Legal Issues Legal issues include copyright / intellectual property infringements, libel / defamation, disability discrimination and data protection. Any.

Slides:



Advertisements
Similar presentations
A Guide to INCTR s Portal Enhancing international communication in the service of global cancer control.
Advertisements

Enabling Secure Internet Access with ISA Server
Meet Grace! Grace is our newest team member! She is here to make it easier to keep track of all your HR related documents digitally. Grace will always.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Web Proxy Server Anagh Pathak Jesus Cervantes Henry Tjhen Luis Luna.
Note: See the text itself for full citations. Information Technology Project Management, Sixth Edition.
ONLINE SHOPPING BY ROMIL SOMAIYA FOR CLASH GROUP community LEICESTER ARTHERITIS SELF HELP ©
Managing and Avoiding Junkmail. Junk  Where does Junk Mail come from? People with whom you do business  Pepsi Friends of people with whom you.
Designing Security In Web Applications Andrew Tomkowiak 10/8/2013 UW-Platteville Software Engineering Department
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
The Legal Framework Can you work out which slide each bullet point should go on?!
Standards and Guidelines for Web Page Publishing December 9, 2009.
 Internet vs WWW  Pages vs Sites  How the Internet Works  Getting a Web Presence.
Security Threats Connecting Computers Copyright Law & Ethics Storage & Memory Computer System
Staying Safe Online Keep your Information Secure.
© 2011 Delmar, Cengage Learning Chapter 7 Managing a Web Server and Files.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
5 Chapter Five Web Servers. 5 Chapter Objectives Learn about the Microsoft Personal Web Server Software Learn how to improve Web site performance Learn.
Recordkeeping for Good Governance Toolkit Digital Recordkeeping Guidance Funafuti, Tuvalu – June 2013.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Chapter 5 HTTP Request Headers. Content 1.Request headers 2.Reading Request Headers 3.Making a Table of All Request Headers 4.Sending Compressed Web Pages.
Tunis International Centre for Environmental Technologies Small Seminar on Networking Technology Information Centers UNFCCC secretariat offices Bonn, Germany.
Database-Driven Web Sites, Second Edition1 Chapter 5 WEB SERVERS.
COMP3121 E-Commerce Technologies Richard Henson University of Worcester November 2011.
Karen Herter (HMG) Mike Langley (DGS) April 15, 2008 Portfolio Manager for California State Buildings Meeting the Requirements of Executive Order S
Computer Security 2 Keeping your computer safe. Computer Security 2 Computer Security 2 includes two lessons:  Lesson 3: Protecting yourself and your.
Data Protection Act AS Module Heathcote Ch. 12.
Web Browser-Parental Control Armenda Fourte’ July 27, 2007.
© Copyright Licensing Agency Limited 2007 CLA Licence for NHS England.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
Module 8 : Configuration II Jong S. Bok
Internet Safety Internet Safety LPM
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Web Security Lesson Summary ●Overview of Web and security vulnerabilities ●Cross Site Scripting ●Cross Site Request Forgery ●SQL Injection.
Society & Computers PowerPoint
The Internet. Important Terms Network Network Internet Internet WWW (World Wide Web) WWW (World Wide Web) Web page Web page Web site Web site Browser.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
Chapter 11 Data Input and Output. Input Data Capture Forms Data can be collected using a data capture form or questionnaire that is printed on a piece.
Web Design Terminology Unit 2 STEM. 1. Accessibility – a web page or site that address the users limitations or disabilities 2. Active server page (ASP)
DATA PROTECTION ACT DATA PROTECTION ACT  Gives rights to data subjects (i.e. people who have data stored about them on a computer)  Information.
ICT Facilities in State Secondary Schools. This Presentation Computer Labs Software Lab availability Network Login Internet Connectivity Filtering .
Computer Security Sample security policy Dr Alexei Vernitski.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Scientific data storage: How are computers involved in the following?
Maintaining and Updating Windows Server 2008 Lesson 8.
Windows Vista Configuration MCTS : Productivity Applications.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
OPS Requirements Specification and Analysis Dustin Larson Bryan Campbell Charles Sears.
Architecture Review 10/11/2004
Acceptable Use Policy (Draft)
Handling Personal Data
Wireless Network Security
ICT meeting Business needs
Data Protection Legislation
Technology: Legal and Ethical Issues
Database Driven Websites
Section 14.1 Section 14.2 Identify the technical needs of a Web server
Configuring Internet-related services
Managing a Web Server and Files
Part 2 Setting up a web server the easy way
Digital Stewardship Curriculum
BMV Leisure & Shaftesbury Luxury Lodges GDPR Statement
R082 Creating digital graphics
Presentation transcript:

Legal Issues Legal issues include copyright / intellectual property infringements, libel / defamation, disability discrimination and data protection. Any statement of copyright (eg to results / logos on results.pfd files etc) should be made to the user (the GP) in the small print / terms and conditions of website use. Also included in the terms and conditions should be information for the user on the intellectual property of the content, how their data is used / stored / disposed of, whether cookies / web statistics are used, and how much information they log, any virus protection offered to the user (eg has the.pdf sent back to them been scanned?) and (if necessary) the linking policy of the site (if any outside links are used, need a disclaimer to state that content is outside webmaster’s control).

Legal Issues cont. Important parts of the Data Protection Act to consider are: –Information that you have on or collect through the site must only be used for the purpose for which it was obtained. –You should specify the purpose on the site and, where possible, give users the opportunity to ‘opt out’ of the data collection. –You should not collect or store more personal data than you need for the specified purpose. –All personal information should be accurate, up-to-date and available to the individual on request. The Disability Discrimination Act requires that “reasonable adjustments” are made to make the site accessible for the widest range of people, for example the learning disabled, the physically impaired, or those with less computing experience. This isn’t hugely important when regarding only GPs, as they can quite safely be assumed to have at least basic computing skills.

Social Issues These issues, as far as I can work out, are to do with the sectors of society being addressed, and making sure that all are included equally. This crosses over a little with ethical issues.

Ethical Issues Ethical issues involves what documentation is non-sensitive enough to be kept on the server (if any), and making sure that all the legal issues are considered in the acquiring and handling of the data. All ethical issues in reality have to go through the National Research Ethics Service, whose guidelines can be found here: yLink.aspx?alId=4798

Information Collection for Specification This could be to do with presenting to the client, in which case the information will be collected by all members of the group, and collated into one specification. It could also be to do with how information will be collected within the system itself, in which case it will be through user input (in specified file types, according to the inner workings of the statistical analysis modules), then the output of the modules, with (so far as we decided at client meetings) as little residual data collected on the server as possible.

Network Diagram 1

Design Contraints The controller needs to know what modules are available, and be able to (extensibly) report this to the user for them to choose from. The entire system needs to be outsourced to an external server/cluster. Starting small, it needs to be monitored in case business grows, requiring another server / more servers to be added. Presentation to the user, in whatever format, needs to be sure not to get stuck in spam filters.

Design Idea 1 The design as drawn at the client meeting. All held on external server.

Design Idea 2 Statistical analysis modules held externally to the server. Saves space, much less processing to be done on server saving money, but more security issues in sending sensitive data to an outside processor.

Design Idea 3 With user login system, and the addition of an updater. Updater checks the available modules from a module bank where all are held (on the server/cluster), on a call from the controller, returning a list of the available modules, with descriptions, for the user to pick from.

Design Idea 4 As design 3, but with creation of presentation outsourced.

Gantt Chart