Information Systems Unit 3.

Slides:



Advertisements
Similar presentations
Legal & Regulatory Compliance. Overview What types of information should be included? What issues or problems might there be? What benefits could be obtained?
Advertisements

Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Administrative Systems and the Law What you need to know to produce an oral presentation for Unit 7 When the presentations will take place Resources you.
Unit 4- Assignment 3 P5, P6, M2 BTEC Business Level 3.
Data Protection Information Management / Jody McKenzie.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
Training prepared by Geoff Webb Information Security & Governance Consultant Data Protection isn’t a choice, it’s the law What all CPH staff must do 17/07/2013.
Legislation in ICT.
1 Pertemuan 7 Points of Exposure Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
University of Sunderland Professionalism and Personal Skills Unit 11 Professionalism and Personal Skills Computer Legislation.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Data Protection Act.
The Data Protection Act The Data Protection Act controls how your personal information is used by organisations, businesses or the government. Everyone.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Data Protection Act. Lesson Objectives To understand the data protection act.
The Legal Framework Can you work out which slide each bullet point should go on?!
CENTRAL SCOTLAND POLICE Data Protection & Information Security Stuart Macfarlane Information Governance Unit Police Service of Scotland.
Administrative Practices Outcome 1
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Information Governance Jym Bates Head of Information Assurance.
Implementation of Security and Confidentiality in GP Practices.
1 AQA ICT AS Level © Nelson Thornes Data Protection Act.
General Purpose Packages
Health & Social Care Apprenticeships & Diploma
The Data Protection Act 1998 The Eight Principles.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
Data Protection: An enabler? David Freeland, Senior Policy Officer 23 October 2014.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
The Data Protection Act (1998). The Data Protection Act allows you to Check if any organisation keeps information about you on computer or in paper form.
Data Protection Corporate training Data Protection Act 1998 Replaces DPA 1994 EC directive 94/46/EC The Information Commissioner The courts.
Data Protection: What You Need to Know Shauna Dunlop 1 July 2015.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
Everyone has a duty to comply with the Act, including employers, employees, trainees, self-employed, manufacturers, suppliers, designers, importers of.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
LEGISLATION. DATA PROTECTION ACT (1998) The aim of this act give people the right to know what information is held about them. It also sets out rules.
Legal Implications You need to know about the following:
M ORAL AND ETHICAL ISSUES. Use and Abuse of Personal and Private Data All the information stored on Computer is governed by law or legislation. The main.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
INFORMATION GOVERNANCE AND CONFIDENTIALITY Information Governance Facilitator.
Data Protection and research Rachael Maguire Records Manager.
Session 12 Information management and security. 1 Contents Part 1: Introduction Part 2: Legal and regulatory responsibilities Part 3: Our Procedures Part.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
DATA PROTECTION ACT DATA PROTECTION ACT  Gives rights to data subjects (i.e. people who have data stored about them on a computer)  Information.
Business Ethics and Social Responsibility GCSE Business and Communication Systems Business and Communication Systems.
Computing and Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
BTEC Level 3 Unit 3: Information Systems Mr Satari Lesson 7 & 8.
Data protection—training materials [Name and details of speaker]
Sharing Personal Data ‘What you need to know’ Corporate Information Governance Team Strategic Intelligence.
Data protection act. During the second half of the 20th century, businesses, organisations and the government began using computers to store information.
Learning Intention Legislations impact on security of information
Administrative Practices Outcome 1
Data Protection Act and Other Laws
Handout 2: Data Protection and Copyright
Legislation in ICT.
Data Protection Act.
Legal and Ethical Issues
Data Protection principles
Unit 7 – Organisational Systems Security
Legal and Ethical Issues
Legislation in ICT.
Presentation transcript:

Information Systems Unit 3

Information, Laws and Ethics Demonstrate an understanding of the issues related to use of information explain the issues related to the use of information (P3) Assess how issues related to the use of information affect an organisation (M2) Legal issues, Ethical issues

Legal Issues There are many laws that affect the use of information. Three of these are the: Data Protection Act 1998 Freedom of Information Act 2000 Computer Misuse Act 1990

Data Protection Act Data Protection Act 1998 The Data Protection Act 1998 provides a framework to ensure that personal information is handled properly. It also gives individuals the right to know what information is held about them.

Data Protection Act The Act works in two ways Anyone who processes personal information must register with the DPA registrar and comply with eight principles. These make sure that personal information is: fairly and lawfully processed processed for limited purposes adequate, relevant and not excessive accurate and up to date not kept for longer than is necessary processed in line with your rights secure not transferred to other countries without adequate protection.

Data Protection Act The Act also provides individuals with important rights. These include the right to find out what personal information is held on computer and most paper records

Freedom of Information Act The Freedom of Information Act 2000 access to official information gives individuals or organisations the right to ask for information from any public authority, including central and local government, the police, the NHS and colleges and schools. 20 days to provide the information refuse if the information is exempt: eg if releasing the information could interfere with national security or damage commercial interests

Computer Misuse Act The Computer Misuse Act 1990 details three offences: unauthorised access to any computer program or data most common form of this is using someone else’s user ID and password unauthorised access with intent to commit a serious crime unauthorised modification of computer contents impairing the operation of a computer, a program or the reliability of data preventing access to any program or data Examples of this are the introduction of a virus, modifying or destroying another user’s files or changing financial or administrative data Some minor changes to tighten up this Act were introduced as a small part of the Police and Justice Act 2006. This made unauthorised acts with intent to impair the operation of a computer illegal

Work on your Assignment You must now start to look at the scenario provided at the start of this unit and apply it to the tasks Work on the relevant sections for the assignment P3 & M2 Follow the assignment writing frame Main Heading (heading size 1) - Legal, Ethical and Operational Issues [P3, M2] Heading (heading size 2) – Legal Issues Sub Heading (heading size 3) – Data Protection Act 1998 Sub Heading (heading size 3) – Freedom of Information Act 2000 Sub Heading (heading size 3) – Computer Misuse Act 1990

BREAKTIME Back at 14:45 DO NOT BE LATE

Ethical Issues Codes of Practice Many organisations will have a code of practice Clear states what uses can be made of their computing facilities main uses of computing facilities will be to support the purpose of the organisation code of practice often defines the extent to which private use of the computer system is permitted Examples of items included in a code of practice are: Use of email Use of the internet Whistle blowing

Ethical Issues Codes of Practice - Use of Email Threatening or harassment banned Spamming or unsolicited email Limited use for personal email sometimes allowed However, this is dependant on the organisation and the level of security within it All outside contact via electronic methods may not be allowed

Ethical Issues Codes of Practice - Use of the Internet Inappropriate websites Eg gambling Banned – code of practice and filtering software Personal use can be allowed – code of conduct

Ethical Issues Codes of Practice - Use of the Internet Inappropriate websites Posting to websites banned unless own organisational server where restrictions apply Whistle blowing Computer users who identify others misuse are protected – code of practice IT Administrators usually first to detect misuse

Ethical Issues Organisational Policies An organisation’s policies may have a significant effect on how it treats information operates on a need-to-know basis is likely to impose policies restricting access to information For example, it may keep its databases, files and email servers in a secure central data centre IT security and data centre staff may put in place tight controls on who can access or update this data

Ethical Issues Organisational Policies A decentralised organisation with decentralised computing is also likely to restrict access to information security restrictions could include: Access to files, databases or email limited or no direct connectivity between the organisation’s computers This could unintentionally prevent staff at one location accessing information held at another location, even though they may need access

Work on your Assignment You must now start to look at the scenario provided at the start of this unit and apply it to the tasks Work on the relevant sections for the assignment P3 & M2

Summary Today you have You have done this by Demonstrated an understanding of the issues related to use of information You have done this by explaining the legal and ethical issues related to the use of information (P3) assessing how legal and ethical issues related to the use of information affect an organisation (M2)