ITNP023 - Autumn Aims
|
|
- Gwen Greene
- 6 years ago
- Views:
Transcription
1 PROFESSIONAL ISSUES
2 2 Aims Give a precise meaning of the terms profession and professional Discuss the obligations and privileges which membership of a profession carries Consider some codes of conduct that arise in UK computing Consider some legislations in UK computing
3 3 Professionalism What is a profession and what is involved in being a professional? Just doing it for money ( professional footballer ) Or do we mean something else? 3
4 4 Professionalism From Chambers 20th Century Dictionary: Profession: an employment not mechanical and requiring some degree of learning: a calling, habitual employment; the collective body of persons engaged in any profession; Features that collective bodies have in common: The collective body controls entry to a profession; Is self governing, in the sense that it establishes and enforces a code of conduct to its members; Is established either by a Royal Charter or by statute (act of Parliament) which requires it to undertake certain duties and responsibilities.
5 5 Professionalism The archetypal professions are medicine and law General features: a service relationship: a vendor and a purchaser, but no tangible commodity that can be sold on the vendor ( professional ) belongs to a specialist group possessing arcane skills (eg medical doctor) the purchaser may be forced to buy, or otherwise face e.g. disease, imprisonment The relationship is inherently unequal The purchaser is dependent on the integrity and skill of the vendor 5
6 6 Regulations of a profession A professional body sets: Standards of education as a condition of entry and achievement of professional status. Ethical standards and ethical rules which are to be followed by members. Rules are designed for the benefit of the public, typically stressing the pre-eminence of the client s interests over those of the service provider. Each profession has an appropriate degree of independence in setting professional standards whilst allowing Government to legislate for the public interest.
7 7 Benefits to the professional In exchange for these concessions, the specialist group typically demands new forms of market power Normally mediated through a closed association, guild... These include monopoly of practice control of entry and training self-regulation, both of normal practice and of disciplinary procedures There is no single picture: but professionalisation may bring practitioners benefits in both income and esteem Or they may find that their own ethics make them vulnerable (eg hospital doctors) 7
8 8 Professionalisation as a goal Occupational groups are often very keen to grasp the benefits particularly the market power conferred by monopoly plus control of recruitment & training Frequently we find sustained campaigns by groups to achieve professional status or to deny it to competing groups Professionalisation may bring benefits to others particularly purchasers For example, defined norms of duty to the client continual improvement of personal skills detection and prevention of abuse May bring very much better services 8
9 9 Computing in the UK BCS, The Chartered Institute for IT (formerly British Computer Society) is the professional society for Information System Engineers in the UK Its professional qualifications are based on the scheme for engineers: Chartered Information Technology Professional (CITP) Chartered Scientist (CSci) Chartered Engineer (CEng) 9
10 10 Membership of the BCS It has its own entrance exams A university can apply for its own degrees to provide exemption from the BCS exams this involves inspection every five years The BCS recognises the Stirling MSc IT for part-exemption from its entrance examination requirements for CITP See for membership details MBCS requires additional professional experience: 5 years IT work experience, or 2-3 years IT work experience plus relevant recognised qualifications (depending on level of qualification), or an Honours degree with BCS accreditation. 10
11 11 The BCS s Professional Code Stresses the need to balance one s duty to the employer (or client) and to the public. Strong emphasis on competence and duty of care towards the client and towards the public. The information professional must seek to upgrade their professional knowledge and skill and shall maintain awareness of technological developments, procedures and standards. See the BCS Code of Conduct and Code of Good Practice at Violations of the Code by members will be considered under the Society s disciplinary procedures. 11
12 12 Excerpts from the BCS Code of Conduct Public interest: You shall have due regard for public health, privacy, security and wellbeing of others and the environment. You shall promote equal access to the benefits of IT and seek to promote the inclusion of all sectors in society wherever opportunities arise. Duty to relevant authority: You shall carry out your professional responsibilities with due care and diligence in accordance with the Relevant Authority s requirements whilst exercising your professional judgement at all times. You shall accept professional responsibility for your work and for the work of colleagues who are defined in a given context as working under your supervision. 12
13 13 Excerpts from the BCS Code of Conduct Professional competence and integrity You shall only undertake to do work or provide a service that is within your professional competence. You shall NOT claim any level of competence that you do not possess. You shall develop your professional knowledge, skills and competence on a continuing basis, maintaining awareness of technological developments, procedures, and standards that are relevant to your field. You shall ensure that you have the knowledge and understanding of Legislation and that you comply with such Legislation, in carrying out your professional responsibilities. Duty to the profession You shall accept your personal duty to uphold the reputation of the profession and not take any action which could bring the profession into disrepute. 13
14 14 Legal Framework Probably the four most important pieces of UK computing legislation are: The Data Protection Act (discussed in ITNP033) The Freedom of Information Act (discussed in ITNP033) The Computer Misuse Act together with the Police and Justice Act (2006) The Regulation of Investigatory Powers Act The Computer Misuse Act (1990) drafted after two hackers left a message in the Duke of Edinburgh s mailbox introduces three new offences 14
15 15 CMA Section 1 1. A person is guilty of an offence if (a) he causes a computer to perform any function with intent to secure access to any program or data held in any computer; (b) the access he intends to secure is unauthorised; and (c) he knows at the time when he causes the computer to perform the function that is the case 2. The intent a person has to have to commit an offence under this section need not be directed at (a) any particular program or data; (b) a program or data of any particular kind; or (c) a program or data held in any particular computer. (up to six months imprisonment and/or up to 2000 penalty) 15
16 16 CMA Section 2 & 3 Section 2 covers cases where the Section 1 offence is aggravated by an intent to commit a further crime (e.g. blackmail, theft) Section 3 covers any act which causes unauthorised modification of computer material [with intent to] (a) to impair the operation of any computer; (b) to prevent or hinder access to any program or data held in any computer; or (c) to impair the operation of any such program or the reliability of any such data In both cases the penalty is an unlimited fine and up to five years imprisonment 16
17 17 The DOS attack loophole The Computer Misuse Act did not deal well with Denial of Service (DOS) attacks. What is a DOS attack? Nothing to do with Microsoft s DOS operating system! In a DOS attack, a server on a network is maliciously bombarded with a huge volume of requests, effectively bringing it to a standstill. An example: Three Russian hackers extorted up to 2M from UK online bookmakers, by threatening to launch DOS attacks against their websites. Placing a bet is a legitimate use of a gambling website, so it would have been difficult to argue that this was a crime under the CMA. 17
18 18 The Police and Justice Act (2006) The Police and Justice Act (2006) broadens the scope of the CMA and imposes tougher penalties. It closes the DOS attack loophole by making it an offence to commit an unauthorised act in relation to a computer which has the effect that it impairs the operation of any computer The PJA also: makes it an offence to obtain or distribute software (such as hacking tools) if it is known that it will be used for illegal purposes. increases the penalties for the crimes defined under the CMA (up to 10 years imprisonment for some offences). and the Russian hackers? They were arrested and tried in Russia in 2006, fined, and sentenced to 8 years imprisonment. 18
19 19 Regulation of Investigatory Powers Act (2000) (Summary from The government can demand that a public telecommunications service intercepts an individual's communications The Home Secretary can serve interception warrants to perform mass surveillance The government can require ISPs to fit equipment that enables them to perform surveillance The government can demand that decryption keys be handed over in order to access protected information not yet in force 19
20 20 Regulation of Investigatory Powers Act (2000) The government can access internet traffic data for... any reason the Secretary of State deems fit Surveillance data may not be used in legal proceedings so if someone has illegitimately been the subject of an interception warrant there is no legal way for them to know about it. Needless to say, there has been some controversy about this law! press-freedomstate-surveillance-straw-editorial 20
21 21 Tutorial We will have a tutorial to discuss aspects of professional conduct
BCS Higher Education Qualifications. Diploma in IT. Professional Issues in Information Systems Practice Syllabus
BCS Higher Education Qualifications Diploma in IT Professional Issues in Information Systems Practice Syllabus Version 3.0 December 2016 This is a United Kingdom government regulated qualification which
More informationSchool of Engineering & Built Environment
School of Engineering & Built Environment BEng (Hons) in Digital Security, Forensics & Ethical Hacking Programme Specification Proforma (PSP) August 2015 P a g e 1 GLASGOW CALEDONIAN UNIVERSITY Programme
More informationCommunication and Usage of Internet and Policy
Communication and Usage of Internet and Email Policy Policy Category Administration Policy Code ADM HE 27 Policy owner Chief Executive Officer Responsible Officer Chief Executive Officer Approving authority
More informationReach your potential. Activate your membership
Reach your potential Activate your membership There has never been a better time to join BCS, The Chartered Institute for IT, champions the global IT profession and the interests of individuals engaged
More informationMEMBERSHIP CAN MAKE THE DIFFERENCE
MEMBERSHIP CAN MAKE THE DIFFERENCE JOIN OUR COMMUNITY AND START YOUR JOURNEY BCS, The Chartered Institute for IT is committed to making IT good for society. We promote wider social and economic progress
More informationObtaining Chartered Status in the Chartered Institute for IT. Keith Taylor
Obtaining Chartered Status in the Chartered Institute for IT Keith Taylor About me I worked for IBM most of my life as a designer, technical specialist, and product planner I am a CITP, Chartered Engineer,
More informationApplication Guidelines. Last modified June
Application Guidelines Last modified June 2017 1 Table of Contents Section 1: About the NER... 3 Section 2: Why be Registered on the NER?... 3 Section 3: NER Areas of Practice... 4 Section 4: Benefits
More informationInitial CITP and CSci (partial fulfilment). *Confirmation of full accreditation will be sought in 2020.
PROGRAMME SPECIFICATION Master of Computing (Hons) in Computer Forensics Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool John Moores University
More informationChartered Membership: Professional Standards Framework
Chartered Membership: Professional Standards Framework Foreword The Chartered Institute of Architectural Technologists (CIAT) is the lead professional body for Architectural Technology and the UK Competent
More informationUCL Policy on Electronic Mail ( )
LONDON S GLOBAL UNIVERSITY UCL Policy on Electronic Mail (EMAIL) Information Security Policy University College London Document Summary Document ID Status Information Classification Document Version TBD
More informationUniversity Privacy Campaign. Introduction to the Personal Data (Privacy) Ordinance
University Privacy Campaign Introduction to the Personal Data (Privacy) Ordinance 1 Personal Data (Privacy) Ordinance Legislative Background Personal Data (Privacy) Ordinance came into effect on 20 December
More informationSuperior. Responsibility. (Typically for a period. of five years) Passed IRSE Professional Exam or IRSE recognised equivalent.
This flowchart provides guidance on the various routes to the grades of Fellow, Member and Associate Member (for other grades click here). Full details of the requirements are contained within the Bye-Laws
More informationDATA PROTECTION IN RESEARCH
DATA PROTECTION IN RESEARCH Document control Applicable to: All employees and research students Date first approved February 2006 Date first amended May 2015 Date last amended May 2015 Approved by Approval
More informationChild Online Protection in Child Pornography Namibia
Child Online Protection in Child Pornography Namibia Regulation in Namibia UNICEF Namibia Presented by: Jolanda van Westering Outline Introduction Typology of online abuse and exploitation Scale and response
More informationWorking with investment professionals
Working with investment professionals www.uksip.org UKSIP is a member society of UKSIP - its four defining characteristics Professional excellence in its core activities These activities are: Support and
More informationDraft. Policies of Colorado State University University Policy. Category: Information Technology
Policies of Colorado State University University Policy Policy Title: Acceptable Use for Computing and Networking Resources Category: Information Technology Owner: Vice President for Information Technology
More informationIntroduction to the Personal Data (Privacy) Ordinance
Introduction to the Personal Data (Privacy) Ordinance Personal Data (Privacy) Ordinance Legislative Background Personal Data (Privacy) Ordinance came into effect on 20 December 1996 Amendment of the Ordinance
More informationIntroduction to the Personal Data (Privacy) Ordinance
Introduction to the Personal Data (Privacy) Ordinance Personal Data (Privacy) Ordinance Legislative Background Personal Data (Privacy) Ordinance came into effect on 20 December 1996 Amendment of the Ordinance
More informationSPECIAL CONDITIONS FOR SO YOU START DEDICATED SERVER RENTAL Latest version dated 03/12/2013
SPECIAL CONDITIONS FOR SO YOU START DEDICATED SERVER RENTAL Latest version dated 03/12/2013 ARTICLE 1: PURPOSE The purpose of these Special Conditions, which supplement the So You Start General Conditions
More informationSQA Advanced Unit specification: general information. Professionalism and Ethics in Computing
SQA Advanced Unit specification: general information Unit title: Professionalism and Ethics in Computing Unit code: HP29 47 Superclass: DE Publication date: August 2017 Source: Scottish Qualifications
More informationNew Zealand Certificate in Regulatory Compliance (Core Knowledge) (Level 3)
New Zealand Certificate in Regulatory Compliance (Core Knowledge) (Level 3) If your staff need to learn the basics about regulatory compliance in New Zealand, then this is the paper for them. This qualification
More informationPrivacy Policy GENERAL
Privacy Policy GENERAL This document sets out what information Springhill Care Group Ltd collects from visitors, how it uses the information, how it protects the information and your rights. Springhill
More informationThe Lee Wiggins Childcare Centre E-SAFETY, PHOTOGRAPHY and VIDEO POLICY
Policy for the acceptable use of mobile phones and cameras by the staff of the Lee Wiggins Childcare Centre (LWCC) Mobile Phones In order to provide a safe environment for children, parents and staff we
More informationPROGRAMME SPECIFICATION
PROGRAMME SPECIFICATION Bachelor of Science with Honours (SW) (Fnd) in Computer Forensics Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool
More informationUWC International Data Protection Policy
UWC International Data Protection Policy 1. Introduction This policy sets out UWC International s organisational approach to data protection. UWC International is committed to protecting the privacy of
More informationFull-Time: 4 Years, Sandwich Thick: 5 Years All LJMU programmes are delivered and assessed in English
PROGRAMME SPECIFICATION Bachelor of Science with Honours (SW) (Fnd) in Computer Forensics Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool
More informationCONTINUING PROFESSIONAL DEVELOPMENT REGULATIONS
CONTINUING PROFESSIONAL DEVELOPMENT REGULATIONS WHAT IS CPD? Continuing Professional Development (CPD) is an ongoing requirement to undertake education, maintain a current knowledge base and improve skills
More informationSubject: Kier Group plc Data Protection Policy
Kier Group plc Data Protection Policy Subject: Kier Group plc Data Protection Policy Author: Compliance Document type: Policy Authorised by: Kier General Counsel & Company Secretary Version 3 Effective
More informationThe Role of the Data Protection Officer
The Role of the Data Protection Officer Adrian Ross LLB (Hons), MBA GRC Consultant IT Governance Ltd 28 July 2016 www.itgovernance.co.uk Introduction Adrian Ross GRC consultant Infrastructure services
More informationPositive Action Group Single Resident Record. Steve Burrows
Positive Action Group Single Resident Record Steve Burrows RFC 1983: Internet Users' Glossary hacker A person who delights in having an intimate understanding of the internal workings of a system, computers
More informationRules and Regulations for Entry to Grades of Membership
Rules and Regulations for Entry to Grades of Membership GENERAL Introduction These Rules and Regulations are enacted under the By-Laws of the Institute to detail the entry qualifications and requirements
More informationIn brief, these criteria or elements of a profession are as follows:
Professionalism and Internal Auditors In the Middle Ages, law, medicine, university teaching, and religion were considered the learned professions. In the early 1900s, dentistry and architecture were added.
More informationDATA PROTECTION POLICY THE HOLST GROUP
DATA PROTECTION POLICY THE HOLST GROUP INTRODUCTION The purpose of this document is to provide a concise policy regarding the data protection obligations of The Holst Group. The Holst Group is a data controller
More informationProfessional certification from BCS, The Chartered Institute for IT. bcs.org/certification
Professional certification from BCS, The Chartered Institute for IT bcs.org/certification 02 03 INTRODUCTION BCS, The Chartered Institute for IT, is the leading institute for IT professionals around the
More informationUniversity of Ulster Standard Cover Sheet
University of Ulster Standard Cover Sheet Document Title AUTHENTICATION STANDARD 2.0 Custodian Approving Committee ISD Heads ISD Committee Policy approved date 2011 10 13 Policy effective from date 2011
More informationNOW IS THE TIME. to secure our future
NOW IS THE TIME to secure our future A FRAMEWORK FOR UNITING THE CANADIAN ACCOUNTING PROFESSION VISION FOR THE PROFESSION To be the pre-eminent, internationally recognized Canadian accounting designation
More informationCybercrime Criminal Law Definitions and Concepts
Cybercrime Criminal Law Definitions and Concepts How to Criminalize Attacks on Computer Networks and Information Computer Crime and Intellectual Property Section U.S. Department of Justice 1 Overview Introduction
More informationPROFESSIONAL REGISTRATION OPPORTUNITIES
PROFESSIONAL REGISTRATION OPPORTUNITIES Engineering Incorporated Chartered Technician Engineer Engineer WHAT IS SOE? We are a professional membership organisation supporting and developing individuals
More informationAccess to personal accounts and lawful business monitoring
Access to personal email accounts and lawful business monitoring Contents Policy statement... 2 Access to personal emails... 2 Manager suspects misuse... 3 Lawful business monitoring... 4 Additional information...
More informationNew Zealand Certificate in Regulatory Compliance (Operational Practice) Level 4
New Zealand Certificate in Regulatory Compliance (Operational Practice) Level 4 This qualification is designed for people who work in frontline roles that deal with the operational aspects of regulatory
More informationCertified Addiction Recovery Coach Application
Certified Addiction Recovery Coach Application A Project of ASAP - Alcoholism & Substance Abuse Providers of New York State 11 North Pearl Street, Suite 801 Albany New York 12207 Phone: 518.426.0945 Fax:
More informationACCA Certificate in Audit (RQF Level 4) Qualification specification
ACCA Certificate in Audit (RQF Level 4) Qualification specification ABOUT ACCA We re the world s most forward thinking professional accountancy body. We believe that accountancy is vital for economies
More informationA Comparative Study of Teaching Forensics at a University Degree Level
A Comparative Study of Teaching Forensics at a University Degree Level Martin Mink University of Mannheim, Germany IMF 2006, Stuttgart October 19 Joint Work Laboratory for Dependable Distributed Systems
More informationPTLGateway Acceptable Use Policy
1 PTLGateway Acceptable Use Policy Last Updated Date: 02 March 2018 Acceptable Use Policy Your use of our Services must fall within our Acceptable Usage Policy. Contents Key details... 1 COVERAGE OF THIS
More informationNEWTON COUNTY OPEN RECORDS ACT POLICY
NEWTON COUNTY OPEN RECORDS ACT POLICY As a public entity, Newton County is subject to the Open Records Act, O. C. G.A. 50-18- 70 et seq. Newton County is committed to conducting its business in a manner
More informationAcceptable Use Policy
Acceptable Use Policy Preamble This document may be augmented or replaced by relevant sections of other parts of our Agreement, and should be read in conjunction with other supporting documents, so please
More informationGarry Mukelabai Communications Authority Zambia
Garry Mukelabai Communications Authority Zambia ICT in Zambia. Current and Future Legislations. Way Forward? Pop 12 million. Zambia pioneers of internet in region. Over 10 Internet Service Providers Internet
More informationFPA CONTINUING PROFESSIONAL DEVELOPMENT POLICY. Updated: February 2019
FPA CONTINUING PROFESSIONAL DEVELOPMENT POLICY Updated: February 2019 FPA CONTINUING DEVELOPMENT POLICY Contents 1. Purpose... 3 2. Summary of requirements... 4 3. Acceptable CPD Content... 6 a. CPD Hours...
More informationCleveland State University General Policy for University Information and Technology Resources
Cleveland State University General Policy for University Information and Technology Resources 08/13/2007 1 Introduction As an institution of higher learning, Cleveland State University both uses information
More informationCISI Membership Policy: CERTIFIED FINANCIAL PLANNER (CFP TM )
CISI Membership Policy: CERTIFIED FINANCIAL PLANNER (CFP TM ) This policy relates to the process for voting members to obtain and maintain the Certified Financial Planner TM Certification 1.1 Certified
More informationPathways CIC Privacy Policy. Date Issued: May Date to be Reviewed: May Issued by Yvonne Clarke
Prepared by: M Franklin Issued: May 2018 Pathways Community Interest Company Review due: May 2020 Pathways CIC Privacy Policy Version 0.3 Approved by: Yvonne Clarke Approval date: 21.05.2018 Pathways CIC
More informationCayman Islands Data Protection Law Guide Book
Cayman Islands Data Protection Law Guide Book 2017 Guide Book Cayman Islands Data Protection Law, 2017 1. Background and Overview On 27 March 2017 the Data Protection Law, 2017 (Law) was passed by the
More informationMotorola Mobility Binding Corporate Rules (BCRs)
Motorola Mobility Binding Corporate Rules (BCRs) Introduction These Binding Privacy Rules ( Rules ) explain how the Motorola Mobility group ( Motorola Mobility ) respects the privacy rights of its customers,
More informationILM Whistle-blowing Policy for Centres, Providers and Candidates
ILM Whistle-blowing Policy for Centres, Providers and Candidates V1 November 2017 Contents Document Change History 2 Scope 3 Definition 3 How to report a concern 4 What happens next? 4 Confidentiality
More informationΚΕΝΤΡΟ ΜΕΛΕΤΩΝ ΑΣΦΑΛΕΙΑΣ CENTER FOR SECURITY STUDIES
ΚΕΝΤΡΟ ΜΕΛΕΤΩΝ ΑΣΦΑΛΕΙΑΣ CENTER FOR SECURITY STUDIES Under which conditions is an investigation authorised/permitted? Which are the legal boundaries and the applicable operational rules? Is the Data Protection
More informationKEY PROGRAMME INFORMATION. Originating institution(s) Bournemouth University. Faculty responsible for the programme Faculty of Science and Technology
KEY PROGRAMME INFORMATION Originating institution(s) Bournemouth University Faculty responsible for the programme Faculty of Science and Technology Final award(s), title(s) and credits 20 (60 ECTS) Level
More informationCognizant Careers Portal Privacy Policy ( Policy )
Cognizant Careers Portal Privacy Policy ( Policy ) Date: 22 March 2017 Introduction This Careers Portal Privacy Policy ("Policy") applies to the Careers portal on the Cognizant website accessed via www.cognizant.com/careers
More informationGeneral Legal Requirements under the Act and Relevant Subsidiary Legislations. Personal data shall only be processed for purpose of the followings:
General Legal Requirements regarding the Personal Data Protection ( PDP ) Principles under the PDP Act 2010 ( Act ) and the relevant Subsidiary Legislations PDP Principles General Principle Data users
More informationGrove Country Day School aka Academ y Acceptable Use Policy (AUP)
Grove Country Day School aka Academ y Acceptable Use Policy (AUP) Computer & Network Access Wireless Devices Students, staff and members of the community using Grove Country Day School LLC aka Academy
More informationPolicy on Privacy and Management of Personal Information
Policy on Privacy and Management of Personal Information Purpose The purpose of this privacy policy is to: clearly communicate how SMA manages personal information; provide students, members, staff and
More informationLegal framework of ensuring of cyber security in the Republic of Azerbaijan
Legal framework of ensuring of cyber security in the Republic of Azerbaijan Bakhtiyar N.Mammadov Ministry of Communications and Information Technologies Head of Legal and HR Department ITU WSIS Thematic
More informationDCU Guide to Subject Access Requests. Under Irish Data Protection Legislation
DCU Guide to Subject Access Requests Under Irish Data Protection Legislation Context Under section 4 of the Irish Data Protection Acts 1988 & 2003 an individual, on making a written request to DCU, may
More informationEVALUATION AND APPROVAL OF AUDITORS. Deliverable 4.4.3: Design of a governmental Social Responsibility and Quality Certification System
EVALUATION AND APPROVAL OF AUDITORS Deliverable 4.4.3: Design of a governmental Social Responsibility and Quality Certification System 1 TABLE OF CONTENTS 1. Scope and field of Application 3 2. Normative
More informationProject Better Energy Limited s registered office is Witan Gate House, Witan Gate West, Milton Keynes, Buckinghamshire, MK9 1SH
PRIVACY NOTICE Curv360 is a part of the Project Better Energy Limited group of companies and is a controller of any personal data you provide. We respect your data and your privacy is important to us.
More informationPRIVACY NOTICE VOLUNTEER INFORMATION. Liverpool Women s NHS Foundation Trust
PRIVACY NOTICE VOLUNTEER INFORMATION Liverpool Women s NHS Foundation Trust Introduction This document summarises who we are, what information we hold about you, what we will do with the information we
More informationSMS SERVICE PROVISION
SMS SERVICE PROVISION Terms and Conditions and Privacy Policy Version 2.05 Jan 2017 Page 1 Contents TERMS & CONDITIONS... 3 Registration... 3 Your Personal Information... 3 Our Obligations to SMS Service
More informationTHE CAN-SPAM ACT OF 2003: FREQUENTLY ASKED QUESTIONS EFFECTIVE JANUARY 1, December 29, 2003
THE CAN-SPAM ACT OF 2003: FREQUENTLY ASKED QUESTIONS EFFECTIVE JANUARY 1, 2004 This FAQ is not intended to provide specific advice about individual legal, business, or other questions. It was prepared
More informationBecome an IT professional. Achieve a professional IT qualification. Higher Education Qualifications in IT
Become an IT professional Achieve a professional IT qualification Higher Education Qualifications in IT Developed by professionals for professionals Your assurance of quality and best practice One of the
More informationBCS Higher Education Qualifications. Diploma in IT. Professional Project Syllabus
BCS Higher Education Qualifications Diploma in IT Professional Project Syllabus Version 2.0 December 2016 This is a United Kingdom government regulated qualification which is administered and approved
More informationData Protection Policy
Data Protection Policy Addressing the General Data Protection Regulation (GDPR) 2018 [EU] and the Data Protection Act (DPA) 2018 [UK] For information on this Policy or to request Subject Access please
More information1. PM as Profession 2. Definitions and Outcomes 3. Registration of Designations 4. PMSA Member Profile 5. What to do now 6. A Vision for our Future
1. PM as Profession 2. Definitions and Outcomes 3. Registration of Designations 4. PMSA Member Profile 5. What to do now 6. A Vision for our Future When is it a profession and not a: Trade Discipline Craft
More informationTHE BERKSHIRE ARCHERY COACHING GROUP PRIVACY NOTICE
Berkshire Archery Coaching Group Serving the Coaches of the County Association of Berkshire THE BERKSHIRE ARCHERY COACHING GROUP PRIVACY NOTICE Abstract This notice explains how the Berkshire Archery Coaching
More informationUse of Personal Mobile Phone Whilst on Duty
Use of Personal Mobile Phone Whilst on Duty (Incorporating Smartphones and Hand Held Devices) Standard Operating Procedure Notice: This document has been made available through the Police Service of Scotland
More informationletters to The Scottish Parliament and texts to
SPCB Privacy Notice This privacy statement explains how we collect and use personal information about you for the following process: General enquiry correspondence including to education, outreach and
More informationARCHITECTS REGISTRATION COUNCIL PROFESSIONAL EXAMINATION RULES AND GUIDELINES JUNE 2017
ARCHITECTS REGISTRATION COUNCIL PROFESSIONAL EXAMINATION RULES AND GUIDELINES JUNE 2017 Plot 50669 Tholo Office Park Tsuma Unit 1B Fairgrounds, Gaborone Tel: +267 3951830 I Fax: +267 3913730 Email: info@arc.org.bw
More informationInformation Security Controls Policy
Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January
More informationHF Markets SA (Pty) Ltd Protection of Personal Information Policy
Protection of Personal Information Policy Protection of Personal Information Policy This privacy statement covers the website www.hotforex.co.za, and all its related subdomains that are registered and
More informationContinuing Professional Development ( CPD ) Programme Charter
Continuing Professional Development ( CPD ) Programme Charter 1. Summary 1.1. Education is not only an entry requirement into a profession, but has to establish and sustain a culture of lifelong learning.
More informationProfessional Certificate in Data Protection 18
Professional Certificate in Data Protection 18 19 Postgraduate Education 2018/2019 www.iob.ie/postgrad Who we are The Institute of Banking The Institute of Banking is the largest professional institute
More informationIntroduction to the Personal Data (Privacy) Ordinance
Introduction to the Personal Data (Privacy) Ordinance 1 Personal Data (Privacy) Ordinance Legislative Background Personal Data (Privacy) Ordinance came into effect on 20 December 1996 Amendment of the
More informationQualification Specification for the Knowledge Modules that form part of the BCS Level 3 Infrastructure Technician Apprenticeship
Qualification Specification for the Knowledge Modules that form part of the BCS Level 3 Infrastructure Technician Apprenticeship BCS Level 3 Award in Networking and Architecture BCS Level 3 Award in Mobile
More informationRequirements on new data protection regulations and current changing needs from the view of the EDPS
Requirements on new data protection regulations and current changing needs from the view of the EDPS 10/11/2015, Berlin Wojciech Wiewiórowski ISSE 2015. Making Europe a safer place to do business M. Narojek
More informationCYBER CRIME A COMPARATIVE LAW ANALYSIS SANDRA MARIANA MAAT. submitted in part fulfilment of the requirements for the degree of MAGISTER LEGUM.
CYBER CRIME A COMPARATIVE LAW ANALYSIS by SANDRA MARIANA MAAT submitted in part fulfilment of the requirements for the degree of MAGISTER LEGUM at the UNIVERSITY OF SOUTH AFRICA SUPERVISOR: PROF D P VAN
More informationINFORMATION SECURITY PRINCIPLES OF THE UNIVERSITY OF JYVÄSKYLÄ
INFORMATION SECURITY PRINCIPLES OF THE UNIVERSITY OF JYVÄSKYLÄ JYVÄSKYLÄN YLIOPISTO Introduction With the principles described in this document, the management of the University of Jyväskylä further specifies
More informationUWTSD Group Data Protection Policy
UWTSD Group Data Protection Policy Contents Clause Page 1. Policy statement... 1 2. About this policy... 1 3. Definition of data protection terms... 1 4. Data protection principles..3 5. Fair and lawful
More informationData Breach Notification: what EU law means for your information security strategy
Data Breach Notification: what EU law means for your information security strategy Olivier Proust December 8, 2011 Hunton & Williams LLP Key points 1. Introduction 2. Overview of data breach requirements
More informationLevel 1 Internet Safety for IT Users ( )
Level 1 Internet Safety for IT Users (7574-135) ITQ (QCF) Assignment guide for Candidates Assignment A www.cityandguilds.com November 2011 Version 1.0 About City & Guilds City & Guilds is the UK s leading
More informationCandidate Handbook Certified Commissioning Firm (CCF) Program
Candidate Handbook Certified Commissioning Firm (CCF) Program Building Commissioning Certification Board 1600 NW Compton Drive, Suite 200 Beaverton, OR 97006 Phone: (844) 881-8601 E-mail: certification@bcxa.org
More informationIS Audit and Assurance Guideline 2002 Organisational Independence
IS Audit and Assurance Guideline 2002 Organisational Independence The specialised nature of information systems (IS) audit and assurance and the skills necessary to perform such engagements require standards
More informationCOURSES FOR DATA PROTECTION PRACTITIONERS (INCLUDING THE BCS PRACTITIONER QUALIFICATION)
COURSES FOR DATA PROTECTION PRACTITIONERS (INCLUDING THE BCS PRACTITIONER QUALIFICATION) If you book a Practitioner Course, you are also entitled to attend at our GDPR Workshop at no extra charge DATA
More information10007/16 MP/mj 1 DG D 2B
Council of the European Union Brussels, 9 June 2016 (OR. en) 10007/16 OUTCOME OF PROCEEDINGS From: On: 9 June 2016 To: General Secretariat of the Council Delegations No. prev. doc.: 9579/16 + COR 1 Subject:
More information- OQSF - Occupational Qualifications Sub-framework
All qualifications and part qualifications registered on the National Qualifications Framework are public property. Thus the only payment that can be made for them is for service and reproduction. It is
More informationResponsible Officer Approved by
Responsible Officer Approved by Chief Information Officer Council Approved and commenced August, 2014 Review by August, 2017 Relevant Legislation, Ordinance, Rule and/or Governance Level Principle ICT
More informationA1 Complete Plumbing and Heating Limited Job Applicant Privacy Notice
A1 Complete Plumbing and Heating Limited Job Applicant Privacy Notice A1 Complete Plumbing and Heating Limited ( A1 ), Company Number 06272295 whose registered office is 1 Horsefair Mews, Romsey, England,
More informationG2 Guide to IAgrE Membership Grades, Requirements for Engineering Council (UK) and Society for the Environment Registration
Institution of Agricultural Engineers G2, Requirements for Engineering Council (UK) and Society for the Environment Registration Author Alastair Taylor Date 19 June 2017 Introduction The Institution of
More informationRITTECH PROVIDES A RECOGNISED BENCHMARK OF STANDING ACROSS DIGITAL AND TECH INDUSTRIES
RITTECH PROVIDES A RECOGNISED BENCHMARK OF STANDING ACROSS DIGITAL AND TECH INDUSTRIES BCS, The Chartered Institute for IT First Floor, Block D, North Star House, North Star Avenue, Swindon SN2 1FA This
More informationThe West End Community Trust Privacy Policy
The West End Community Trust Privacy Policy We are committed to protecting your personal information and being transparent about what we do with it, however you interact with us. We are therefore committed
More informationGDPR Guidance for Co-operatives Data Protection and the GDPR: what do you need to know?
GDPR Guidance for Co-operatives Data Protection and the GDPR: what do you need to know? This toolkit has been produced in partnership with Anthony Collins Solicitors. 2 Data Protection and the GDPR: what
More informationFrequently asked questions on video-surveillance: prior checking
Last updated on 17 March 2010 Frequently asked questions on video-surveillance: prior checking 1. What is prior checking? Article 27 of the Data Protection Regulation 1 provides that "processing operations
More informationBCS Level 4 Certificate in Cyber Security Introduction Syllabus QAN 603/0830/8
in Cyber Security Introduction Syllabus QAN 603/0830/8 Version 1.2 November 2016 This is a United Kingdom government regulated qualification which is administered and approved by one or more of the following:
More information