10. Not transferred to other countries without adequate protectionThe second area covered by the act provides individuals with important rights, including the right to find out what personal information is held on computer and most paper records.<br />Explanation<br />Well first of all processing means collecting, storing, retrieving or organising data. There must be a good valid reason why they are collecting data. Out of date data will be destroyed and deleted such as application forms etc. Also if they are sending information out about you to other countries they will only send it to the countries which apply with the data protection act. Personal data is anything which identifies you as an individual this is either on its own or is referenced to other information. This is a great idea because it stops other people using valuable information about you or anyone else. Also stops silly little things like junk mail and junk letters. Also gives people a chance to see what is actually on file and paper about themselves because all companies have to comply with this act.<br />Scenario<br />The Data Protection act would apply in a scenario where the Carphone Warehouse company allowed customers to view other peoples account details, passed inaccurate information on to debt collectors and opened accounts in the wrong name. The actions were in breach of the data protection act and the ICO has issued Carphone Warehouse and sister company talk talk with enforcement notices ordering them to comply with the Data Protection Act. If they fail to do so they risk criminal prosecution. Both companies failed to meet the basic principles of the data protection act.<br />Threats to computer systems <br />Explanation<br />Computer systems are vulnerable to many threats that can inflict various types of damage resulting in significant losses. This damage can range from errors harming database integrity to fires destroying entire computer centres. Losses can stem, for example, from the actions of supposedly trusted employees defrauding a system, from outside hackers, or from careless data entry clerks. Precision in estimating computer security related losses is not possible because many losses are never discovered, and others are quot;
swept under the carpetquot;
to avoid unfavourable publicity. The effects of various threats vary considerably. Some affect the confidentiality or integrity of data while others affect the availability of a system. Hackers can use such things as bots, rats, Trojans they are made through coding using programs such as c++, vb etc. Most hackers nowadays use viruses to access other systems, most viruses are protected by something called a STUB. A STUB is another code that fits over the top of the virus so when it is being scanned through anti virus programs such as Norton, AVG, NOD32 it comes up clean because the the stub is protecting the virus code. Also a lot of viruses, spyware and bots are being binded. Binded means putting such things as pictures, music, applications etc. so when a user downloads these and opens them for example to play a music file he would double click it the music would play as normal but because its binded the virus has also been executed and the virus starts to run in the background. Then the hackers can gain much information from key logging(records every key stroke) to passwords to bank details and can even change major settings such as bios, disk management, network router settings and other harmful things. Even little programs we use everyday such as java, hackers can create little scripts for them that can be very harmful. Therefore be very careful about what sites and programs are used. Security plays a massive role in computing. Having good security prevents most of these attacks occurring as it quarantines the virus/hack/code. Having a personal firewall like zone alarm with strict sharing settings can monitor every incoming and outgoing connection. This can stop the virus connecting with the user so it cannot be accessed.<br />Scenario<br />The threat to computer systems scenario would apply with Hackers that broke into the Federal Aviation Administration’s computer system last week, accessing the names and Social Security numbers of 45,000 employees and retirees. The agency said in a statement that two of the 48 files on the breached computer server contained personal information about employees and retirees who were on the FAA’s rolls as of the first week of February 2006. <br />Ethical Considerations – BCS role<br />Identification of BCS <br />BCS, The chartered institute for IT is a professional body and a learned society that represents those working in the information technology. Established in 1957, it is the largest united kingdom-based professional body for computing, which was formerly known as the British computer society. With a worldwide membership of over 70,000 members in over 100 countries, BCS is a registered charity and was incorporated by Royal Charter in 1984. Its objectives are to promote the study and application of communications technology and computing technology and to advance knowledge of education in ICT for the benefit of professional practitioners and the general public. BCS is a member institution of Engineering Council UK, and therefore is responsible for the regulation of ICT and computer science fields within the UK. The BCS is also a member of the Council of European Professional Informatics Societies (CEPIS)<br />Explanation<br />The BCS bring together industry, Academics, practitioners and government to share knowledge, promoting And thinking, they also inform the public of the new policies. They help organisations make the most of computer’s and save them money. They have over 70,000 members. Their mission is to enable the Information society by promoting change and wider social and economic progress through the advancement of information technology science and practice.<br />Scenario<br />The British Computer society it is their vision is to be a world class organisation for IT. For them to do this they need to ensure that their profession has the skills and capabilities to meet IT demands of a changing world. they also need to ensure that they as an organisation are adapting to that world and can continue to grow out impact and influence in the decades ahead.<br />Conclusion<br />Summarizing<br />The key points of this report. Data protection act must be followed at all times. Personal data must be obtained fairly and lawfully and the data subject should be informed of who the data controller is and the data controller representative is. The new act covers personal data in both electronic form and manual form. Personal data must be kept accurate and up to date and shall not be kept for longer than necessary. Appropriate security measures must be taken against unlawful or unauthorised processing of data against accidental loss or damage to personal data. The computer misuse act second offences should be increasingly more severely than first offences and there is a range of penalties from suspension of use of computer facilities, Fines and to the ultimate sanction of being sent down. The copyright and patents act gives the creators of literary, dramatic, musical and artistic works the right to control the ways in which their material may be used. <br />Bibliography<br />Copyright and patents accessed on the 5th of December http://eprints.lse.ac.uk/copyright.html<br />Computer misuse accessed on the 6th of December http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B6VJC-4JD1XS8-7&_user=10&_rdoc=1&_fmt=&_orig=search&_sort=d&_docanchor=&view=c&_searchStrId=1138544074&_rerunOrigin=google&_acct=C000050221&_version=1&_urlVersion=0&_userid=10&md5=2828e4bf85abedcac0b9351ef83c014d<br />Data protection accessed on the 6th of December http://t3sc.org/assets/Data%20protection.pdf<br />British computer society accessed on the 7th of December http://en.wikipedia.org/wiki/BCS,_The_Chartered_Institute_for_IT<br />Harry potter scenario accessed on the 10th of December http://www.news.com.au/jk-rowling-copied-willy-the-wizard/story-0-1225736162848<br />Gary McKinnon scenario accessed on the 10th of December http://en.wikipedia.org/wiki/Gary_McKinnon<br />Threats to computer systems scenario accessed on the 11th of December http://www.globalsecurity.org/security/library/news/2009/02/dhs_daily_report_2009-02-11.pdf<br />British computer society scenario accessed on the 11th of December http://www.bcs.org/server.php?show=nav.11280<br /> <br />