Title: Data Security and legal issues
1 Data Security and legal issues
All Will understand that personal data is
stored by companies and needs protecting Most
Will understand some of the ways that data can be
protected and evidence this. Some Will be
able to talk about how personal data can be
protected along with Legal Issues
Starter - 5 Minutes Make a list of all the
companies and organisations that you believe
holds data on you. Write down what data you
think they hold. For Example Vodaphone Name,
Address, Data of Birth, Phone number, Bank
details.
2Starter - 5 Minutes Make a list of all the
companies and organisations that you believe
holds data on you. Write down what data you
think they hold For Example
Medical history
Grades
Name
Pictures
Bank Details
Phone Number
Address
Parent details
Age
3 Data Security and legal issues
All Will understand that personal data is
stored by companies and needs protecting Most
Will understand some of the ways that data can be
protected and evidence this. Some Will be
able to talk about how personal data can be
protected along with Legal Issues
Objectives
- To work towards the P7 and M4 unit 2 criteria
- Have an understanding of the Possible Data
Security and legal issues when using a computer. - Describe how Hardware, software and Data can be
protected
4 Data Security and legal issues
All Will understand that personal data is
stored by companies and needs protecting Most
Will understand some of the ways that data can be
protected and evidence this. Some Will be
able to talk about how personal data can be
protected along with Legal Issues
5 Data Security and legal issues
Protecting Hardware, Software and Data Hacking
All Will understand that personal data is
stored by companies and needs protecting Most
Will understand some of the ways that data can be
protected and evidence this. Some Will be
able to talk about how personal data can be
protected along with Legal Issues
Hacking is where an unauthorised person uses a
network, Internet or modem connection to gain
access past security passwords or other security
to see data stored on another computer.
Firewall A security tool that controls traffic
too and from a network.
6 Data Security and legal issues
Protecting Hardware, Software and Data Spyware
All Will understand that personal data is
stored by companies and needs protecting Most
Will understand some of the ways that data can be
protected and evidence this. Some Will be
able to talk about how personal data can be
protected along with Legal Issues
Spyware is computer software that is installed
secretly on a personal computer to collect
information about a user, their computer or
browsing habits without the user's Permission
Anti - Spyware Software installed on an end user
workstation (computer) to detect and remove
Spyware and Adware
7 Data Security and legal issues
Protecting Hardware, Software and Data Data Theft
All Will understand that personal data is
stored by companies and needs protecting Most
Will understand some of the ways that data can be
protected and evidence this. Some Will be
able to talk about how personal data can be
protected along with Legal Issues
Data theft is when data is taken without the
owners consent from a computer or storage device
Passwords/Physical Security This can be used to
stop people physically taking the data from the
workstation (Computer) or the workstation its self
8 Data Security and legal issues
Protecting Hardware, Software and Data Computer
Crash
All Will understand that personal data is
stored by companies and needs protecting Most
Will understand some of the ways that data can be
protected and evidence this. Some Will be
able to talk about how personal data can be
protected along with Legal Issues
Computer Crash, this is when a computer fails
causing a loss of data, this could be done by
accident or on purpose
Back up Copying the information onto another
medium (storage area) regularly, storing this in
another area.
9 Data Security and legal issues
Protecting Hardware, Software and Data Viruses
All Will understand that personal data is
stored by companies and needs protecting Most
Will understand some of the ways that data can be
protected and evidence this. Some Will be
able to talk about how personal data can be
protected along with Legal Issues
Viruses are programs written by people and
designed to cause nuisance or damage to computers
or their files.
Anti - Virus Software installed on an end user
workstation (computer) to detect and remove
Viruses, Trojan horses and worms from files and
e-mails
10 Data Security and legal issues
Protecting Hardware, Software and Data Task 1(5
minutes) Using the Cards Provided in groups of 2
arrange them to show
All Will understand that personal data is
stored by companies and needs protecting Most
Will understand some of the ways that data can be
protected and evidence this. Some Will be
able to talk about how personal data can be
protected along with Legal Issues
Name of threat
Description
Possible Protection
Be ready to talk about your answer if asked
11 Data Security and legal issues
Along side physical protection there is also
deterrents e.g. Data Protection act and the
Computer misuse act
All Will understand that personal data is
stored by companies and needs protecting Most
Will understand some of the ways that data can be
protected and evidence this. Some Will be
able to talk about how personal data can be
protected along with Legal Issues
All your Personal Data Going to the highest
bidder. Buy today and get Medical History Free of
Charge
Sign up to day and learn how to change your
grades increase your bank account and change your
friends personal data
TASK 2 - 20 Minute activity Research and answer
the following Questions. Be ready to feedback
the information found to the group in a 10 minute
plenary at the end
12 Data Security and legal issues
Protecting Hardware, Software and Data Plenary
All Will understand that personal data is
stored by companies and needs protecting Most
Will understand some of the ways that data can be
protected and evidence this. Some Will be
able to talk about how personal data can be
protected along with Legal Issues
What is the Data Protection Act A law designed to
protect personal data stored on computer. Who is
the Information Commissioner The official who
supervises the enforcement of the Data Protection
Act. Who is the data controller The nominated
person in a company who applies to the data
commissioner for permission to store and use
personal data. Who are the data subject The
person about whom data is stored. Who are the
data users Anyone who uses the personal data as
part of their job. What is personal
data Information about a particular person.
13 Data Security and legal issues
Protecting Hardware, Software and Data Plenary
All Will understand that personal data is
stored by companies and needs protecting Most
Will understand some of the ways that data can be
protected and evidence this. Some Will be
able to talk about how personal data can be
protected along with Legal Issues
- Computer misuse act
- The Computer Misuse Act 1990 was designed to
protect the integrity of computer systems by
deterring the activities of hackers. It created
three new offences - Unauthorised access to computer programs or data
- Unauthorised access with a further criminal
intent - Unauthorised modification of computer material
14 Data Security and legal issues
Protecting Hardware, Software and Data Plenary
All Will understand that personal data is
stored by companies and needs protecting Most
Will understand some of the ways that data can be
protected and evidence this. Some Will be
able to talk about how personal data can be
protected along with Legal Issues
- Can you find and list all eight points of the
data protection act -
- processed fairly and lawfully
- used for the lawful purpose it was collected for
- adequate and relevant to purpose collected for
- kept accurate and up-to-date
- kept no longer than necessary
- processed within the rights of the data subjects
- kept secure
- kept only within the EEC
15The following slides should be made in to cards
for the students to arrange
16Hacking
Computer Crash
Is where an unauthorised person uses a network,
Internet or modem connection to gain access past
security passwords or other security to see data
stored on another computer.
17Anti - Virus Software installed on an end user
workstation (computer) to detect and remove
Viruses, Trojan horses and worms from files and
e-mails
Virus
are programs written by people and designed to
cause nuisance or damage to computers or their
files.
Passwords/physical security This can be used to
stop people physically taking the data from the
workstation (Computer) or the workstation its self
Data Theft
is when data is taken without the owners consent
from a computer or storage device
18Anti - Spyware Software installed on an end user
workstation (computer) to detect and remove
Spyware and Adware
Spyware
is computer software that is installed secretly
on a personal computer to collect information
about a user, their computer or browsing habits
without the user's Permission
Name of Threat
Description of Threat
Protection against Threat