
Elma Graham. To understand what data protection is To reflect on how data protection affects you To consider how you would safeguard the data of others.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
Data Protection Act AS Module Heathcote Ch. 12.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
The Data Protection Act (1998). The Data Protection Act allows you to Check if any organisation keeps information about you on computer or in paper form.
What is personal data? Personal data is data about an individual which they consider to be private.
The Data Protection Act By Ian Hughes Data should not be kept longer than is necessary for the specified purpose. Data processing should meet the.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
Data Security.
The Data Protection Act What the Act covers The misuse of personal data by organisations and businesses.
LEGISLATION. DATA PROTECTION ACT (1998) The aim of this act give people the right to know what information is held about them. It also sets out rules.
Data Protection Act (1998).
Legal Implications You need to know about the following:
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Data Protection Act The Kingsway School. What is Covered? The act was made law in 1984 and was updated in It covers the storage of personal data.
DATA PROTECTION ACT DATA PROTECTION ACT  Gives rights to data subjects (i.e. people who have data stored about them on a computer)  Information.
1 AQA ICT AS Level © Nelson Thornes Safety and security Chip and Pin.
ANS File Security Chapter # 29 ( Prepared by : Mazhar Javed ) 1 Data Security “Protection against loss, corruption of, or unauthorized access of data”
8 – Protecting Data and Security
The Data Protection Act 1998
The Data Protection Act 1998
Lesson 3 Protecting ICT systems Data Protection Act 1998.
Handling Personal Data
Legislation in ICT.
Data Protection Act.
Data Protection Act.
The Data Protection Act 1998
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Data Protection Legislation
Computer Ethics.
The Data Protection Act & ICT Law
Data Protection Act.
Legislation in ICT.
G061 - Network Security.
Presentation transcript:

Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted, stolen or lost in many different ways, and it is essential that these are prevented.

Questions to consider Why do we need to protect data? How might we protect it?

What do we need to protect data against?

How might we protect it?

Corruption or hardware breakdown Mistakes by users Unauthorised access Theft of equipment Fire, floods, etc Viruses Intentional damage What do we need to protect data against?

How might we protect it? Regular backups Passwords Encryption Verification and validation Log of users Virus checking Physical security

Hacking This is the breaking of codes and passwords to gain unauthorised entry into computer systems. Write a report for the Head teacher on the implication of hacking for the school. Use the WWW and other sources to investigate the issues.

How can computer crime be prevented? No networking Dedicated phone lines Choice of passwords Check of attempts to access Record of users/times

Viruses What is a virus? What do they do? How do they spread? What effect does the Internet have? How can they be removed? How can they be prevented?

Viruses What is a virus? They are small programs which are written to affect a computer’s operating system without the user knowing they are there. What do they do? They may delete files, make other programs to strange things, display silly messages on the screen, etc. How do they spread? They copy themselves onto disks and across networks. What effect does the Internet have? Viruses can attach themselves to s or web pages for much more efficient transmission than before. How can they be removed? Programs are available which check for known viruses automatically and alert the user who can then run a virus removal program. How can they be prevented? They can’t, but people who create them can be prosecuted and users can minimise the problem by keeping their virus checking software up-to-date.

Data Protection Principles Personal data must: be obtained fairly and processed lawfully be held for specified purposes not be used for any reason incompatible with its original purpose be relevant and adequate for the purpose be accurate and up-to-date not be kept longer than necessary be made available to the individual concerned and provision made for correction be kept secure

Data protection people Data user is the person or organisation which collects/stores personal data for specific purposes Data subject is a person whose data is collected/stored Data Protection Registrar keeps the records of what data users are registered to collect data for.

Data Protection exemptions: no need to register Domestic/recreational data Data which is public by law National Security data Payroll, pensions, accounts Private members’ clubs Mailing list (as long as subject has given permission to be included)

Data Protection exemptions: may disclose without purpose being registered To subject or with consent of subject To employees of data user to carry out registered purposes Prevention/detection of crime. Legal purposes Tax and national security In emergency, for medical purposes

Data Protection exemptions: data purposes with no subject access rights Tax, prevention/detection of crime Statistics/research Backup Incriminating for data user