nikki p5

13

Upload: onur-k

Post on 11-Mar-2016

213 views

Category:

Documents


1 download

DESCRIPTION

 

TRANSCRIPT

I will be looking at my organisation administers the le-

gal and ethical issues in relation to the use of infor-

mation for Greggs. For some examples I will use Tesco.

Legal issues are protection that a company of the law or rel-

egation. What you can/cannot do and they involve:

Data protection act 1998

Computer misuse act 1990

Freedom of information act 2000

Human right act 1998

Privacy act 1974

Data protection act 1998- Data may only be used for the specific purposes for which it was

collected.

Data must not be disclosed to other parties without the consent of the individual whom it is

about, unless there is legislation or other overriding legitimate reason to share the in-

formation (for example, the prevention or detection of crime). It is an offence for Other

Parties to obtain this personal data without authorisation.

Individuals have a right of access to the information held about them, subject to certain ex-

ceptions (for example, information held for the prevention or detection of crime).

This means that the company is responsible of protecting information of their

customers and the companies are not allowed to use the data for any other

purpose then what they said they will use it for plus not allowed to show

other companies your information

Sony has been hit with a £250k fine after the Information Commissioners

Office found the Japanese giant guilty of allowing a ‘serious breach’ of the

Data Protection Act for failing to use up to date security software on its

PlayStation Network.

Back in April 2011 this allowed hackers to break into its online store, exposing

a raft of personal information such as names, addresses, dates of birth and

credit card information to criminals.

http://www.thedrum.com/news/2013/01/24/sony-fined-250k-over-serious-data-protection-act-breach

http://en.wikipedia.org/wiki/Computer_Misuse_Act_1990

Computer misuse act 1990- unauthorised access to computer material,

punishable by 6 months' imprisonment or a fine

unauthorised access with intent to commit or facilitate commission of fur-

ther offences, punishable by 6 months/maximum fine

unauthorised modification of computer material, subject to the same sen-

tences as section 2.

Computer misuse act is using a computer without permission and the per-son logged in knowing plus when on the computer not allowed to change any of the settings.

On 11 January 2013 Leicester Crown Court sentenced two men to 100 hours of community service and 6 months impris-onment (suspended for a year) for stealing music files from Sony Music after the pair pleaded guilty to accessing com-puter material without consent under the Computer Misuse Act 1990.

The pair had hacked into Sony’s servers from their home computers and, according to the Serious Organised Crime Agency (SOCA), had downloaded over 7,000 files. These included unreleased songs by the late Michael Jackson which SOCA alleged were specifically targeted by the hackers who were aware of the seven-year Sony deal with his estate to posthumously sell his unreleased material.

http://blogs.dlapiper.com/mediaandsport/2013/01/17/legal-director/

http://en.wikipedia.org/wiki/Computer_Misuse_Act_1990

The Human Rights Act 1998: is an Act of Parliament of the United Kingdom which received Roy-al Assent on 9 November 1998, and mostly came into force on 2 October 2000. Its aim is to "give further effect" in UK law to the rights contained in the Convention for the Protection of Human Rights and Fundamental Freedoms, but more commonly known as the European Con-vention on Human Rights. The Act makes available in UK courts a remedy for breach of a Con-vention right, without the need to go to the European Court of Human Rights in Strasbourg.

In particular, the Act makes it unlawful for any public body to act in a way which is incompati-ble with the Convention, unless the wording of any other primary legislation provides no other choice. It also requires the judiciary (including tribunals) to take account of any decisions, judgement or opinion of the European Court of Human Rights, known as the Strasbourg court, and to interpret legislation, as far as possible, in a way which is compatible with Convention rights. However, if it is not possible to interpret an Act of Parliament so as to make it compati-ble with the Convention, the judges are not allowed to override it. All they can do is issue a declaration of incompatibility. This declaration does not affect the validity of the Act of Parlia-ment: in that way, the Human Rights Act seeks to maintain the principle of Parliamentary sov-ereignty (see: Constitution of the United Kingdom). However, judges may strike down second-ary legislation, so long as the legislation does not derive its power from primary legislation.

This act is all the acts together forming the rights of people

Sony Corp. (6758) sold almost $13 million in video and medical equipment to dealers in Dubai that resold the gear in Iran, the company said. The recipients included groups under U.S. sanc-tions.

In a U.S. filing yesterday, Sony said it sold broadcast equipment, security cameras and video-conferencing gear to dealers who planned to resell or resold the products to groups including the Information Technology Department of the Iranian Police and the Islamic Republic of Iran Broad-casting.

http://www.bloomberg.com/

news/2013-06-27/sony-reports-

sale-of-communications-gear-to-

iran.html

http://en.wikipedia.org/wiki/Human_Rights_Act_1998

Free of information act 2000 – The Freedom of Information Act 2000 (FOIA) gives a general

right of public access to all types of 'recorded' information held by public authorities,

sets out exemptions from that general right, and places a number of obligations on pub-

lic authorities.

YOU HAVE THE RIGHT TO LOOK AT WHAT INFORMATION A COMPANY HOLDS

ABOUT YOU.

WikiLeaks has begun releasing the ’Detainee Policies’: more than 100 classified

or otherwise restricted files from the United States Department of Defense

covering the rules and procedures for detainees in U.S. military custody.

Over the next month, WikiLeaks will release in chronological order the Unit-

ed States’ military detention policies followed for more than a decade. The

documents include the Standard Operating Procedures (SOPs) of detention

camps in Iraq and Cuba, interrogation manuals and Fragmentary Orders

(FRAGOs) of changes to detainee policies and procedures. A number of the

’Detainee Policies’ relate to Camp Bucca in Iraq, but there are also Depart-

ment of Defense-wide policies and documents relating to Abu Ghraib,

Guantanamo Bay and European U.S. Army Prison facilities.

http://wikileaks.org/

http://en.wikipedia.org/wiki/

Computer_Misuse_Act_1990

A privacy policy is a statement or a legal document (privacy law) that discloses some or all of the ways a party gathers, uses, discloses and manages a customer or client's data. Personal information can be anything that can be used to identify an individual, not limited to but including; name, address, date of birth, marital status, contact in-formation, ID issue and expiry date, financial records, credit information, medical his-tory, where you travel, and intentions to acquire goods and services. In the case of a business it is often a statement that declares a party's policy on how it collects, stores, and releases personal information it collects. It informs the client what spe-cific information is collected, and whether it is kept confidential, shared with part-ners, or sold to other firms or enterprises.

This act tells you that your information is not support to be send to others and the business is responsible of looking after your information and not loosing it

The penalty comes after the Sony PlayStation Network Platform was hacked in April 2011, compromising the personal information of millions of custom-ers, including their names, addresses, email addresses, dates of birth and ac-count passwords. Customers’ payment card details were also at risk.

http://www.ico.org.uk/news/latest_news/2013/ico-news-release-2013

Whistle Blowing

Use of internet

Use of email

Whistleblowing is when a worker reports suspected wrongdoing at work. Officially this is called ‘making a disclosure in the public interest’.

A worker can report things that aren’t right, are illegal or if anyone at work is neglecting their duties, including:

someone’s health and safety is in danger

damage to the environment

a criminal offence

the company isn’t obeying the law (like not having the right insurance)

covering up wrongdoing

WikiLeaks has begun releasing the ’Detainee Policies’: more than 100 classi-fied or otherwise restricted files from the United States Department of De-fence covering the rules and procedures for detainees in U.S. military custo-dy. Over the next month, WikiLeaks will release in chronological order the United States’ military detention policies followed for more than a decade. The documents include the Standard Operating Procedures (SOPs) of deten-tion camps in Iraq and Cuba, interrogation manuals and Fragmentary Orders (FRAGOs) of changes to detainee policies and procedures. A number of the ’Detainee Policies’ relate to Camp Bucca in Iraq, but there are also Depart-ment of Defence-wide policies and documents relating to Abu Ghraib, Guan-tanamo Bay and European U.S. Army Prison facilities

http://wikileaks.org/

https://www.gov.uk/whistleblowing

An internet usage policy provides employees with rules and guidelines about the appro-priate use of company equipment, network and Internet access. Having such a policy in place helps to protect both the business and the employee; the employee will be aware that browsing certain sites or downloading files is prohibited and that the policy must be adhered to or there could be serious repercussions, thus leading to fewer security risks for the business as a result of employee negligence. The Internet Usage Policy is an im-portant document that must be signed by all employees upon starting work. Below is a Sample Internet Usage Policy that covers the main points of contention dealing with In-ternet and computer usage. The policy can then be tailored to the requirements of the specific organization.

Prime Minister Manmohan Singh on Saturday reaffirmed the fears of the In-telligence Bureau chief Asif Ibrahim that misuse of social media to instigate communal riots was one of the biggest threats to India's internal security.

http://timesofindia.indiatimes.com/topic/Misuse-of-Internet

http://www.gfi.com/pages/sample-internet-usage-policy

Electronic mail (e-mail) is now an important means of communica-

tion for most members of the University. Messages can be deliv-

ered almost anywhere in the world rapidly and it is simple to gener-

ate, reply to, or forward e-mail.

There are responsibilities involved in using e-mail. In signing Infor-

mation Services’ Rules and Regulations you have agreed to fulfil

these responsibilities and you are also covered by UK law. Email is

not meant to be hacked in to and not used for other purposes ex-

cept for what your job

A joke shared with a colleague, a party invitation or an internet fun-ny passed round the office sound harmless enough, but a third of British firms have sacked staff over alleged "abuse" of emails in company time, according to a new report.

http://www.independent.co.uk/news/uk/home-news/more-firms-sack-staff-over-abusive-emails-

541436.html

In this assignment I wrote about the legal and

ethical issues of my business, I have covered

Data protection act 1998, Computer misuse

act 1990, Freedom of information act 2000,

Human rights 1998 and Privacy act 1974 for le-

gal issues and for ethical issues I included

whistle blowing, use of internet and use of e-

mail.

Moreover, I have given the examples related to

these issues.