Information Privacy Data - Surveillance - Computer Misuse Flashcards
What kind of data has the employee access to?
- Network control systems that can view email/ internet usage
- telephone recordings systems
- CCTV
- staff / personnel records
Why the concern of information privacy?
- social media
- media sanctioned exhibitionism
- location sensitive apps
- reward-based privacy destruction
When surveillance is allowed in the workplace?
- detecting crime
- compliance with regulatory standards
- establishing existence of facts
- staff quality control and training
- ## protecting system from viruses
What is the information commissioner code on monitoring at work 2003?
This code is intended to help employers comply with the Data Protection Act and to encourage them to adopt good practice.
Briefly describe Data Protection Act 1998.
It ensures that information about citizens will be used only for the purposes for which they gave it
What is the Communications Act 2003?
I governs aspects of the internet, email, mobile phone calls and text messaging
- made illegal to use other people’s WiFi w/o permissions
- made illegal to send electronic/phone messages
- persistently make user of a public electronic communication network for the purpose of causing annoyance
What is the Privacy Electronic Communications Regulations 2003 (PECR)?
It protects a citizen’s right to “privacy”
- processing of electronic data
- location data and billing data
- calling or connected line identification
- directories of subscribers
- Cookies must, tell people that they exist, explain for what and obtain their consent.
What is Regulation of Investigatory Powers Act 2000 (RIPA)?
It protects against unreasonable intrusion of electronic communication and provides for privacy of communication
- interception of communications
- the acquisition and disclosure of data relating to communications
- carrying out surveillance
- riles on governance and oversight
- lawful if both sender and recipient have given consent
- unlawful to intentionally intercept communications by means of a private system without a system’s owner consent
What is Investigatory Powers Act, 2016 (‘Snooper’s Charter’) IPA?
expands the powers of the UK Intelligence
agencies
- it prohibits interception of communications without lawful authority
- allows police, intelligence officers to see the internet connection records as part of a targeted and filtered investigation without a warrant
- permit law enforcement agencies to hack pc
- places legal obligation on CSP to assist with data when required
- list agencies allowed to access data without a warrant
US legislation
The Fourth Amendment limits the ability of government agents to search for and seize evidence without a warrant. It generally prohibits law enforcement from accessing and viewing information stored in a computer if it would be prohibited from opening a closed container and examining its contents in the same situation.
In 1967, US Supreme Court held that the requirements of the Fourth Amendment applied equally to electronic surveillance and to physical searches
- Wiretap Act
- Electronic Communications Privacy Act
What is Cyber
-enabled crime
It is ‘traditional’ crimes conducted online such as terrorism, child
pornography,
financial crime.
What is Advanced cyber crime?
(or high
-tech crime)
– sophisticated attacks against computer hardware and
software
What is Attack Sources?
in the past, individuals or small groups. Now - highly complex global cybercriminal networks, state organisations (espionage, disruption, terror)
What is Cyber Defence ?
The law enforcement agencies with cyber-skills and global reach, with no physical or virtual borders
Describe what malware is ?
A program that is covertly inserted into another program with the intent to destroy data, run intrusive or destructive programs, or otherwise compromise the confidentiality, integrity or availability of the victim’s data, applications, or operating system.
Classified by how it spreads or propagates and by its payload