Protecting Companies from Legal Issues

Document Sample
Protecting Companies from Legal Issues Powered By Docstoc
					                     Data Security and legal issues
All – Will
understand that
personal data is
stored by                           Starter :- 5 Minutes
companies and
needs protecting       Make a list of all the companies and organisations
                             that you believe holds data on you.
Most – Will
understand some
of the ways that          Write down what data you think they hold.
data can be
protected and
evidence this.        For Example
                             Vodaphone – Name, Address, Data of Birth,
Some – Will be
able to talk about
                      Phone number, Bank details.
how personal
data can be
protected along
with Legal Issues
                       Starter :- 5 Minutes
Make a list of all the companies and organisations that you believe
                          holds data on you.

              Write down what data you think they hold
For Example
         Medical history                                    Grades




                                                     Phone Number
                     Data Security and legal issues
All – Will
understand that
personal data is
                                      Objectives
stored by
companies and          To work towards the P7 and M4 unit 2 criteria
needs protecting

Most – Will            Have an understanding of the Possible Data
understand some       Security and legal issues when using a computer.
of the ways that
data can be
protected and         Describe how Hardware, software and Data can
evidence this.
                      be protected
Some – Will be
able to talk about
how personal
data can be
protected along
with Legal Issues
                     Data Security and legal issues
All – Will
understand that
personal data is
stored by
companies and
needs protecting

Most – Will
understand some
of the ways that
data can be
protected and
evidence this.

Some – Will be
able to talk about
how personal
data can be
protected along
with Legal Issues
                     Data Security and legal issues
                     Protecting Hardware, Software and Data
All – Will
understand that
personal data is                                Hacking
stored by
companies and
needs protecting                           Hacking is where an unauthorised
                                           person uses a network, Internet or
Most – Will                                modem connection to gain access past
understand some
of the ways that
                                           security passwords or other security to
data can be                                see data stored on another computer.
protected and
evidence this.

Some – Will be
able to talk about
how personal                                                 Firewall
data can be                                   A security tool that controls traffic
protected along                               too and from a network.
with Legal Issues
                     Data Security and legal issues
                     Protecting Hardware, Software and Data
All – Will
understand that
personal data is                                Spyware
stored by
companies and
needs protecting                        Spyware is computer software that is
                                        installed secretly on a personal
Most – Will                             computer to collect information about
understand some                         a user, their computer or browsing
of the ways that
                                        habits without the user's Permission
data can be
protected and
evidence this.

Some – Will be                                             Anti - Spyware
able to talk about
how personal
                                                 Software installed on an end user
data can be                                      workstation (computer) to detect
protected along                                  and remove Spyware and Adware
with Legal Issues
                     Data Security and legal issues
                     Protecting Hardware, Software and Data
All – Will
understand that
personal data is                               Data Theft
stored by
companies and
needs protecting                                  Data theft is when data is
                                                  taken without the owners
Most – Will                                       consent from a computer or
understand some
of the ways that
                                                  storage device
data can be
protected and
evidence this.
                                                Passwords/Physical Security
Some – Will be
                                                This can be used to stop people
able to talk about
how personal                                    physically taking the data from the
data can be                                     workstation (Computer) or the
protected along                                 workstation its self
with Legal Issues
                     Data Security and legal issues
                     Protecting Hardware, Software and Data
All – Will
understand that
personal data is                          Computer Crash
stored by
companies and
needs protecting                             Computer Crash, this is when a
                                             computer fails causing a loss of
Most – Will
understand some                              data, this could be done by
of the ways that                             accident or on purpose
data can be
protected and
evidence this.
                                                Back up
Some – Will be
                                                Copying the information onto another
able to talk about
how personal                                    medium (storage area) regularly,
data can be                                     storing this in another area.
protected along
with Legal Issues
                     Data Security and legal issues
                     Protecting Hardware, Software and Data
All – Will
understand that
personal data is                                Viruses
stored by
companies and
needs protecting                              Viruses are programs written by
                                              people and designed to cause
Most – Will                                   nuisance or damage to computers or
understand some
of the ways that
                                              their files.
data can be
protected and
evidence this.

Some – Will be
                                                             Anti - Virus
able to talk about                             Software installed on an end user
how personal                                   workstation (computer) to detect and
data can be                                    remove Viruses, Trojan horses and
protected along                                worms from files and e-mails
with Legal Issues
                     Data Security and legal issues
                     Protecting Hardware, Software and Data
All – Will
understand that
personal data is     Task 1(5 minutes)
stored by
companies and
needs protecting     Using the Cards Provided in groups of 2 arrange them to show

Most – Will
understand some
of the ways that
data can be
protected and
                           Name of                                     Possible
evidence this.                                  Description
                            threat                                    Protection
Some – Will be
able to talk about
how personal
data can be
protected along         Be ready to talk about your answer if asked
with Legal Issues
                     Data Security and legal issues
All – Will            Along side physical protection there is also deterrents e.g.
understand that           Data Protection act and the Computer misuse act
personal data is
stored by
companies and                      All your Personal Data – Going to the highest
needs protecting                   bidder.
                                       Buy today and get Medical History Free of
Most – Will                                            Charge
understand some
of the ways that
data can be                       Sign up to day and learn how to change your
protected and                     grades increase your bank account and change
evidence this.                    your friends personal data

Some – Will be
able to talk about   TASK 2 - 20 Minute activity – Research and answer the following
how personal         Questions.
data can be
protected along      Be ready to feedback the information found to the group in a 10
with Legal Issues    minute plenary at the end
                     Data Security and legal issues
                     Protecting Hardware, Software and Data
All – Will
understand that                                    Plenary
personal data is
stored by            What is the Data Protection Act
companies and        A law designed to protect personal data stored on computer.
needs protecting
                     Who is the Information Commissioner
                     The official who supervises the enforcement of the Data Protection
Most – Will
                     Act.
understand some
of the ways that     Who is the data controller
data can be          The nominated person in a company who applies to the data
protected and        commissioner for permission to store and use personal data.
evidence this.
                     Who are the data subject
Some – Will be       The person about whom data is stored.
able to talk about
how personal         Who are the data users
data can be          Anyone who uses the personal data as part of their job.
protected along
with Legal Issues    What is personal data
                     Information about a particular person.
                     Data Security and legal issues
                     Protecting Hardware, Software and Data
All – Will
understand that                                 Plenary
personal data is
stored by
companies and         Computer misuse act
needs protecting      The Computer Misuse Act 1990 was designed to protect
                      the integrity of computer systems by deterring the
Most – Will           activities of hackers. It created three new offences:
understand some
of the ways that
data can be
                      1.Unauthorised access to computer programs or data
protected and
evidence this.
                      2.Unauthorised access with a further criminal intent
Some – Will be
                      3.Unauthorised modification of computer material
able to talk about
how personal
data can be
protected along
with Legal Issues
                     Data Security and legal issues
                     Protecting Hardware, Software and Data
All – Will
understand that                                  Plenary
personal data is
stored by
companies and         Can you find and list all eight points of the data protection act
needs protecting
                      1.   processed fairly and lawfully
Most – Will           2.   used for the lawful purpose it was collected for
understand some       3.   adequate and relevant to purpose collected for
of the ways that
data can be
                      4.   kept accurate and up-to-date
protected and         5.   kept no longer than necessary
evidence this.        6.   processed within the rights of the data subjects
                      7.   kept secure
Some – Will be        8.   kept only within the EEC
able to talk about
how personal
data can be
protected along
with Legal Issues
 The following slides should be
made in to cards for the students
           to arrange
                 Firewall
                 A security tool that controls
                 traffic too and from a network.
    Hacking
                 Back up
                 Copying the information onto another
                 medium (storage area) regularly,
                 storing this in another area.
Computer Crash

                    this is when a computer fails causing
                    a loss of data, this could be done by
                    accident or on purpose


                  Is where an unauthorised person uses a
                  network, Internet or modem connection to
                  gain access past security passwords or other
                  security to see data stored on another
                  computer.
             Anti - Virus
             Software installed on an end user
             workstation (computer) to detect and
             remove Viruses, Trojan horses and
 Virus       worms from files and e-mails

             are programs written by people and designed
             to cause nuisance or damage to computers or
             their files.



             Passwords/physical security
             This can be used to stop people
Data Theft   physically taking the data from the
             workstation (Computer) or the
             workstation its self


                 is when data is taken without the
                 owners consent from a computer or
                 storage device
                          Anti - Spyware
                 Software installed on an end user
                 workstation (computer) to detect
                 and remove Spyware and Adware
   Spyware

                 is computer software that is installed secretly
                 on a personal computer to collect information
                 about a user, their computer or browsing
                 habits without the user's Permission


Name of Threat
                         Description of Threat




                      Protection against Threat

				
DOCUMENT INFO
Description: Protecting Companies from Legal Issues document sample