M ORAL AND ETHICAL ISSUES. Use and Abuse of Personal and Private Data All the information stored on Computer is governed by law or legislation. The main.

Slides:



Advertisements
Similar presentations
IT: Communication and Impacts
Advertisements

By Andy Scott, Michael Murray and Adam Kanopa
Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
Using Your Knowledge – Security Threats
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Legislation in ICT.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Data Protection Act.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
The Legal Framework Can you work out which slide each bullet point should go on?!
Issues Raised by ICT.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
General Purpose Packages
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
Health & Social Care Apprenticeships & Diploma
Disaster Recovery Strategies & criteria for evaluation of information management strategies.
IT security By Tilly Gerlack.
EU Data Protection IT Governance view Ger O’Mahony 12 th October 2011.
Emily Ansell 8K viruseshackingbackups next. Viruses A virus is harmful software that can be passed to different computers. A virus can delete and damage.
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
MIS 2000 Ethical and Legal Aspects of Information Systems Updated: June 2015.
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
What is hacking? Hacking is the use of a computer and its files with out being allowed by the owner. Hacking is used to find out peoples passwords and.
WHAT IS HACKING? Hacking is an act of controlling computer systems to get information about the system and how it works. Technically, a hacker is someone.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.
Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.
Information Systems Unit 3.
Revision Q1: Explain the term HACKING?
Chapter 4- Part3. 2 Implementing User Profiles A local user profile is automatically created at the local computer when you log on with an account for.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
Introduction to Security Dr. John P. Abraham Professor UTPA.
Legal Implications You need to know about the following:
Mr C Johnston ICT Teacher
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
Security and Ethics Safeguards and Codes of Conduct.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Computing, Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
1 Assignment 3 LO This learning outcome is all about how legal, ethical, safety and security issues affect how computers should be used. All businesses.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
Implementation of legislation (Chapter 47) By Haley Court.
Security of, privacy of and access to personal/confidential information/data.
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
ICT & Crime The Data Protection Act. Objectives Understand the need for the DPA Be able to describe the provisions of the DPA, the exceptions to the DPA.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Information Security and Privacy in HRIS
Importance of IT security ->protects data ->ensures authentication and confidentiality ->preevents data theft.
Explaining strategies to ensure compliance with workplace legislation
Legislation in ICT.
Data Protection Act.
TB2 Lesson 5 Data Protection
In Padlet Add Your Name and Question
Unit 7 – Organisational Systems Security
Legal and Ethical Issues
Privacy Act 1993 EIT, Author Gay Robertson, 2017.
Legislation in ICT.
Computer Misuse Act 1990 GCSE ICT.
Data Protection.
How it affects policies and procedures
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Presentation transcript:

M ORAL AND ETHICAL ISSUES

Use and Abuse of Personal and Private Data All the information stored on Computer is governed by law or legislation. The main act is the Data Protection Act which protects your data. The Computer Misuse Act makes it illegal for you to hack into a computer system and modify or steal any data that is stored on the computer. Employees can accidently abuse data by not updating customer details and these would then have an impact on both the customer and the business eg if the contact details have changed then they will not be able to contact the customer. This is also breaking one of the DPA principles, data must be accurate and up to date.

Employees could also overwrite or delete a file of personal data – this would also mean that private and personal data has been abused. Businesses have policies of how to name files and folders so everybody in the business will know what file it is. The abuse of personal data could include employees and other people in stealing information. This could lead to Identity Theft. Employees could damage or destroy files. This maybe done if someone is about to be made redundant. They could also leak user names and passwords. The legislation was introduced to keep personal data from being abused. The legislation does not stop people abusing personal or private data, but if they are found out can be prosecuted.

Some businesses may need to monitor employees. This doesn’t mean they are being ‘watched’ all the time, but some tasks could be critical to the running of the business and so may need to be monitored. Another reason an employee maybe monitored for an AUDIT TRAIL. POWERPOINT WILL FOLLOW Monitoring of Individuals by Organisations