SlideShare une entreprise Scribd logo
1  sur  16
E-Commerce EP 6/12
Data What personal data have you sent over the web? What personal data do you enclose when you purchase an item over the internet? Are you happy to share all of this data or would you rather some was kept private?
Data Integrity The assurance that Data is consistent and correct. Making sure data is complete when it is sent, stored or operated upon in any way. Within the field of E-Commerce any Data that is sent between the customer and the business or between businesses must be subject to data integrity checks.
Data Privacy Making sure that personal data kept by companies is only used in the correct way. Companies have a legal responsibility to ensure that personal data is not disclosed to the wrong people. Data Security controls are in place to make sure access to data is controlled.
Data Integrity How can data get “damaged”? Try and think of a few examples…
Data Integrity Data integrity can be compromised in a number of ways:  Human errors when data is entered  Errors that occur when data is transmitted from one computer to another  Software bugs or viruses  Hardware malfunctions, such as disk crashes  Natural disasters, such as fires and floods
Data Integrity There are many ways to minimize these threats to data integrity. These include:  Backing up data regularly  Controlling access to data via security mechanisms  Designing user interfaces that prevent the input of invalid data  Using error detection and correction software when transmitting data
Data Integrity Task Where does your data travel, when you buy something on the web? Imagine you buy something on eBay, try and plot the path of data from your PC. At what points in this path must data be protected?
Data Privacy Many types of personal data are required be kept private by companies: Lifestyle Religion, Sexual orientation, Political affiliation Financial Bank details, Credit card details, Financial records Email Medical Health records
Data Privacy What are the potential risks for people whose personal data is not kept private? Discrimination Embarrassment Damage to personal reputation Email Spam Identity theft Fraud
European Laws European Laws state that the data must: Fairly and lawfully processed. Processed for limited purposes. Adequate, relevant and not excessive. Accurate. Not kept longer than necessary. Processed in accordance with the data subject's rights. Secure. Not transferred to countries without adequate protection.
Data Protection Act 1984 United Kingdom introduced a Data Protection Act in 1984 in order to protect consumers. Data may only be used for the specific purposes for which it was collected Data must not be disclosed to other parties without the consent of the individual whom it is about Individuals have a right of access to the information held about them Personal information may be kept for no longer than is necessary. Companies holding personal information are required to secure this information.
Your Task Today Pair work – 2 students Internet Research Data Privacy and Security in Thailand What are the laws for Thai E-Commerce companies? Are there any laws? If not, why not? Are there plans to implement data protection laws? Give me some actual example of personal data being stolen or abused in Thailand?  What happened? Identity theft? Credit card theft? Fraud? Damaged reputation? Embarrassment?
Your Task Today How are these laws kept in place?  Police? Government agencies? What happens if companies break the law? Prison? Fines? Any examples? Please include any information you find interesting.  Please use Microsoft Word for this task. Complete the report and email to me before the start of the next lesson.		pompey_jim@msn.com
References Include in your document any links to websites or web pages that helped you to collect information. This is called a Reference You link text quoted, from the net or books, to a reference at the bottom of your document, like this: Although the Act does not mention privacy, in practice it provides a way in which individuals can enforce the control of information about themselves. Most of the Act does not apply to domestic use,[1] References [1]  Data Protection Act 1998, Part IV (Exemptions), Section 36, Office of Public Sector Information This is something you will have to do at University every time you complete an assignment.
Helpful links for research http://www.oic.thaigov.go.th/ http://www.ipthailand.org/ipthailand/ http://www.wikipedia.org/

Contenu connexe

Tendances

PSD2 - The second Payment Services Directive
PSD2 - The second Payment Services DirectivePSD2 - The second Payment Services Directive
PSD2 - The second Payment Services Directive
Emilie Scalla
 
Payments and transaction processing systems - Global and Indian Overview
Payments and transaction processing systems - Global and Indian OverviewPayments and transaction processing systems - Global and Indian Overview
Payments and transaction processing systems - Global and Indian Overview
Akshay Kaul
 

Tendances (20)

Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001
 
Peter Afanasiev - Architecture of online Payments
Peter Afanasiev - Architecture of online PaymentsPeter Afanasiev - Architecture of online Payments
Peter Afanasiev - Architecture of online Payments
 
PSD2 - The second Payment Services Directive
PSD2 - The second Payment Services DirectivePSD2 - The second Payment Services Directive
PSD2 - The second Payment Services Directive
 
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
 
Data and Message Security
Data and Message SecurityData and Message Security
Data and Message Security
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
 
Cloud banking
Cloud bankingCloud banking
Cloud banking
 
eZ Publish Workflows and Payment Gateways
eZ Publish Workflows and Payment GatewayseZ Publish Workflows and Payment Gateways
eZ Publish Workflows and Payment Gateways
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
 
Payments and transaction processing systems - Global and Indian Overview
Payments and transaction processing systems - Global and Indian OverviewPayments and transaction processing systems - Global and Indian Overview
Payments and transaction processing systems - Global and Indian Overview
 
An Introduction to Open Banking (PSD2)
An Introduction to Open Banking (PSD2)An Introduction to Open Banking (PSD2)
An Introduction to Open Banking (PSD2)
 
Online payment gateway provider
Online payment gateway providerOnline payment gateway provider
Online payment gateway provider
 
Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour
 
Bhim app
Bhim appBhim app
Bhim app
 
How to identify credit card fraud
How to identify credit card fraudHow to identify credit card fraud
How to identify credit card fraud
 
Implikasi UU PDP terhadap Tata Kelola Data Sektor Kesehatan - Rangkuman UU Pe...
Implikasi UU PDP terhadap Tata Kelola Data Sektor Kesehatan - Rangkuman UU Pe...Implikasi UU PDP terhadap Tata Kelola Data Sektor Kesehatan - Rangkuman UU Pe...
Implikasi UU PDP terhadap Tata Kelola Data Sektor Kesehatan - Rangkuman UU Pe...
 
Internet as network infrastructure & ecommerce business model
Internet as network infrastructure & ecommerce business modelInternet as network infrastructure & ecommerce business model
Internet as network infrastructure & ecommerce business model
 
Legal ethics & cloud computing
Legal ethics & cloud computingLegal ethics & cloud computing
Legal ethics & cloud computing
 

En vedette

6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-Commerce
Jitendra Tomar
 
Chapter Two E commerc business model
Chapter Two E commerc business modelChapter Two E commerc business model
Chapter Two E commerc business model
Marya Sholevar
 
05 Business Models for E-commerce slides
05 Business Models for E-commerce slides05 Business Models for E-commerce slides
05 Business Models for E-commerce slides
monchai sopitka
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
m8817
 

En vedette (20)

Security Threats to Electronic Commerce
Security Threats to Electronic CommerceSecurity Threats to Electronic Commerce
Security Threats to Electronic Commerce
 
M6 - E Commerce - Integrity And Security
M6 - E Commerce - Integrity And SecurityM6 - E Commerce - Integrity And Security
M6 - E Commerce - Integrity And Security
 
The Integrity Advantage
The Integrity AdvantageThe Integrity Advantage
The Integrity Advantage
 
eCommerce for Dummies
eCommerce for DummieseCommerce for Dummies
eCommerce for Dummies
 
E commerce business model strategy opportunities and challenges in
E commerce business model strategy opportunities and challenges inE commerce business model strategy opportunities and challenges in
E commerce business model strategy opportunities and challenges in
 
Eamonn O Raghallaigh The Major Security Issues In E Commerce
Eamonn O Raghallaigh   The Major Security Issues In E CommerceEamonn O Raghallaigh   The Major Security Issues In E Commerce
Eamonn O Raghallaigh The Major Security Issues In E Commerce
 
Business model
Business modelBusiness model
Business model
 
Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce  Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce
 
Business and Revenue Models in E-Commerce
Business and Revenue Models in E-CommerceBusiness and Revenue Models in E-Commerce
Business and Revenue Models in E-Commerce
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e business
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
 
6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-Commerce
 
Ppt
PptPpt
Ppt
 
Business to Business Electronic Commerce
Business to Business Electronic Commerce Business to Business Electronic Commerce
Business to Business Electronic Commerce
 
E business models
E business modelsE business models
E business models
 
E-commerce Security and Threats
E-commerce Security and ThreatsE-commerce Security and Threats
E-commerce Security and Threats
 
Chapter Two E commerc business model
Chapter Two E commerc business modelChapter Two E commerc business model
Chapter Two E commerc business model
 
05 Business Models for E-commerce slides
05 Business Models for E-commerce slides05 Business Models for E-commerce slides
05 Business Models for E-commerce slides
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 
E commerce ppt
E commerce pptE commerce ppt
E commerce ppt
 

Similaire à E commerce - Data Integrity and Security

Information Ethics
Information EthicsInformation Ethics
Information Ethics
UMaine
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information security
UMaine
 
Privacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxPrivacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptx
sadia456189
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
ambersalomon88660
 

Similaire à E commerce - Data Integrity and Security (20)

Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information security
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Privacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxPrivacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptx
 
Chp10 public policy
Chp10 public policyChp10 public policy
Chp10 public policy
 
Stacy Robin - The Degania Group - Technology and the Law
Stacy Robin - The Degania Group - Technology and the LawStacy Robin - The Degania Group - Technology and the Law
Stacy Robin - The Degania Group - Technology and the Law
 
data-privacy-egypt-what-you-need-know-en.pdf
data-privacy-egypt-what-you-need-know-en.pdfdata-privacy-egypt-what-you-need-know-en.pdf
data-privacy-egypt-what-you-need-know-en.pdf
 
How to Protect Your Data
How to Protect Your DataHow to Protect Your Data
How to Protect Your Data
 
Presentation networking
Presentation networkingPresentation networking
Presentation networking
 
Business communication (zayani)
Business communication (zayani)Business communication (zayani)
Business communication (zayani)
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
 
Information Privacy?! (GDPR)
Information Privacy?! (GDPR)Information Privacy?! (GDPR)
Information Privacy?! (GDPR)
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptx
 
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
 
Legal, Ethical, Environmental, Economic and Social Implications
Legal, Ethical, Environmental, Economic and Social ImplicationsLegal, Ethical, Environmental, Economic and Social Implications
Legal, Ethical, Environmental, Economic and Social Implications
 
[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and Security[MU630] 005. Ethics, Privacy and Security
[MU630] 005. Ethics, Privacy and Security
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 

Plus de Jamie Hutt

After mid term task
After mid term taskAfter mid term task
After mid term task
Jamie Hutt
 
Business Studies - Different Types of Business
Business Studies - Different Types of BusinessBusiness Studies - Different Types of Business
Business Studies - Different Types of Business
Jamie Hutt
 
Business studies lesson 4
Business studies   lesson 4Business studies   lesson 4
Business studies lesson 4
Jamie Hutt
 
Graphical Animation - Lesson 2
Graphical Animation - Lesson 2Graphical Animation - Lesson 2
Graphical Animation - Lesson 2
Jamie Hutt
 
Graphical Animation - Lesson 2
Graphical Animation - Lesson 2Graphical Animation - Lesson 2
Graphical Animation - Lesson 2
Jamie Hutt
 

Plus de Jamie Hutt (20)

Photo Vocabulary – Animals
Photo Vocabulary – AnimalsPhoto Vocabulary – Animals
Photo Vocabulary – Animals
 
Planning For Your Business Task
Planning For Your Business TaskPlanning For Your Business Task
Planning For Your Business Task
 
M5 - Photostory
M5 - PhotostoryM5 - Photostory
M5 - Photostory
 
Business Studies - Spreadsheet Task
Business Studies - Spreadsheet TaskBusiness Studies - Spreadsheet Task
Business Studies - Spreadsheet Task
 
Graphic Animation - Creating a Slideshow
Graphic Animation - Creating a SlideshowGraphic Animation - Creating a Slideshow
Graphic Animation - Creating a Slideshow
 
E commerce - Final Project
E commerce - Final ProjectE commerce - Final Project
E commerce - Final Project
 
Business - Spreadsheets
Business - SpreadsheetsBusiness - Spreadsheets
Business - Spreadsheets
 
After mid term task
After mid term taskAfter mid term task
After mid term task
 
E Commerce - Final Project
E Commerce - Final ProjectE Commerce - Final Project
E Commerce - Final Project
 
Business Studies - Advertising
Business Studies - AdvertisingBusiness Studies - Advertising
Business Studies - Advertising
 
Business Studies - Different Types of Business
Business Studies - Different Types of BusinessBusiness Studies - Different Types of Business
Business Studies - Different Types of Business
 
Business Idea - Practical Task
Business Idea - Practical TaskBusiness Idea - Practical Task
Business Idea - Practical Task
 
Business studies lesson 4
Business studies   lesson 4Business studies   lesson 4
Business studies lesson 4
 
Graphical Animation - Buttons
Graphical Animation - ButtonsGraphical Animation - Buttons
Graphical Animation - Buttons
 
M5 Graphic Animation - Upload
M5 Graphic Animation - UploadM5 Graphic Animation - Upload
M5 Graphic Animation - Upload
 
Lesson 2 - Benefits of E-Commerce
Lesson 2 - Benefits of E-CommerceLesson 2 - Benefits of E-Commerce
Lesson 2 - Benefits of E-Commerce
 
Lesson 2 - Benefits of E-Commerce
Lesson 2 - Benefits of E-CommerceLesson 2 - Benefits of E-Commerce
Lesson 2 - Benefits of E-Commerce
 
Business Studies - Lesson 2
Business Studies - Lesson 2Business Studies - Lesson 2
Business Studies - Lesson 2
 
Graphical Animation - Lesson 2
Graphical Animation - Lesson 2Graphical Animation - Lesson 2
Graphical Animation - Lesson 2
 
Graphical Animation - Lesson 2
Graphical Animation - Lesson 2Graphical Animation - Lesson 2
Graphical Animation - Lesson 2
 

E commerce - Data Integrity and Security

  • 2. Data What personal data have you sent over the web? What personal data do you enclose when you purchase an item over the internet? Are you happy to share all of this data or would you rather some was kept private?
  • 3. Data Integrity The assurance that Data is consistent and correct. Making sure data is complete when it is sent, stored or operated upon in any way. Within the field of E-Commerce any Data that is sent between the customer and the business or between businesses must be subject to data integrity checks.
  • 4. Data Privacy Making sure that personal data kept by companies is only used in the correct way. Companies have a legal responsibility to ensure that personal data is not disclosed to the wrong people. Data Security controls are in place to make sure access to data is controlled.
  • 5. Data Integrity How can data get “damaged”? Try and think of a few examples…
  • 6. Data Integrity Data integrity can be compromised in a number of ways: Human errors when data is entered Errors that occur when data is transmitted from one computer to another Software bugs or viruses Hardware malfunctions, such as disk crashes Natural disasters, such as fires and floods
  • 7. Data Integrity There are many ways to minimize these threats to data integrity. These include: Backing up data regularly Controlling access to data via security mechanisms Designing user interfaces that prevent the input of invalid data Using error detection and correction software when transmitting data
  • 8. Data Integrity Task Where does your data travel, when you buy something on the web? Imagine you buy something on eBay, try and plot the path of data from your PC. At what points in this path must data be protected?
  • 9. Data Privacy Many types of personal data are required be kept private by companies: Lifestyle Religion, Sexual orientation, Political affiliation Financial Bank details, Credit card details, Financial records Email Medical Health records
  • 10. Data Privacy What are the potential risks for people whose personal data is not kept private? Discrimination Embarrassment Damage to personal reputation Email Spam Identity theft Fraud
  • 11. European Laws European Laws state that the data must: Fairly and lawfully processed. Processed for limited purposes. Adequate, relevant and not excessive. Accurate. Not kept longer than necessary. Processed in accordance with the data subject's rights. Secure. Not transferred to countries without adequate protection.
  • 12. Data Protection Act 1984 United Kingdom introduced a Data Protection Act in 1984 in order to protect consumers. Data may only be used for the specific purposes for which it was collected Data must not be disclosed to other parties without the consent of the individual whom it is about Individuals have a right of access to the information held about them Personal information may be kept for no longer than is necessary. Companies holding personal information are required to secure this information.
  • 13. Your Task Today Pair work – 2 students Internet Research Data Privacy and Security in Thailand What are the laws for Thai E-Commerce companies? Are there any laws? If not, why not? Are there plans to implement data protection laws? Give me some actual example of personal data being stolen or abused in Thailand? What happened? Identity theft? Credit card theft? Fraud? Damaged reputation? Embarrassment?
  • 14. Your Task Today How are these laws kept in place? Police? Government agencies? What happens if companies break the law? Prison? Fines? Any examples? Please include any information you find interesting. Please use Microsoft Word for this task. Complete the report and email to me before the start of the next lesson. pompey_jim@msn.com
  • 15. References Include in your document any links to websites or web pages that helped you to collect information. This is called a Reference You link text quoted, from the net or books, to a reference at the bottom of your document, like this: Although the Act does not mention privacy, in practice it provides a way in which individuals can enforce the control of information about themselves. Most of the Act does not apply to domestic use,[1] References [1] Data Protection Act 1998, Part IV (Exemptions), Section 36, Office of Public Sector Information This is something you will have to do at University every time you complete an assignment.
  • 16. Helpful links for research http://www.oic.thaigov.go.th/ http://www.ipthailand.org/ipthailand/ http://www.wikipedia.org/