Procedural security (e.g. train staff to reject phishing, being suspicious of attachments, backing up data)
Cover adware, trojans
Routers are NOT switches!
Firewalls do NOT stop viruses!
Firewalls need to monitor incoming and outgoing data to be worthwhile
Hardware firewalls (e.g. home routers). and bad software firewalls, check incoming but not outgoing data
ITA just l-o-v-e-s the internet
KK4.2.01 - an overview of the legal and ethical reasons why organisations should monitor and control the storage, communication and disposal of information;
Study design does not list relevant laws except in the glossary. Students need to know about:
Privacy Act 1988 (Federal)
Information Privacy Act (Vic.)
Health Records Act 2001 (Vic.)
Copyright Act, 1968 (Federal)
Who is subject to the laws
What is outlawed or allowed
Consequences of breaking the laws
Do NOT refer to
The Privacy Act (Private Sector) Amendment)
The Copyright Act (Digital Agenda) Amendment
They are both now incorporated into their parent acts and do not exist independently (as far as the VCAA is concerned)
Privacy Act 1988 - affects
federal government organisations (e.g. Medicare, tax office) and private companies working for them
non-government organisations turning over $3 million a year or more (which is quite rare)
non-government organsisations of any size that trade in personal information for profit
non-government organisations that store health or medical information on people (not including their own employees)
The national privacy principles, which underlie all of the federal and state privacy laws...
A basic knowledge of the main points will suffice...
“ Info” = personal information. Many principles have commonsense and emergency exclusions.
1. Collection – only collect info you need to do your job
2. Use and Disclosure – don’t use info for any purpose other than the reason it was collected.
3. Data Quality – ensure the info you it collect is accurate, complete and up to date.
4. Data Security – protect info from misuse e.g. unauthorised access, modification or disclosure, or loss.
5. Openness – publish a clearly expressed policy on its management of info
6. Access and Correction – provide individuals with access to the info you hold on them
7. Identifiers – don’t identify people using other organisations' identifiers, such as a Tax File Number or Medicare number.
8. Anonymity - Where possible, individuals need not identify themselves when entering into transactions.
9. Transborder data flow – you may not transfer info about people to someone (other than the organisation or the individual) who is in a foreign country without the consent of the individual.
10. Sensitive Information - An organisation must not collect sensitive information about an individual unless the individual has consented, or law requires the collection.
Now includes the digital agenda amendment (2000)
Basic coverage of main points of the law will suffice
Protects intellectual property e.g. books, songs, MP3s, MPEGs, digital books, films recorded digitally, websites, software, electronic/computer games.
The owner or licencee of intellectual property is the only one who has the right to publish, transmit, convert to a different format (e.g. DVD to DivX), or profit from it.
Copyright owners have the right to use technologies to protect their IP - such as copy protection - and the copyright law specifically prohibits the importation of any device designed to counteract such technologies.
If anyone changes the copyright notice on a published work (e.g. removing it) they are hit especially hard and can face criminal charges as well as being sued (because other people will not know of the original copyright restrictions and may innocently redistribute it).
In Oz, US and the UK, copyright is automatic once intellectual property has been recorded in some tangible form (e.g. recorded electronically, written down, filmed). You do not have to register copyright .
Just because a publication or website does not have a copyright notice on it does not mean that it is not copyrighted and is available to be used freely. Basically, unless there's a statement that you can use it, assume it is copyrighted.