data security and legal issues starter :- 5 minutes make a list of all the companies and...

18
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what data you think they hold. For Example Vodaphone – Name, Address, Data of Birth, Phone number, Bank details. All – Will understand that personal data is stored by companies and needs protecting Most – Will understand some of the ways that data can be protected and evidence this. Some – Will be able to talk about how personal

Upload: emma-peckham

Post on 15-Jan-2016

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what

Data Security and legal issues

Starter :- 5 MinutesMake a list of all the companies and organisations

that you believe holds data on you.

Write down what data you think they hold.

For ExampleVodaphone – Name, Address, Data of Birth,

Phone number, Bank details.

All – Will understand that personal data is stored by companies and needs protecting

Most – Will understand some of the ways that data can be protected and evidence this.

Some – Will be able to talk about how personal data can be protected along with Legal Issues

Page 2: Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what

Starter :- 5 MinutesMake a list of all the companies and organisations that you believe

holds data on you.

Write down what data you think they holdFor Example

Name

Age

Address

Bank Details

Phone Number

Medical history Grades

Pictures

Parent details

Page 3: Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what

Data Security and legal issues

Objectives

To work towards the P7 and M4 unit 2 criteria

Have an understanding of the Possible Data Security and legal issues when using a computer.

Describe how Hardware, software and Data can be protected

All – Will understand that personal data is stored by companies and needs protecting

Most – Will understand some of the ways that data can be protected and evidence this.

Some – Will be able to talk about how personal data can be protected along with Legal Issues

Page 4: Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what

Data Security and legal issuesAll – Will understand that personal data is stored by companies and needs protecting

Most – Will understand some of the ways that data can be protected and evidence this.

Some – Will be able to talk about how personal data can be protected along with Legal Issues

Page 5: Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what

Data Security and legal issuesProtecting Hardware, Software and Data

Hacking

Hacking is where an unauthorised person uses a network, Internet or modem connection to gain access past security passwords or other security to see data stored on another computer.

FirewallA security tool that controls traffic too and from a network.

All – Will understand that personal data is stored by companies and needs protecting

Most – Will understand some of the ways that data can be protected and evidence this.

Some – Will be able to talk about how personal data can be protected along with Legal Issues

Page 6: Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what

Data Security and legal issuesProtecting Hardware, Software and Data

Spyware

Spyware is computer software that is installed secretly on a personal computer to collect information about a user, their computer or browsing habits without the user's Permission

Anti - SpywareSoftware installed on an end user workstation (computer) to detect and remove Spyware and Adware

All – Will understand that personal data is stored by companies and needs protecting

Most – Will understand some of the ways that data can be protected and evidence this.

Some – Will be able to talk about how personal data can be protected along with Legal Issues

Page 7: Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what

Data Security and legal issuesProtecting Hardware, Software and Data

Data Theft

Data theft is when data is taken without the owners consent from a computer or storage device

Passwords/Physical SecurityThis can be used to stop people physically taking the data from the workstation (Computer) or the workstation its self

All – Will understand that personal data is stored by companies and needs protecting

Most – Will understand some of the ways that data can be protected and evidence this.

Some – Will be able to talk about how personal data can be protected along with Legal Issues

Page 8: Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what

Data Security and legal issuesProtecting Hardware, Software and Data

Computer Crash

Computer Crash, this is when a computer fails causing a loss of data, this could be done by accident or on purpose

Back upCopying the information onto another medium (storage area) regularly, storing this in another area.

All – Will understand that personal data is stored by companies and needs protecting

Most – Will understand some of the ways that data can be protected and evidence this.

Some – Will be able to talk about how personal data can be protected along with Legal Issues

Page 9: Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what

Data Security and legal issuesProtecting Hardware, Software and Data

Viruses

Viruses are programs written by people and designed to cause nuisance or damage to computers or their files.

Anti - VirusSoftware installed on an end user workstation (computer) to detect and remove Viruses, Trojan horses and worms from files and e-mails

All – Will understand that personal data is stored by companies and needs protecting

Most – Will understand some of the ways that data can be protected and evidence this.

Some – Will be able to talk about how personal data can be protected along with Legal Issues

Page 10: Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what

Data Security and legal issuesProtecting Hardware, Software and Data

Task 1(5 minutes)

Using the Cards Provided in groups of 2 arrange them to show

Name of threat Description Possible

Protection

All – Will understand that personal data is stored by companies and needs protecting

Most – Will understand some of the ways that data can be protected and evidence this.

Some – Will be able to talk about how personal data can be protected along with Legal Issues

Be ready to talk about your answer if asked

Page 11: Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what

Data Security and legal issuesAlong side physical protection there is also deterrents e.g.

Data Protection act and the Computer misuse act

TASK 2 - 20 Minute activity – Research and answer the following Questions.

Be ready to feedback the information found to the group in a 10 minute plenary at the end

All – Will understand that personal data is stored by companies and needs protecting

Most – Will understand some of the ways that data can be protected and evidence this.

Some – Will be able to talk about how personal data can be protected along with Legal Issues

All your Personal Data – Going to the highest bidder.

Buy today and get Medical History Free of Charge

Sign up to day and learn how to change your grades increase your bank account and change your friends personal data

Page 12: Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what

Data Security and legal issuesProtecting Hardware, Software and Data

PlenaryAll – Will understand that personal data is stored by companies and needs protecting

Most – Will understand some of the ways that data can be protected and evidence this.

Some – Will be able to talk about how personal data can be protected along with Legal Issues

What is the Data Protection ActA law designed to protect personal data stored on computer.

Who is the Information CommissionerThe official who supervises the enforcement of the Data Protection Act.

Who is the data controllerThe nominated person in a company who applies to the data commissioner for permission to store and use personal data.

Who are the data subjectThe person about whom data is stored.

Who are the data usersAnyone who uses the personal data as part of their job.

What is personal dataInformation about a particular person.

Page 13: Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what

Data Security and legal issuesProtecting Hardware, Software and Data

PlenaryAll – Will understand that personal data is stored by companies and needs protecting

Most – Will understand some of the ways that data can be protected and evidence this.

Some – Will be able to talk about how personal data can be protected along with Legal Issues

Computer misuse actThe Computer Misuse Act 1990 was designed to protect the integrity of computer systems by deterring the activities of hackers. It created three new offences:

1.Unauthorised access to computer programs or data

2.Unauthorised access with a further criminal intent

3.Unauthorised modification of computer material

Page 14: Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what

Data Security and legal issuesProtecting Hardware, Software and Data

PlenaryAll – Will understand that personal data is stored by companies and needs protecting

Most – Will understand some of the ways that data can be protected and evidence this.

Some – Will be able to talk about how personal data can be protected along with Legal Issues

Can you find and list all eight points of the data protection act 1.processed fairly and lawfully 2.used for the lawful purpose it was collected for 3.adequate and relevant to purpose collected for 4.kept accurate and up-to-date 5.kept no longer than necessary 6.processed within the rights of the data subjects 7.kept secure 8.kept only within the EEC

Page 15: Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what

The following slides should be made in to cards for the students

to arrange

Page 16: Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what

Is where an unauthorised person uses a network, Internet or modem connection to gain access past security passwords or other security to see data stored on another computer.

Back upCopying the information onto another medium (storage area) regularly, storing this in another area.

Computer Crash

this is when a computer fails causing a loss of data, this could be done by accident or on purpose

Hacking

FirewallA security tool that controls traffic too and from a network.

Page 17: Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what

Virus

Anti - VirusSoftware installed on an end user workstation (computer) to detect and remove Viruses, Trojan horses and worms from files and e-mails

are programs written by people and designed to cause nuisance or damage to computers or their files.

Passwords/physical securityThis can be used to stop people physically taking the data from the workstation (Computer) or the workstation its self

is when data is taken without the owners consent from a computer or storage device

Data Theft

Page 18: Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what

Spyware

Name of Threat

Anti - SpywareSoftware installed on an end user workstation (computer) to detect and remove Spyware and Adware

is computer software that is installed secretly on a personal computer to collect information about a user, their computer or browsing habits without the user's Permission

Description of Threat

Protection against Threat