Your SlideShare is downloading. ×
Trolled
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Trolled

138
views

Published on

Published in: Technology, News & Politics

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
138
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • Transcript

    • 1. SOCIAL AND ETHICAL ISSUES IPT Module 2
    • 2. PRIVACY
    • 3. PRIVACYRegulated by Privacy Act 1988
    • 4. PRIVACYRegulated by Privacy Act 1988 National Privacy Principles
    • 5. PRIVACYRegulated by Privacy Act 1988 National Privacy Principles Who has access to your data?
    • 6. PRIVACYRegulated by Privacy Act 1988 National Privacy Principles Who has access to your data? Why do they have access?
    • 7. PRIVACYRegulated by Privacy Act 1988 National Privacy Principles Who has access to your data? Why do they have access? Keeping data current
    • 8. PRIVACYRegulated by Privacy Act 1988 National Privacy Principles Who has access to your data? Why do they have access? Keeping data currentUnder law you can be sued - see Example 1
    • 9. PRIVACYRegulated by Privacy Act 1988 National Privacy Principles Who has access to your data? Why do they have access? Keeping data currentUnder law you can be sued - see Example 1
    • 10. SECURITY OF DATA & INFORMATION
    • 11. SECURITY OF DATA & INFORMATIONNot regulated by legislature
    • 12. SECURITY OF DATA & INFORMATIONNot regulated by legislatureIssues
    • 13. SECURITY OF DATA & INFORMATIONNot regulated by legislatureIssues Hacking, virus attacks, theft
    • 14. SECURITY OF DATA & INFORMATIONNot regulated by legislatureIssues Hacking, virus attacks, theftAddressed
    • 15. SECURITY OF DATA & INFORMATIONNot regulated by legislatureIssues Hacking, virus attacks, theftAddressed Passwords, backups, firewalls, encryption
    • 16. ACCURACY OF DATA & INFORMATION
    • 17. ACCURACY OF DATA & INFORMATIONThree considerations
    • 18. ACCURACY OF DATA & INFORMATIONThree considerations Data integrity
    • 19. ACCURACY OF DATA & INFORMATIONThree considerations Data integrity Data validation
    • 20. ACCURACY OF DATA & INFORMATIONThree considerations Data integrity Data validation Data verification
    • 21. ACCURACY OF DATA & INFORMATIONThree considerations Data integrity Data validation Data verificationImproved by a collecting process
    • 22. CHANGING NATURE OF WORK
    • 23. CHANGING NATURE OF WORKGlobal knowledge economy
    • 24. CHANGING NATURE OF WORKGlobal knowledge economyMove from a industrial model to a informationtechnology model
    • 25. CHANGING NATURE OF WORKGlobal knowledge economyMove from a industrial model to a informationtechnology model Jobs available
    • 26. CHANGING NATURE OF WORKGlobal knowledge economyMove from a industrial model to a informationtechnology model Jobs available Skills required
    • 27. CHANGING NATURE OF WORKGlobal knowledge economyMove from a industrial model to a informationtechnology model Jobs available Skills required ‘Regular hours’
    • 28. APPROPRIATE INFORMATION USE
    • 29. APPROPRIATE INFORMATION USEConnected to Privacy Act
    • 30. APPROPRIATE INFORMATION USEConnected to Privacy ActDo we give permission for others to use ourinformation? Example 2
    • 31. APPROPRIATE INFORMATION USEConnected to Privacy ActDo we give permission for others to use ourinformation? Example 2
    • 32. HEALTH AND SAFETY
    • 33. HEALTH AND SAFETYErgonomics
    • 34. HEALTH AND SAFETYErgonomicsImage from http://kristin-11it.wikispaces.com/Ergonomics+-+User+And+stretches
    • 35. COPYRIGHT LAW
    • 36. COPYRIGHT LAWProtected by Copyright Act 1968
    • 37. COPYRIGHT LAWProtected by Copyright Act 1968 Who owns what you create?
    • 38. COPYRIGHT LAWProtected by Copyright Act 1968 Who owns what you create? Timeframe
    • 39. COPYRIGHT LAWProtected by Copyright Act 1968 Who owns what you create? Timeframe Copyright symbol
    • 40. COPYRIGHT LAWProtected by Copyright Act 1968 Who owns what you create? Timeframe Copyright symbol How many copies?
    • 41. COPYRIGHT LAWProtected by Copyright Act 1968 Who owns what you create? Timeframe Copyright symbol How many copies? Reverse engineering