ITNP023 - Autumn Aims

Size: px
Start display at page:

Download "ITNP023 - Autumn Aims"

Transcription

1 PROFESSIONAL ISSUES

2 2 Aims Give a precise meaning of the terms profession and professional Discuss the obligations and privileges which membership of a profession carries Consider some codes of conduct that arise in UK computing Consider some legislations in UK computing

3 3 Professionalism What is a profession and what is involved in being a professional? Just doing it for money ( professional footballer ) Or do we mean something else? 3

4 4 Professionalism From Chambers 20th Century Dictionary: Profession: an employment not mechanical and requiring some degree of learning: a calling, habitual employment; the collective body of persons engaged in any profession; Features that collective bodies have in common: The collective body controls entry to a profession; Is self governing, in the sense that it establishes and enforces a code of conduct to its members; Is established either by a Royal Charter or by statute (act of Parliament) which requires it to undertake certain duties and responsibilities.

5 5 Professionalism The archetypal professions are medicine and law General features: a service relationship: a vendor and a purchaser, but no tangible commodity that can be sold on the vendor ( professional ) belongs to a specialist group possessing arcane skills (eg medical doctor) the purchaser may be forced to buy, or otherwise face e.g. disease, imprisonment The relationship is inherently unequal The purchaser is dependent on the integrity and skill of the vendor 5

6 6 Regulations of a profession A professional body sets: Standards of education as a condition of entry and achievement of professional status. Ethical standards and ethical rules which are to be followed by members. Rules are designed for the benefit of the public, typically stressing the pre-eminence of the client s interests over those of the service provider. Each profession has an appropriate degree of independence in setting professional standards whilst allowing Government to legislate for the public interest.

7 7 Benefits to the professional In exchange for these concessions, the specialist group typically demands new forms of market power Normally mediated through a closed association, guild... These include monopoly of practice control of entry and training self-regulation, both of normal practice and of disciplinary procedures There is no single picture: but professionalisation may bring practitioners benefits in both income and esteem Or they may find that their own ethics make them vulnerable (eg hospital doctors) 7

8 8 Professionalisation as a goal Occupational groups are often very keen to grasp the benefits particularly the market power conferred by monopoly plus control of recruitment & training Frequently we find sustained campaigns by groups to achieve professional status or to deny it to competing groups Professionalisation may bring benefits to others particularly purchasers For example, defined norms of duty to the client continual improvement of personal skills detection and prevention of abuse May bring very much better services 8

9 9 Computing in the UK BCS, The Chartered Institute for IT (formerly British Computer Society) is the professional society for Information System Engineers in the UK Its professional qualifications are based on the scheme for engineers: Chartered Information Technology Professional (CITP) Chartered Scientist (CSci) Chartered Engineer (CEng) 9

10 10 Membership of the BCS It has its own entrance exams A university can apply for its own degrees to provide exemption from the BCS exams this involves inspection every five years The BCS recognises the Stirling MSc IT for part-exemption from its entrance examination requirements for CITP See for membership details MBCS requires additional professional experience: 5 years IT work experience, or 2-3 years IT work experience plus relevant recognised qualifications (depending on level of qualification), or an Honours degree with BCS accreditation. 10

11 11 The BCS s Professional Code Stresses the need to balance one s duty to the employer (or client) and to the public. Strong emphasis on competence and duty of care towards the client and towards the public. The information professional must seek to upgrade their professional knowledge and skill and shall maintain awareness of technological developments, procedures and standards. See the BCS Code of Conduct and Code of Good Practice at Violations of the Code by members will be considered under the Society s disciplinary procedures. 11

12 12 Excerpts from the BCS Code of Conduct Public interest: You shall have due regard for public health, privacy, security and wellbeing of others and the environment. You shall promote equal access to the benefits of IT and seek to promote the inclusion of all sectors in society wherever opportunities arise. Duty to relevant authority: You shall carry out your professional responsibilities with due care and diligence in accordance with the Relevant Authority s requirements whilst exercising your professional judgement at all times. You shall accept professional responsibility for your work and for the work of colleagues who are defined in a given context as working under your supervision. 12

13 13 Excerpts from the BCS Code of Conduct Professional competence and integrity You shall only undertake to do work or provide a service that is within your professional competence. You shall NOT claim any level of competence that you do not possess. You shall develop your professional knowledge, skills and competence on a continuing basis, maintaining awareness of technological developments, procedures, and standards that are relevant to your field. You shall ensure that you have the knowledge and understanding of Legislation and that you comply with such Legislation, in carrying out your professional responsibilities. Duty to the profession You shall accept your personal duty to uphold the reputation of the profession and not take any action which could bring the profession into disrepute. 13

14 14 Legal Framework Probably the four most important pieces of UK computing legislation are: The Data Protection Act (discussed in ITNP033) The Freedom of Information Act (discussed in ITNP033) The Computer Misuse Act together with the Police and Justice Act (2006) The Regulation of Investigatory Powers Act The Computer Misuse Act (1990) drafted after two hackers left a message in the Duke of Edinburgh s mailbox introduces three new offences 14

15 15 CMA Section 1 1. A person is guilty of an offence if (a) he causes a computer to perform any function with intent to secure access to any program or data held in any computer; (b) the access he intends to secure is unauthorised; and (c) he knows at the time when he causes the computer to perform the function that is the case 2. The intent a person has to have to commit an offence under this section need not be directed at (a) any particular program or data; (b) a program or data of any particular kind; or (c) a program or data held in any particular computer. (up to six months imprisonment and/or up to 2000 penalty) 15

16 16 CMA Section 2 & 3 Section 2 covers cases where the Section 1 offence is aggravated by an intent to commit a further crime (e.g. blackmail, theft) Section 3 covers any act which causes unauthorised modification of computer material [with intent to] (a) to impair the operation of any computer; (b) to prevent or hinder access to any program or data held in any computer; or (c) to impair the operation of any such program or the reliability of any such data In both cases the penalty is an unlimited fine and up to five years imprisonment 16

17 17 The DOS attack loophole The Computer Misuse Act did not deal well with Denial of Service (DOS) attacks. What is a DOS attack? Nothing to do with Microsoft s DOS operating system! In a DOS attack, a server on a network is maliciously bombarded with a huge volume of requests, effectively bringing it to a standstill. An example: Three Russian hackers extorted up to 2M from UK online bookmakers, by threatening to launch DOS attacks against their websites. Placing a bet is a legitimate use of a gambling website, so it would have been difficult to argue that this was a crime under the CMA. 17

18 18 The Police and Justice Act (2006) The Police and Justice Act (2006) broadens the scope of the CMA and imposes tougher penalties. It closes the DOS attack loophole by making it an offence to commit an unauthorised act in relation to a computer which has the effect that it impairs the operation of any computer The PJA also: makes it an offence to obtain or distribute software (such as hacking tools) if it is known that it will be used for illegal purposes. increases the penalties for the crimes defined under the CMA (up to 10 years imprisonment for some offences). and the Russian hackers? They were arrested and tried in Russia in 2006, fined, and sentenced to 8 years imprisonment. 18

19 19 Regulation of Investigatory Powers Act (2000) (Summary from The government can demand that a public telecommunications service intercepts an individual's communications The Home Secretary can serve interception warrants to perform mass surveillance The government can require ISPs to fit equipment that enables them to perform surveillance The government can demand that decryption keys be handed over in order to access protected information not yet in force 19

20 20 Regulation of Investigatory Powers Act (2000) The government can access internet traffic data for... any reason the Secretary of State deems fit Surveillance data may not be used in legal proceedings so if someone has illegitimately been the subject of an interception warrant there is no legal way for them to know about it. Needless to say, there has been some controversy about this law! press-freedomstate-surveillance-straw-editorial 20

21 21 Tutorial We will have a tutorial to discuss aspects of professional conduct

BCS Higher Education Qualifications. Diploma in IT. Professional Issues in Information Systems Practice Syllabus

BCS Higher Education Qualifications. Diploma in IT. Professional Issues in Information Systems Practice Syllabus BCS Higher Education Qualifications Diploma in IT Professional Issues in Information Systems Practice Syllabus Version 3.0 December 2016 This is a United Kingdom government regulated qualification which

More information

School of Engineering & Built Environment

School of Engineering & Built Environment School of Engineering & Built Environment BEng (Hons) in Digital Security, Forensics & Ethical Hacking Programme Specification Proforma (PSP) August 2015 P a g e 1 GLASGOW CALEDONIAN UNIVERSITY Programme

More information

Communication and Usage of Internet and Policy

Communication and Usage of Internet and  Policy Communication and Usage of Internet and Email Policy Policy Category Administration Policy Code ADM HE 27 Policy owner Chief Executive Officer Responsible Officer Chief Executive Officer Approving authority

More information

Reach your potential. Activate your membership

Reach your potential. Activate your membership Reach your potential Activate your membership There has never been a better time to join BCS, The Chartered Institute for IT, champions the global IT profession and the interests of individuals engaged

More information

MEMBERSHIP CAN MAKE THE DIFFERENCE

MEMBERSHIP CAN MAKE THE DIFFERENCE MEMBERSHIP CAN MAKE THE DIFFERENCE JOIN OUR COMMUNITY AND START YOUR JOURNEY BCS, The Chartered Institute for IT is committed to making IT good for society. We promote wider social and economic progress

More information

Obtaining Chartered Status in the Chartered Institute for IT. Keith Taylor

Obtaining Chartered Status in the Chartered Institute for IT. Keith Taylor Obtaining Chartered Status in the Chartered Institute for IT Keith Taylor About me I worked for IBM most of my life as a designer, technical specialist, and product planner I am a CITP, Chartered Engineer,

More information

Application Guidelines. Last modified June

Application Guidelines. Last modified June Application Guidelines Last modified June 2017 1 Table of Contents Section 1: About the NER... 3 Section 2: Why be Registered on the NER?... 3 Section 3: NER Areas of Practice... 4 Section 4: Benefits

More information

Initial CITP and CSci (partial fulfilment). *Confirmation of full accreditation will be sought in 2020.

Initial CITP and CSci (partial fulfilment). *Confirmation of full accreditation will be sought in 2020. PROGRAMME SPECIFICATION Master of Computing (Hons) in Computer Forensics Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool John Moores University

More information

Chartered Membership: Professional Standards Framework

Chartered Membership: Professional Standards Framework Chartered Membership: Professional Standards Framework Foreword The Chartered Institute of Architectural Technologists (CIAT) is the lead professional body for Architectural Technology and the UK Competent

More information

UCL Policy on Electronic Mail ( )

UCL Policy on Electronic Mail ( ) LONDON S GLOBAL UNIVERSITY UCL Policy on Electronic Mail (EMAIL) Information Security Policy University College London Document Summary Document ID Status Information Classification Document Version TBD

More information

University Privacy Campaign. Introduction to the Personal Data (Privacy) Ordinance

University Privacy Campaign. Introduction to the Personal Data (Privacy) Ordinance University Privacy Campaign Introduction to the Personal Data (Privacy) Ordinance 1 Personal Data (Privacy) Ordinance Legislative Background Personal Data (Privacy) Ordinance came into effect on 20 December

More information

Superior. Responsibility. (Typically for a period. of five years) Passed IRSE Professional Exam or IRSE recognised equivalent.

Superior. Responsibility. (Typically for a period. of five years) Passed IRSE Professional Exam or IRSE recognised equivalent. This flowchart provides guidance on the various routes to the grades of Fellow, Member and Associate Member (for other grades click here). Full details of the requirements are contained within the Bye-Laws

More information

DATA PROTECTION IN RESEARCH

DATA PROTECTION IN RESEARCH DATA PROTECTION IN RESEARCH Document control Applicable to: All employees and research students Date first approved February 2006 Date first amended May 2015 Date last amended May 2015 Approved by Approval

More information

Child Online Protection in Child Pornography Namibia

Child Online Protection in Child Pornography Namibia Child Online Protection in Child Pornography Namibia Regulation in Namibia UNICEF Namibia Presented by: Jolanda van Westering Outline Introduction Typology of online abuse and exploitation Scale and response

More information

Working with investment professionals

Working with investment professionals Working with investment professionals www.uksip.org UKSIP is a member society of UKSIP - its four defining characteristics Professional excellence in its core activities These activities are: Support and

More information

Draft. Policies of Colorado State University University Policy. Category: Information Technology

Draft. Policies of Colorado State University University Policy. Category: Information Technology Policies of Colorado State University University Policy Policy Title: Acceptable Use for Computing and Networking Resources Category: Information Technology Owner: Vice President for Information Technology

More information

Introduction to the Personal Data (Privacy) Ordinance

Introduction to the Personal Data (Privacy) Ordinance Introduction to the Personal Data (Privacy) Ordinance Personal Data (Privacy) Ordinance Legislative Background Personal Data (Privacy) Ordinance came into effect on 20 December 1996 Amendment of the Ordinance

More information

Introduction to the Personal Data (Privacy) Ordinance

Introduction to the Personal Data (Privacy) Ordinance Introduction to the Personal Data (Privacy) Ordinance Personal Data (Privacy) Ordinance Legislative Background Personal Data (Privacy) Ordinance came into effect on 20 December 1996 Amendment of the Ordinance

More information

SPECIAL CONDITIONS FOR SO YOU START DEDICATED SERVER RENTAL Latest version dated 03/12/2013

SPECIAL CONDITIONS FOR SO YOU START DEDICATED SERVER RENTAL Latest version dated 03/12/2013 SPECIAL CONDITIONS FOR SO YOU START DEDICATED SERVER RENTAL Latest version dated 03/12/2013 ARTICLE 1: PURPOSE The purpose of these Special Conditions, which supplement the So You Start General Conditions

More information

SQA Advanced Unit specification: general information. Professionalism and Ethics in Computing

SQA Advanced Unit specification: general information. Professionalism and Ethics in Computing SQA Advanced Unit specification: general information Unit title: Professionalism and Ethics in Computing Unit code: HP29 47 Superclass: DE Publication date: August 2017 Source: Scottish Qualifications

More information

New Zealand Certificate in Regulatory Compliance (Core Knowledge) (Level 3)

New Zealand Certificate in Regulatory Compliance (Core Knowledge) (Level 3) New Zealand Certificate in Regulatory Compliance (Core Knowledge) (Level 3) If your staff need to learn the basics about regulatory compliance in New Zealand, then this is the paper for them. This qualification

More information

Privacy Policy GENERAL

Privacy Policy GENERAL Privacy Policy GENERAL This document sets out what information Springhill Care Group Ltd collects from visitors, how it uses the information, how it protects the information and your rights. Springhill

More information

The Lee Wiggins Childcare Centre E-SAFETY, PHOTOGRAPHY and VIDEO POLICY

The Lee Wiggins Childcare Centre E-SAFETY, PHOTOGRAPHY and VIDEO POLICY Policy for the acceptable use of mobile phones and cameras by the staff of the Lee Wiggins Childcare Centre (LWCC) Mobile Phones In order to provide a safe environment for children, parents and staff we

More information

PROGRAMME SPECIFICATION

PROGRAMME SPECIFICATION PROGRAMME SPECIFICATION Bachelor of Science with Honours (SW) (Fnd) in Computer Forensics Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool

More information

UWC International Data Protection Policy

UWC International Data Protection Policy UWC International Data Protection Policy 1. Introduction This policy sets out UWC International s organisational approach to data protection. UWC International is committed to protecting the privacy of

More information

Full-Time: 4 Years, Sandwich Thick: 5 Years All LJMU programmes are delivered and assessed in English

Full-Time: 4 Years, Sandwich Thick: 5 Years All LJMU programmes are delivered and assessed in English PROGRAMME SPECIFICATION Bachelor of Science with Honours (SW) (Fnd) in Computer Forensics Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool

More information

CONTINUING PROFESSIONAL DEVELOPMENT REGULATIONS

CONTINUING PROFESSIONAL DEVELOPMENT REGULATIONS CONTINUING PROFESSIONAL DEVELOPMENT REGULATIONS WHAT IS CPD? Continuing Professional Development (CPD) is an ongoing requirement to undertake education, maintain a current knowledge base and improve skills

More information

Subject: Kier Group plc Data Protection Policy

Subject: Kier Group plc Data Protection Policy Kier Group plc Data Protection Policy Subject: Kier Group plc Data Protection Policy Author: Compliance Document type: Policy Authorised by: Kier General Counsel & Company Secretary Version 3 Effective

More information

The Role of the Data Protection Officer

The Role of the Data Protection Officer The Role of the Data Protection Officer Adrian Ross LLB (Hons), MBA GRC Consultant IT Governance Ltd 28 July 2016 www.itgovernance.co.uk Introduction Adrian Ross GRC consultant Infrastructure services

More information

Positive Action Group Single Resident Record. Steve Burrows

Positive Action Group Single Resident Record. Steve Burrows Positive Action Group Single Resident Record Steve Burrows RFC 1983: Internet Users' Glossary hacker A person who delights in having an intimate understanding of the internal workings of a system, computers

More information

Rules and Regulations for Entry to Grades of Membership

Rules and Regulations for Entry to Grades of Membership Rules and Regulations for Entry to Grades of Membership GENERAL Introduction These Rules and Regulations are enacted under the By-Laws of the Institute to detail the entry qualifications and requirements

More information

In brief, these criteria or elements of a profession are as follows:

In brief, these criteria or elements of a profession are as follows: Professionalism and Internal Auditors In the Middle Ages, law, medicine, university teaching, and religion were considered the learned professions. In the early 1900s, dentistry and architecture were added.

More information

DATA PROTECTION POLICY THE HOLST GROUP

DATA PROTECTION POLICY THE HOLST GROUP DATA PROTECTION POLICY THE HOLST GROUP INTRODUCTION The purpose of this document is to provide a concise policy regarding the data protection obligations of The Holst Group. The Holst Group is a data controller

More information

Professional certification from BCS, The Chartered Institute for IT. bcs.org/certification

Professional certification from BCS, The Chartered Institute for IT. bcs.org/certification Professional certification from BCS, The Chartered Institute for IT bcs.org/certification 02 03 INTRODUCTION BCS, The Chartered Institute for IT, is the leading institute for IT professionals around the

More information

University of Ulster Standard Cover Sheet

University of Ulster Standard Cover Sheet University of Ulster Standard Cover Sheet Document Title AUTHENTICATION STANDARD 2.0 Custodian Approving Committee ISD Heads ISD Committee Policy approved date 2011 10 13 Policy effective from date 2011

More information

NOW IS THE TIME. to secure our future

NOW IS THE TIME. to secure our future NOW IS THE TIME to secure our future A FRAMEWORK FOR UNITING THE CANADIAN ACCOUNTING PROFESSION VISION FOR THE PROFESSION To be the pre-eminent, internationally recognized Canadian accounting designation

More information

Cybercrime Criminal Law Definitions and Concepts

Cybercrime Criminal Law Definitions and Concepts Cybercrime Criminal Law Definitions and Concepts How to Criminalize Attacks on Computer Networks and Information Computer Crime and Intellectual Property Section U.S. Department of Justice 1 Overview Introduction

More information

PROFESSIONAL REGISTRATION OPPORTUNITIES

PROFESSIONAL REGISTRATION OPPORTUNITIES PROFESSIONAL REGISTRATION OPPORTUNITIES Engineering Incorporated Chartered Technician Engineer Engineer WHAT IS SOE? We are a professional membership organisation supporting and developing individuals

More information

Access to personal accounts and lawful business monitoring

Access to personal  accounts and lawful business monitoring Access to personal email accounts and lawful business monitoring Contents Policy statement... 2 Access to personal emails... 2 Manager suspects misuse... 3 Lawful business monitoring... 4 Additional information...

More information

New Zealand Certificate in Regulatory Compliance (Operational Practice) Level 4

New Zealand Certificate in Regulatory Compliance (Operational Practice) Level 4 New Zealand Certificate in Regulatory Compliance (Operational Practice) Level 4 This qualification is designed for people who work in frontline roles that deal with the operational aspects of regulatory

More information

Certified Addiction Recovery Coach Application

Certified Addiction Recovery Coach Application Certified Addiction Recovery Coach Application A Project of ASAP - Alcoholism & Substance Abuse Providers of New York State 11 North Pearl Street, Suite 801 Albany New York 12207 Phone: 518.426.0945 Fax:

More information

ACCA Certificate in Audit (RQF Level 4) Qualification specification

ACCA Certificate in Audit (RQF Level 4) Qualification specification ACCA Certificate in Audit (RQF Level 4) Qualification specification ABOUT ACCA We re the world s most forward thinking professional accountancy body. We believe that accountancy is vital for economies

More information

A Comparative Study of Teaching Forensics at a University Degree Level

A Comparative Study of Teaching Forensics at a University Degree Level A Comparative Study of Teaching Forensics at a University Degree Level Martin Mink University of Mannheim, Germany IMF 2006, Stuttgart October 19 Joint Work Laboratory for Dependable Distributed Systems

More information

PTLGateway Acceptable Use Policy

PTLGateway Acceptable Use Policy 1 PTLGateway Acceptable Use Policy Last Updated Date: 02 March 2018 Acceptable Use Policy Your use of our Services must fall within our Acceptable Usage Policy. Contents Key details... 1 COVERAGE OF THIS

More information

NEWTON COUNTY OPEN RECORDS ACT POLICY

NEWTON COUNTY OPEN RECORDS ACT POLICY NEWTON COUNTY OPEN RECORDS ACT POLICY As a public entity, Newton County is subject to the Open Records Act, O. C. G.A. 50-18- 70 et seq. Newton County is committed to conducting its business in a manner

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Preamble This document may be augmented or replaced by relevant sections of other parts of our Agreement, and should be read in conjunction with other supporting documents, so please

More information

Garry Mukelabai Communications Authority Zambia

Garry Mukelabai Communications Authority Zambia Garry Mukelabai Communications Authority Zambia ICT in Zambia. Current and Future Legislations. Way Forward? Pop 12 million. Zambia pioneers of internet in region. Over 10 Internet Service Providers Internet

More information

FPA CONTINUING PROFESSIONAL DEVELOPMENT POLICY. Updated: February 2019

FPA CONTINUING PROFESSIONAL DEVELOPMENT POLICY. Updated: February 2019 FPA CONTINUING PROFESSIONAL DEVELOPMENT POLICY Updated: February 2019 FPA CONTINUING DEVELOPMENT POLICY Contents 1. Purpose... 3 2. Summary of requirements... 4 3. Acceptable CPD Content... 6 a. CPD Hours...

More information

Cleveland State University General Policy for University Information and Technology Resources

Cleveland State University General Policy for University Information and Technology Resources Cleveland State University General Policy for University Information and Technology Resources 08/13/2007 1 Introduction As an institution of higher learning, Cleveland State University both uses information

More information

CISI Membership Policy: CERTIFIED FINANCIAL PLANNER (CFP TM )

CISI Membership Policy: CERTIFIED FINANCIAL PLANNER (CFP TM ) CISI Membership Policy: CERTIFIED FINANCIAL PLANNER (CFP TM ) This policy relates to the process for voting members to obtain and maintain the Certified Financial Planner TM Certification 1.1 Certified

More information

Pathways CIC Privacy Policy. Date Issued: May Date to be Reviewed: May Issued by Yvonne Clarke

Pathways CIC Privacy Policy. Date Issued: May Date to be Reviewed: May Issued by Yvonne Clarke Prepared by: M Franklin Issued: May 2018 Pathways Community Interest Company Review due: May 2020 Pathways CIC Privacy Policy Version 0.3 Approved by: Yvonne Clarke Approval date: 21.05.2018 Pathways CIC

More information

Cayman Islands Data Protection Law Guide Book

Cayman Islands Data Protection Law Guide Book Cayman Islands Data Protection Law Guide Book 2017 Guide Book Cayman Islands Data Protection Law, 2017 1. Background and Overview On 27 March 2017 the Data Protection Law, 2017 (Law) was passed by the

More information

Motorola Mobility Binding Corporate Rules (BCRs)

Motorola Mobility Binding Corporate Rules (BCRs) Motorola Mobility Binding Corporate Rules (BCRs) Introduction These Binding Privacy Rules ( Rules ) explain how the Motorola Mobility group ( Motorola Mobility ) respects the privacy rights of its customers,

More information

ILM Whistle-blowing Policy for Centres, Providers and Candidates

ILM Whistle-blowing Policy for Centres, Providers and Candidates ILM Whistle-blowing Policy for Centres, Providers and Candidates V1 November 2017 Contents Document Change History 2 Scope 3 Definition 3 How to report a concern 4 What happens next? 4 Confidentiality

More information

ΚΕΝΤΡΟ ΜΕΛΕΤΩΝ ΑΣΦΑΛΕΙΑΣ CENTER FOR SECURITY STUDIES

ΚΕΝΤΡΟ ΜΕΛΕΤΩΝ ΑΣΦΑΛΕΙΑΣ CENTER FOR SECURITY STUDIES ΚΕΝΤΡΟ ΜΕΛΕΤΩΝ ΑΣΦΑΛΕΙΑΣ CENTER FOR SECURITY STUDIES Under which conditions is an investigation authorised/permitted? Which are the legal boundaries and the applicable operational rules? Is the Data Protection

More information

KEY PROGRAMME INFORMATION. Originating institution(s) Bournemouth University. Faculty responsible for the programme Faculty of Science and Technology

KEY PROGRAMME INFORMATION. Originating institution(s) Bournemouth University. Faculty responsible for the programme Faculty of Science and Technology KEY PROGRAMME INFORMATION Originating institution(s) Bournemouth University Faculty responsible for the programme Faculty of Science and Technology Final award(s), title(s) and credits 20 (60 ECTS) Level

More information

Cognizant Careers Portal Privacy Policy ( Policy )

Cognizant Careers Portal Privacy Policy ( Policy ) Cognizant Careers Portal Privacy Policy ( Policy ) Date: 22 March 2017 Introduction This Careers Portal Privacy Policy ("Policy") applies to the Careers portal on the Cognizant website accessed via www.cognizant.com/careers

More information

General Legal Requirements under the Act and Relevant Subsidiary Legislations. Personal data shall only be processed for purpose of the followings:

General Legal Requirements under the Act and Relevant Subsidiary Legislations. Personal data shall only be processed for purpose of the followings: General Legal Requirements regarding the Personal Data Protection ( PDP ) Principles under the PDP Act 2010 ( Act ) and the relevant Subsidiary Legislations PDP Principles General Principle Data users

More information

Grove Country Day School aka Academ y Acceptable Use Policy (AUP)

Grove Country Day School aka Academ y Acceptable Use Policy (AUP) Grove Country Day School aka Academ y Acceptable Use Policy (AUP) Computer & Network Access Wireless Devices Students, staff and members of the community using Grove Country Day School LLC aka Academy

More information

Policy on Privacy and Management of Personal Information

Policy on Privacy and Management of Personal Information Policy on Privacy and Management of Personal Information Purpose The purpose of this privacy policy is to: clearly communicate how SMA manages personal information; provide students, members, staff and

More information

Legal framework of ensuring of cyber security in the Republic of Azerbaijan

Legal framework of ensuring of cyber security in the Republic of Azerbaijan Legal framework of ensuring of cyber security in the Republic of Azerbaijan Bakhtiyar N.Mammadov Ministry of Communications and Information Technologies Head of Legal and HR Department ITU WSIS Thematic

More information

DCU Guide to Subject Access Requests. Under Irish Data Protection Legislation

DCU Guide to Subject Access Requests. Under Irish Data Protection Legislation DCU Guide to Subject Access Requests Under Irish Data Protection Legislation Context Under section 4 of the Irish Data Protection Acts 1988 & 2003 an individual, on making a written request to DCU, may

More information

EVALUATION AND APPROVAL OF AUDITORS. Deliverable 4.4.3: Design of a governmental Social Responsibility and Quality Certification System

EVALUATION AND APPROVAL OF AUDITORS. Deliverable 4.4.3: Design of a governmental Social Responsibility and Quality Certification System EVALUATION AND APPROVAL OF AUDITORS Deliverable 4.4.3: Design of a governmental Social Responsibility and Quality Certification System 1 TABLE OF CONTENTS 1. Scope and field of Application 3 2. Normative

More information

Project Better Energy Limited s registered office is Witan Gate House, Witan Gate West, Milton Keynes, Buckinghamshire, MK9 1SH

Project Better Energy Limited s registered office is Witan Gate House, Witan Gate West, Milton Keynes, Buckinghamshire, MK9 1SH PRIVACY NOTICE Curv360 is a part of the Project Better Energy Limited group of companies and is a controller of any personal data you provide. We respect your data and your privacy is important to us.

More information

PRIVACY NOTICE VOLUNTEER INFORMATION. Liverpool Women s NHS Foundation Trust

PRIVACY NOTICE VOLUNTEER INFORMATION. Liverpool Women s NHS Foundation Trust PRIVACY NOTICE VOLUNTEER INFORMATION Liverpool Women s NHS Foundation Trust Introduction This document summarises who we are, what information we hold about you, what we will do with the information we

More information

SMS SERVICE PROVISION

SMS SERVICE PROVISION SMS SERVICE PROVISION Terms and Conditions and Privacy Policy Version 2.05 Jan 2017 Page 1 Contents TERMS & CONDITIONS... 3 Registration... 3 Your Personal Information... 3 Our Obligations to SMS Service

More information

THE CAN-SPAM ACT OF 2003: FREQUENTLY ASKED QUESTIONS EFFECTIVE JANUARY 1, December 29, 2003

THE CAN-SPAM ACT OF 2003: FREQUENTLY ASKED QUESTIONS EFFECTIVE JANUARY 1, December 29, 2003 THE CAN-SPAM ACT OF 2003: FREQUENTLY ASKED QUESTIONS EFFECTIVE JANUARY 1, 2004 This FAQ is not intended to provide specific advice about individual legal, business, or other questions. It was prepared

More information

Become an IT professional. Achieve a professional IT qualification. Higher Education Qualifications in IT

Become an IT professional. Achieve a professional IT qualification. Higher Education Qualifications in IT Become an IT professional Achieve a professional IT qualification Higher Education Qualifications in IT Developed by professionals for professionals Your assurance of quality and best practice One of the

More information

BCS Higher Education Qualifications. Diploma in IT. Professional Project Syllabus

BCS Higher Education Qualifications. Diploma in IT. Professional Project Syllabus BCS Higher Education Qualifications Diploma in IT Professional Project Syllabus Version 2.0 December 2016 This is a United Kingdom government regulated qualification which is administered and approved

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Addressing the General Data Protection Regulation (GDPR) 2018 [EU] and the Data Protection Act (DPA) 2018 [UK] For information on this Policy or to request Subject Access please

More information

1. PM as Profession 2. Definitions and Outcomes 3. Registration of Designations 4. PMSA Member Profile 5. What to do now 6. A Vision for our Future

1. PM as Profession 2. Definitions and Outcomes 3. Registration of Designations 4. PMSA Member Profile 5. What to do now 6. A Vision for our Future 1. PM as Profession 2. Definitions and Outcomes 3. Registration of Designations 4. PMSA Member Profile 5. What to do now 6. A Vision for our Future When is it a profession and not a: Trade Discipline Craft

More information

THE BERKSHIRE ARCHERY COACHING GROUP PRIVACY NOTICE

THE BERKSHIRE ARCHERY COACHING GROUP PRIVACY NOTICE Berkshire Archery Coaching Group Serving the Coaches of the County Association of Berkshire THE BERKSHIRE ARCHERY COACHING GROUP PRIVACY NOTICE Abstract This notice explains how the Berkshire Archery Coaching

More information

Use of Personal Mobile Phone Whilst on Duty

Use of Personal Mobile Phone Whilst on Duty Use of Personal Mobile Phone Whilst on Duty (Incorporating Smartphones and Hand Held Devices) Standard Operating Procedure Notice: This document has been made available through the Police Service of Scotland

More information

letters to The Scottish Parliament and texts to

letters to The Scottish Parliament and texts to SPCB Privacy Notice This privacy statement explains how we collect and use personal information about you for the following process: General enquiry correspondence including to education, outreach and

More information

ARCHITECTS REGISTRATION COUNCIL PROFESSIONAL EXAMINATION RULES AND GUIDELINES JUNE 2017

ARCHITECTS REGISTRATION COUNCIL PROFESSIONAL EXAMINATION RULES AND GUIDELINES JUNE 2017 ARCHITECTS REGISTRATION COUNCIL PROFESSIONAL EXAMINATION RULES AND GUIDELINES JUNE 2017 Plot 50669 Tholo Office Park Tsuma Unit 1B Fairgrounds, Gaborone Tel: +267 3951830 I Fax: +267 3913730 Email: info@arc.org.bw

More information

Information Security Controls Policy

Information Security Controls Policy Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January

More information

HF Markets SA (Pty) Ltd Protection of Personal Information Policy

HF Markets SA (Pty) Ltd Protection of Personal Information Policy Protection of Personal Information Policy Protection of Personal Information Policy This privacy statement covers the website www.hotforex.co.za, and all its related subdomains that are registered and

More information

Continuing Professional Development ( CPD ) Programme Charter

Continuing Professional Development ( CPD ) Programme Charter Continuing Professional Development ( CPD ) Programme Charter 1. Summary 1.1. Education is not only an entry requirement into a profession, but has to establish and sustain a culture of lifelong learning.

More information

Professional Certificate in Data Protection 18

Professional Certificate in Data Protection 18 Professional Certificate in Data Protection 18 19 Postgraduate Education 2018/2019 www.iob.ie/postgrad Who we are The Institute of Banking The Institute of Banking is the largest professional institute

More information

Introduction to the Personal Data (Privacy) Ordinance

Introduction to the Personal Data (Privacy) Ordinance Introduction to the Personal Data (Privacy) Ordinance 1 Personal Data (Privacy) Ordinance Legislative Background Personal Data (Privacy) Ordinance came into effect on 20 December 1996 Amendment of the

More information

Qualification Specification for the Knowledge Modules that form part of the BCS Level 3 Infrastructure Technician Apprenticeship

Qualification Specification for the Knowledge Modules that form part of the BCS Level 3 Infrastructure Technician Apprenticeship Qualification Specification for the Knowledge Modules that form part of the BCS Level 3 Infrastructure Technician Apprenticeship BCS Level 3 Award in Networking and Architecture BCS Level 3 Award in Mobile

More information

Requirements on new data protection regulations and current changing needs from the view of the EDPS

Requirements on new data protection regulations and current changing needs from the view of the EDPS Requirements on new data protection regulations and current changing needs from the view of the EDPS 10/11/2015, Berlin Wojciech Wiewiórowski ISSE 2015. Making Europe a safer place to do business M. Narojek

More information

CYBER CRIME A COMPARATIVE LAW ANALYSIS SANDRA MARIANA MAAT. submitted in part fulfilment of the requirements for the degree of MAGISTER LEGUM.

CYBER CRIME A COMPARATIVE LAW ANALYSIS SANDRA MARIANA MAAT. submitted in part fulfilment of the requirements for the degree of MAGISTER LEGUM. CYBER CRIME A COMPARATIVE LAW ANALYSIS by SANDRA MARIANA MAAT submitted in part fulfilment of the requirements for the degree of MAGISTER LEGUM at the UNIVERSITY OF SOUTH AFRICA SUPERVISOR: PROF D P VAN

More information

INFORMATION SECURITY PRINCIPLES OF THE UNIVERSITY OF JYVÄSKYLÄ

INFORMATION SECURITY PRINCIPLES OF THE UNIVERSITY OF JYVÄSKYLÄ INFORMATION SECURITY PRINCIPLES OF THE UNIVERSITY OF JYVÄSKYLÄ JYVÄSKYLÄN YLIOPISTO Introduction With the principles described in this document, the management of the University of Jyväskylä further specifies

More information

UWTSD Group Data Protection Policy

UWTSD Group Data Protection Policy UWTSD Group Data Protection Policy Contents Clause Page 1. Policy statement... 1 2. About this policy... 1 3. Definition of data protection terms... 1 4. Data protection principles..3 5. Fair and lawful

More information

Data Breach Notification: what EU law means for your information security strategy

Data Breach Notification: what EU law means for your information security strategy Data Breach Notification: what EU law means for your information security strategy Olivier Proust December 8, 2011 Hunton & Williams LLP Key points 1. Introduction 2. Overview of data breach requirements

More information

Level 1 Internet Safety for IT Users ( )

Level 1 Internet Safety for IT Users ( ) Level 1 Internet Safety for IT Users (7574-135) ITQ (QCF) Assignment guide for Candidates Assignment A www.cityandguilds.com November 2011 Version 1.0 About City & Guilds City & Guilds is the UK s leading

More information

Candidate Handbook Certified Commissioning Firm (CCF) Program

Candidate Handbook Certified Commissioning Firm (CCF) Program Candidate Handbook Certified Commissioning Firm (CCF) Program Building Commissioning Certification Board 1600 NW Compton Drive, Suite 200 Beaverton, OR 97006 Phone: (844) 881-8601 E-mail: certification@bcxa.org

More information

IS Audit and Assurance Guideline 2002 Organisational Independence

IS Audit and Assurance Guideline 2002 Organisational Independence IS Audit and Assurance Guideline 2002 Organisational Independence The specialised nature of information systems (IS) audit and assurance and the skills necessary to perform such engagements require standards

More information

COURSES FOR DATA PROTECTION PRACTITIONERS (INCLUDING THE BCS PRACTITIONER QUALIFICATION)

COURSES FOR DATA PROTECTION PRACTITIONERS (INCLUDING THE BCS PRACTITIONER QUALIFICATION) COURSES FOR DATA PROTECTION PRACTITIONERS (INCLUDING THE BCS PRACTITIONER QUALIFICATION) If you book a Practitioner Course, you are also entitled to attend at our GDPR Workshop at no extra charge DATA

More information

10007/16 MP/mj 1 DG D 2B

10007/16 MP/mj 1 DG D 2B Council of the European Union Brussels, 9 June 2016 (OR. en) 10007/16 OUTCOME OF PROCEEDINGS From: On: 9 June 2016 To: General Secretariat of the Council Delegations No. prev. doc.: 9579/16 + COR 1 Subject:

More information

- OQSF - Occupational Qualifications Sub-framework

- OQSF - Occupational Qualifications Sub-framework All qualifications and part qualifications registered on the National Qualifications Framework are public property. Thus the only payment that can be made for them is for service and reproduction. It is

More information

Responsible Officer Approved by

Responsible Officer Approved by Responsible Officer Approved by Chief Information Officer Council Approved and commenced August, 2014 Review by August, 2017 Relevant Legislation, Ordinance, Rule and/or Governance Level Principle ICT

More information

A1 Complete Plumbing and Heating Limited Job Applicant Privacy Notice

A1 Complete Plumbing and Heating Limited Job Applicant Privacy Notice A1 Complete Plumbing and Heating Limited Job Applicant Privacy Notice A1 Complete Plumbing and Heating Limited ( A1 ), Company Number 06272295 whose registered office is 1 Horsefair Mews, Romsey, England,

More information

G2 Guide to IAgrE Membership Grades, Requirements for Engineering Council (UK) and Society for the Environment Registration

G2 Guide to IAgrE Membership Grades, Requirements for Engineering Council (UK) and Society for the Environment Registration Institution of Agricultural Engineers G2, Requirements for Engineering Council (UK) and Society for the Environment Registration Author Alastair Taylor Date 19 June 2017 Introduction The Institution of

More information

RITTECH PROVIDES A RECOGNISED BENCHMARK OF STANDING ACROSS DIGITAL AND TECH INDUSTRIES

RITTECH PROVIDES A RECOGNISED BENCHMARK OF STANDING ACROSS DIGITAL AND TECH INDUSTRIES RITTECH PROVIDES A RECOGNISED BENCHMARK OF STANDING ACROSS DIGITAL AND TECH INDUSTRIES BCS, The Chartered Institute for IT First Floor, Block D, North Star House, North Star Avenue, Swindon SN2 1FA This

More information

The West End Community Trust Privacy Policy

The West End Community Trust Privacy Policy The West End Community Trust Privacy Policy We are committed to protecting your personal information and being transparent about what we do with it, however you interact with us. We are therefore committed

More information

GDPR Guidance for Co-operatives Data Protection and the GDPR: what do you need to know?

GDPR Guidance for Co-operatives Data Protection and the GDPR: what do you need to know? GDPR Guidance for Co-operatives Data Protection and the GDPR: what do you need to know? This toolkit has been produced in partnership with Anthony Collins Solicitors. 2 Data Protection and the GDPR: what

More information

Frequently asked questions on video-surveillance: prior checking

Frequently asked questions on video-surveillance: prior checking Last updated on 17 March 2010 Frequently asked questions on video-surveillance: prior checking 1. What is prior checking? Article 27 of the Data Protection Regulation 1 provides that "processing operations

More information

BCS Level 4 Certificate in Cyber Security Introduction Syllabus QAN 603/0830/8

BCS Level 4 Certificate in Cyber Security Introduction Syllabus QAN 603/0830/8 in Cyber Security Introduction Syllabus QAN 603/0830/8 Version 1.2 November 2016 This is a United Kingdom government regulated qualification which is administered and approved by one or more of the following:

More information