Professional issues. Una Benlic

Size: px
Start display at page:

Download "Professional issues. Una Benlic [email protected]"

Transcription

1 Professional issues Una Benlic

2 Aims Give a precise meaning of the terms profession and professional Discuss the obligations and privileges which membership of a profession carries Consider some codes of conduct that arise in UK computing Consider some legislations in UK computing

3 What is a profession and what is involved in being a professional? just doing it for money ( professional footballer ) or do we mean something else?

4 Professionalism From Chambers 20 th Century Dictionary Profession: an employment not mechanical and requiring some degree of learning: a calling, habitual employment; the collective body of persons engaged in any profession; Features that collective bodies have in common: The collective body controls entry to a profession; Is self governing, in the sense that it establishes and enforces a code of conduct to its members; Is established either by a Royal Charter or by statute (act of Parliament) which requires it to undertake certain duties and responsibilities. The archetypal professions are medicine, law, the clergy.

5 General features of a profession A service relationship: a vendor and a purchaser, but no tangible commodity that can be sold on the vendor belongs to a specialist group possessing arcane skills the purchaser may be forced to buy, or otherwise face e.g. disease, imprisonment, or damnation

6 Regulations of a profession A professional body sets: Standards of education as a condition of entry and achievement of professional status. Ethical standards and ethical rules which are to be followed by members. Rules are designed for the benefit of the public, typically stressing the pre-eminence of the client s interests over those of the service provider. Each profession has an appropriate degree of independence in setting professional standards whilst allowing Government to legislate for the public interest.

7 Benefits to the professional In exchange for these concessions, the specialist group typically demands new forms of market power Normally mediated through occupational closure, guild These include Monopoly of practice Control of entry and training Self-regulation There is no single picture: but professionalisation may bring practitioners benefits in both income and esteem Or they may find that their own ethics make them vulnerable (vicars, hospital doctors)

8 Professionalisation as a goal Occupational groups are often very keen to grasp the benefits Particularly the market power conferred by monopoly plus control of recruitment & training Frequently we find sustained campaigns by groups to achieve professional status Or to deny it to competing groups Professionalisation may bring benefits to others (particularly purchasers) For example, strongly-internalised norms of Duty to the client Continual improvement of personal skills Prevention of abuse May bring very much better services

9 Computing in the UK The British Computer Society (BCS) is the professional society for Information System Engineers in the UK. Its professional qualifications are based on the scheme for engineers. It has its own exams: a university can apply for its own degrees to provide exemptions from the BCS exams This involves inspection every five years. The BCS recognises the University of Stirling MSc for part-exemption from its entrance examination requirements. See for membership details. MBCS requires: 5 years IT work experience, or 2-3 years IT work experience plus relevant recognised qualifications (depending on level of qualification), or an Honours degree with BCS accreditation.

10 The BCS s Professional Code Assures the quality of professional services in the public interest. Strong emphasis on competence And duty of care towards the client and towards the public. The professional must seek to upgrade their professional knowledge and skill and shall maintain awareness of technological developments, procedures and standards. See the BCS Code of Conduct and Code of Good practice at Violations of the Code by members will be considered under the Society s disciplinary procedures.

11 BCS Code of Conduct: duties in the public interest 1. You shall carry out work or study with due care and diligence in accordance with the relevant authority s requirements, and the interests of system users. If your professional judgement is overruled, you shall indicate the likely risks and consequences. 2. In your professional role you shall have regard for the public health, safety and environment. 3. You shall have regard to the legitimate rights of third parties. 4. You shall ensure that within your professional field you have knowledge and understanding of relevant legislation, regulations and standards, and that you comply with them.

12 BCS Code of Conduct, continued 5. You shall conduct your professional activities without discrimination against clients or colleagues. 6. You shall reject any offer of bribery or inducement. Principles 7, 8, 9 are obligations to the relevant authority. These concern avoiding or disclosing situations where there is a conflict of interest between you and the authority; non-disclosure of confidential information; and not misrepresenting or withholding information about products or taking advantage of others lack of knowledge.

13 Legal Framework Probably the four most important pieces of UK computing legislation are: The Data Protection Act (discussed in ITNP33) The Computer Misuse Act together with the Police and Justice Act (2006) The Regulation of Investigatory Powers Act

14 CMA Section 1 1. A person is guilty of an offence if A. he causes a computer to perform any function with intent to secure access to any program or data held in any computer; B. the access he intends to secure is unauthorised; and C. he knows at the time when he causes the computer to perform the function that that is the case 2. The intent a person has to have to commit an offence under this section need not be directed at A. any particular program or data; B. a program or data of any particular kind; or C. a program or data held in any particular computer. (up to six months imprisonment and/or up to 2000 penalty)

15 CMA Section 2&3 Section 2 covers cases where the Section 1 offence is aggravated by an intent to commit a further crime (e.g. blackmail, theft) Section 3 covers any act which causes unauthorised modification of computer material [with intent to] A. to impair the operation of any computer; B. to prevent or hinder access to any program or data held in any computer; or C. to impair the operation of any such program or the reliability of any such data. In both cases the penalty is an unlimited fine and up to five years imprisonment.

16 The DOS attack loophole The Computer Misuse Act did not deal well with Denial of Service (DOS) attacks. What is a DOS attack? (Nothing to do with Microsoft s DOS operating system!) In a DOS attack, a server on a network is maliciously bombarded with a huge volume of requests, effectively bringing it to a standstill. An example: Three Russian hackers extorted up to 2M from UK online bookmakers, by threatening to launch DOS attacks against their websites. Placing a bet is a legitimate use of a gambling website, so it would have been difficult to argue that this was a crime under the CMA.

17 The Police and Justice Act (2006) The Police and Justice Act (2006) broadens the scope of the CMA and imposes tougher penalties. It closes the DOS attack loophole by making it an offence to commit an unauthorised act in relation to a computer which has the effect that it impairs the operation of any computer The PJA also makes it an offence to obtain or distribute software (such as hacking tools) if it is known that it will be used for illegal purposes. And the PJA increases the penalties for the crimes defined under the CMA (up to 10 years imprisonment for some offences). and the Russian hackers? They were arrested and tried in Russia in 2006, fined, and sentenced to 8 years imprisonment.

18 Regulation of Investigatory Powers Act (2000) (This summary is from The government can demand that a public telecommunications service intercepts an individual's communications. The Home Secretary can serve interception warrants to perform mass surveillance. The government can require ISPs to fit equipment that enables them to perform surveillance. The government can demand that decryption keys be handed over in order to access protected information. (not yet in force). The government can access internet traffic data for... any reason the Secretary of State deems fit.

19 Regulation of Investigatory Powers Act (2000) Surveillance data may not be used in legal proceedings so if someone has illegitimately been the subject of an interception warrant there is no legal way for them to know about it. Needless to say, there has been some controversy about this law! ereditorial-press-regulation-debate

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012 Monitoring and Logging Policy Document Status Security Classification Version 1.0 Level 1 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Change History

More information

Employment Manual REHABILITATION OF OFFENDERS AND SELF DISCLOSURE POLICY

Employment Manual REHABILITATION OF OFFENDERS AND SELF DISCLOSURE POLICY Employment Manual REHABILITATION OF OFFENDERS AND SELF DISCLOSURE POLICY CONTENTS INTRODUCTION TO REHABILITATION OF OFFENDERS ACT 1974... 1 EXCEPTIONS TO THE ACT... 1 MODIFICATIONS TO THE ACT... 1 POLICY...

More information

Network Service, Systems and Data Communications Monitoring Policy

Network Service, Systems and Data Communications Monitoring Policy Network Service, Systems and Data Communications Monitoring Policy Purpose This Policy defines the environment and circumstances under which Network Service, Systems and Data Communications Monitoring

More information

Cybercrime: risks, penalties and prevention

Cybercrime: risks, penalties and prevention Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,

More information

Crimes (Computer Hacking)

Crimes (Computer Hacking) 2009-44 CRIMES (COMPUTER HACKING) ACT 2009 by Act 2011-23 as from 23.11.2012 Principal Act Act. No. 2009-44 Commencement except ss. 15-24 14.1.2010 (LN. 2010/003) Assent 3.12.2009 Amending enactments Relevant

More information

GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use. Approval for this regulation given by :

GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use. Approval for this regulation given by : GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use Name of regulation : Purpose of regulation : Approval for this regulation given by : Responsibility for its update : Regulation

More information

Guidance on health and character

Guidance on health and character Guidance on health and character Who is this document for?... 2 About the structure of this document... 2 Section 1: Introduction... 4 About us (the HPC)... 4 How we are run... 5 About registration...

More information

Social and Legal Issues in Informatics

Social and Legal Issues in Informatics Social and Legal Issues in Informatics MSc Management IS and Services Science Challenges in Modern Information Systems Giovanna Di Marzo Serugendo [email protected], room B 235, 022 379 00 72 (Some

More information

COMPUTER MISUSE AND CYBERSECURITY ACT (CHAPTER 50A)

COMPUTER MISUSE AND CYBERSECURITY ACT (CHAPTER 50A) COMPUTER MISUSE AND CYBERSECURITY ACT (CHAPTER 50A) (Original Enactment: Act 19 of 1993) REVISED EDITION 2007 (31st July 2007) An Act to make provision for securing computer material against unauthorised

More information

Data Protection and Information Security. Procedure for reporting a breach of data security. April 2013

Data Protection and Information Security. Procedure for reporting a breach of data security. April 2013 Data Protection and Information Security Procedure for reporting a breach of data security April 2013 Page 1 of 6 Created on: 01/04/2009 Contents 1 Introduction... 3 2 Data Classification... 3 3 What Is

More information

CHAPTER 124B COMPUTER MISUSE

CHAPTER 124B COMPUTER MISUSE 1 L.R.O. 2005 Computer Misuse CAP. 124B CHAPTER 124B COMPUTER MISUSE ARRANGEMENT OF SECTIONS SECTION PART I PRELIMINARY 1. Short title. 2. Application. 3. Interpretation. PART II PROHIBITED CONDUCT 4.

More information

INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes

INFORMATION SECURITY POLICY. Contents. Introduction 2. Policy Statement 3. Information Security at RCA 5. Annexes INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable legislation and interpretation 8 B. Most

More information

Monitoring Employee Communications: Data Protection and Privacy Issues

Monitoring Employee Communications: Data Protection and Privacy Issues Monitoring Employee Communications: Data Protection and Privacy Issues By Anthony Sakrouge, Kate Minett, Daniel Preiskel and Jose Saras Reprinted from Computer and Telecommunications Law Review Issue 8,

More information

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy

St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles

More information

Enforced subject access (section 56)

Enforced subject access (section 56) ICO lo Enforced subject access (section 56) Data Protection Act Contents Introduction... 2 Overview.3 The criminal offence.... 3 Exceptions and penalties.... 7 Relevant records....... 8 Other considerations

More information

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1 Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision

More information

THIS GUIDANCE APPLIES FROM 10 MARCH 2014

THIS GUIDANCE APPLIES FROM 10 MARCH 2014 THIS GUIDANCE APPLIES FROM 10 MARCH 2014 Guidance on the Rehabilitation of Offenders Act 1974 Contents: (1) INTRODUCTION: What is the Rehabilitation of Offenders Act 1974? Who benefits from the 1974 Act

More information

Unit 3 Cyber security

Unit 3 Cyber security 2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 3 Cyber security Y/507/5001 Guided learning hours: 60 Version 1 September 2015 ocr.org.uk/it LEVEL 3 UNIT 3: Cyber security Y/507/5001 Guided learning hours:

More information

Act on the Protection of Privacy in Working Life (759/2004)

Act on the Protection of Privacy in Working Life (759/2004) NB: Unofficial translation Ministry of Labour, Finland Chapter 1 - General provisions Section 1 Purpose of the act Act on the Protection of Privacy in Working Life (759/2004) The purpose of this Act is

More information

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed

More information

The Government propose to take a zero tolerance approach to the following 8 controlled drugs which are known to impair driving:

The Government propose to take a zero tolerance approach to the following 8 controlled drugs which are known to impair driving: Drug-Driving: Proposed New Law New law on drug driving to be introduced in the near future The new law on drug driving is designed, in part, to reduce the number of failed prosecutions under the existing

More information

INFORMATION SECURITY MANAGEMENT POLICY

INFORMATION SECURITY MANAGEMENT POLICY INFORMATION SECURITY MANAGEMENT POLICY Security Classification Level 4 - PUBLIC Version 1.3 Status APPROVED Approval SMT: 27 th April 2010 ISC: 28 th April 2010 Senate: 9 th June 2010 Council: 23 rd June

More information

Drugs and Alcohol in the Workplace. Guidance for Workplace Representatives

Drugs and Alcohol in the Workplace. Guidance for Workplace Representatives Drugs and Alcohol in the Workplace Guidance for Workplace Representatives Health and safety May 2010 Introduction The use of drugs and alcohol can be a serious workplace issue. Not only can their use lead

More information

Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy

Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy 1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines

More information

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services Issue 1.0 (Effective 27 June 2012) This document contains a copy of the STFC policy statements outlining

More information

A guide for employers and registrants. Managing fitness to practise

A guide for employers and registrants. Managing fitness to practise A guide for employers and registrants Managing fitness to practise Contents Introduction 1 About us (the HPC) 1 Who do we regulate? 1 Protected titles 2 Fitness to practise 2 This document 3 Managing fitness

More information

CONTENT OF THE AUDIT LAW

CONTENT OF THE AUDIT LAW CONTENT OF THE AUDIT LAW I. GENERAL PROVISIONS Article 1 This Law shall regulate the conditions for conducting an audit of legal entities which perform activities, seated in the Republic of Macedonia.

More information

LAWS OF BRUNEI CHAPTER 194 COMPUTER MISUSE ACT

LAWS OF BRUNEI CHAPTER 194 COMPUTER MISUSE ACT LAWS OF BRUNEI CHAPTER 194 COMPUTER MISUSE ACT S 65/00 REVISED EDITION 2007 B.L.R.O. 3/2007 CAP. 194] LAWS OF BRUNEI Computer Misuse [2007 Ed. p. 1 LAWS OF BRUNEI REVISED EDITION 2007 CHAPTER 194 COMPUTER

More information

The guidance 2. Guidance on professional conduct for nursing and midwifery students. Your guide to practice

The guidance 2. Guidance on professional conduct for nursing and midwifery students. Your guide to practice The guidance 2 Guidance on professional conduct for nursing and midwifery students Your guide to practice The Nursing & Midwifery Council Vision, mission and values Our vision To safeguard the public by

More information

Guidance on professional conduct. For nursing and midwifery students

Guidance on professional conduct. For nursing and midwifery students Guidance on professional conduct For nursing and midwifery students 1 We are the nursing and midwifery regulator for England, Wales, Scotland, Northern Ireland and the Islands. We exist to safeguard the

More information

COMPUTER USAGE - EMAIL

COMPUTER USAGE - EMAIL BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when

More information

The Russian Anti-Corruption Charter For Business *

The Russian Anti-Corruption Charter For Business * 19 November 2013 English and Russian only Conference of the States Parties to the United Nations Convention against Corruption Fifth session Panama City, 25-29 November 2013 The Russian Anti-Corruption

More information

POLICE CHECKS GUIDANCE NOTE

POLICE CHECKS GUIDANCE NOTE POLICE CHECKS GUIDANCE NOTE Index Purpose Obligations and risks Information about national police checks Recruiting new staff Checking current employees Finding out more Purpose When recruiting someone

More information

BUSINESS CODE OF CONDUCT

BUSINESS CODE OF CONDUCT BUSINESS CODE OF CONDUCT PREPARED FOR: ode March 2011 Page 1 Contents 1 BUSINESS CODE OF CONDUCT... 3 2 MISSION STATEMENT... 3 3 PRINCIPLES AND VALUES... 3 4 RELATIONSHIPS... 4 5 BRIBERY AND CORRUPTION...

More information

COMPUTER MISUSE AND CYBERCRIME ACT

COMPUTER MISUSE AND CYBERCRIME ACT COMPUTER MISUSE AND CYBERCRIME ACT Act 22 of 2003 9 August 2003 ARRANGEMENT OF SECTIONS 1. Short title 2. Interpretation PART I PRELIMINARY PART II OFFENCES 3. Unauthorised access to computer data 4. Access

More information

Assistant Director of Facilities

Assistant Director of Facilities Policy Title ID Number Scope Status Reviewed By IT Security Policy P04001 All Users Policy Assistant Director of Facilities Reviewed Date January 2011 Last Reviewed Due for Review January 2013 Impact Assessment

More information

Review of the Tasmanian Building Regulatory Framework. Response from the Board of Architects of Tasmania

Review of the Tasmanian Building Regulatory Framework. Response from the Board of Architects of Tasmania Review of the Tasmanian Building Regulatory Framework Response from the September 2014 1. Introduction The Board of Architects commends the Department of Justice for reviewing this industry framework which

More information

Federation of Law Societies of Canada. Ottawa, November 26, 2013

Federation of Law Societies of Canada. Ottawa, November 26, 2013 Submission to the Standing Senate Committee on Banking, Trade and Commerce in Respect of Bill C-4 (a second Act to implement certain provisions of the budget tabled in Parliament on March 21, 2013 and

More information

Conditions of Use. Communications and IT Facilities

Conditions of Use. Communications and IT Facilities Conditions of Use of Communications and IT Facilities For the purposes of these conditions of use, the IT Facilities are [any of the University s IT facilities, including email, the internet and other

More information

DECISION OF COUNCILLOR PETER BRYANT

DECISION OF COUNCILLOR PETER BRYANT DECISION OF COUNCILLOR PETER BRYANT THE EXECUTIVE MEMBER FOR WASTE AND RECYCLING, ENVIRONMENTAL PROTECTION AND POLLUTION, MARINE ENVIRONMENT, PARKS AND GREEN SPACES AND BUILDING CONTROL. WITH ADVICE FROM

More information

Information Security

Information Security Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff

More information

BAILIWICK OF GUERNSEY DATA PROTECTION

BAILIWICK OF GUERNSEY DATA PROTECTION BAILIWICK OF GUERNSEY DATA PROTECTION CODE OF PRACTICE: CRIMINAL RECORDS CHECK PREFACE Section 56 of the Data Protection (Bailiwick of Guernsey) Law, 2001 ( the DP Law ), as amended by Ordinance in 2010

More information

Codes of Ethics and Professional Conduct for Accountants

Codes of Ethics and Professional Conduct for Accountants EYK 1 5 Codes of Ethics and Professional Conduct for Accountants SELECTION FROM THE CERTIFIED GENERAL ACCOUNTANTS OF ALBERTA S CODE OF ETHICAL PRINCIPLES AND RULES OF CONDUCT 1 CODE OF ETHICAL PRINCIPLES

More information

The Code: Standards of conduct, performance and ethics for nurses and midwives

The Code: Standards of conduct, performance and ethics for nurses and midwives The Code: Standards of conduct, performance and ethics for nurses and midwives We are the nursing and midwifery regulator for England, Wales, Scotland, Northern Ireland and the Islands. We exist to safeguard

More information

Lawyers Law, 2007, available at http://www.npc.gov.cn/englishnpc/law/2009-02/20/content_1471604.htm

Lawyers Law, 2007, available at http://www.npc.gov.cn/englishnpc/law/2009-02/20/content_1471604.htm Law of the People s Republic of China on Lawyers Order of the President of the People s Republic of China No. 76 The Law of the People s Republic of China on Lawyers, revised and adopted at the 30th Meeting

More information

017 Fit and proper person policy statement v1.0

017 Fit and proper person policy statement v1.0 017 Fit and proper person policy statement v1.0 Purpose 1. The purpose of this policy statement is to provide the Board s interpretation of the term fit and proper person in Part 2.4 of the Legal Profession

More information

Alcohol and Drugs Policy. Committee responsible for review. Agreed date Autumn 2013

Alcohol and Drugs Policy. Committee responsible for review. Agreed date Autumn 2013 Alcohol and Drugs Policy Committee responsible for review Resource Agreed date Autumn 2013 Review date Autumn 2016 Contents Page Introduction 3 The need for compliance 3 Management responsibilities 4 Individual

More information

IS SECURITY MANAGEMENT A PROFESSION?

IS SECURITY MANAGEMENT A PROFESSION? IS SECURITY MANAGEMENT A PROFESSION? Michael A Pepper MSc CPP PSP (First published in New Zealand Security October/November 2003) Introduction In this article I intend to show that Security Management

More information

The Code Standards of conduct, performance and ethics for nurses and midwives

The Code Standards of conduct, performance and ethics for nurses and midwives The Code Standards of conduct, performance and ethics for nurses and midwives The people in your care must be able to trust you with their health and wellbeing. To justify that trust, you must make the

More information

Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy

Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Sheridan College Institute of Technology and Advanced Learning Telephone and Computer Information Access Policy Introduction This Telephone and Computer Information Access Policy (the "Policy") governs

More information

THE MALAYSIAN INSTITUTE OF CHARTERED SECRETARIES AND ADMINISTRATORS MAICSA PRACTISING CERTIFICATE SCHEME AND REGULATIONS

THE MALAYSIAN INSTITUTE OF CHARTERED SECRETARIES AND ADMINISTRATORS MAICSA PRACTISING CERTIFICATE SCHEME AND REGULATIONS THE MALAYSIAN INSTITUTE OF CHARTERED SECRETARIES AND ADMINISTRATORS MAICSA PRACTISING CERTIFICATE SCHEME AND REGULATIONS A. INTRODUCTION MAICSA recognises the need to provide a Public Practice Scheme that

More information

GAMBLING LICENSING ABIGAIL HUDSON NOVEMBER 2015

GAMBLING LICENSING ABIGAIL HUDSON NOVEMBER 2015 GAMBLING LICENSING ABIGAIL HUDSON NOVEMBER 2015 Gambling Act 2005 The objectives of the Gambling Commission and Licensing Authorities are defined as: Preventing gambling from being a source of crime or

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

THE REAL ESTATE CODE CONDUCT, ETHICS AND BEHAVIOUR IN REAL ESTATE

THE REAL ESTATE CODE CONDUCT, ETHICS AND BEHAVIOUR IN REAL ESTATE THE REAL ESTATE CODE CONDUCT, ETHICS AND BEHAVIOUR IN REAL ESTATE Version 20/4/09 SYNOPSIS A Practitioner should: 1. Uphold the honour and dignity of the profession and not engage in any activity that

More information

The code: Standards of conduct, performance and ethics for nurses and midwives

The code: Standards of conduct, performance and ethics for nurses and midwives The code: Standards of conduct, performance and ethics for nurses and midwives We are the nursing and midwifery regulator for England, Wales, Scotland, Northern Ireland and the Islands. We exist to safeguard

More information

ELECTRONIC TRANSACTIONS ACT 1999 BERMUDA 1999 : 26 ELECTRONIC TRANSACTIONS ACT 1999

ELECTRONIC TRANSACTIONS ACT 1999 BERMUDA 1999 : 26 ELECTRONIC TRANSACTIONS ACT 1999 BERMUDA 1999 : 26 ELECTRONIC TRANSACTIONS ACT 1999 [Date of Assent 5 August 1999] [Operative Date 4 October 1999] ARRANGEMENT OF SECTIONS 1 Citation PART I PRELIMINARY 2 Definitions 3 Crown to be bound

More information

Chapter 813. Driving Under the Influence of Intoxicants 2013 EDITION. Title 59 Page 307 (2013 Edition)

Chapter 813. Driving Under the Influence of Intoxicants 2013 EDITION. Title 59 Page 307 (2013 Edition) Chapter 813 2013 EDITION Driving Under the Influence of Intoxicants GENERAL PROVISIONS 813.010 Driving under the influence of intoxicants; penalty 813.011 Felony driving under the influence of intoxicants;

More information

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level

More information

Acceptable Use of Computing and Information Technology Resources

Acceptable Use of Computing and Information Technology Resources Acceptable Use of Computing and Information Technology Resources Version 1.0, February2, 2010 General Statement As part of its educational mission, Hocking College acquires, develops, and maintains computers,

More information

OKLAHOMA LAWS RELATING TO IDENTITY THEFT

OKLAHOMA LAWS RELATING TO IDENTITY THEFT OKLAHOMA LAWS RELATING TO IDENTITY THEFT Prepared for VICARS by Legal Aid Services of Oklahoma Introduction: OKLAHOMA LAWS RELATING TO IDENTITY THEFT Identity theft takes place when someone uses your personal

More information

Cyber and Data Security. Proposal form

Cyber and Data Security. Proposal form Cyber and Data Security Proposal form This proposal form must be completed and signed by a principal, director or a partner of the proposed insured. Cover and Quotation requirements Please indicate which

More information

CODE OF ETHICS AND BUSINESS CONDUCT

CODE OF ETHICS AND BUSINESS CONDUCT CODE OF ETHICS AND BUSINESS CONDUCT This Code of Ethics and Business Conduct ( Code ) has been approved by the Amalgamated Holdings Limited ( AHL ) Board of Directors for use within the AHL controlled

More information

Fraud Act 2006 CHAPTER 35 CONTENTS

Fraud Act 2006 CHAPTER 35 CONTENTS Fraud Act 2006 CHAPTER 35 CONTENTS Fraud 1 Fraud 2 Fraud by false representation 3 Fraud by failing to disclose information 4 Fraud by abuse of position 5 Gain and loss 6 Possession etc. of articles for

More information

USE OF INFORMATION TECHNOLOGY FACILITIES

USE OF INFORMATION TECHNOLOGY FACILITIES POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised

More information

Application Guidance CCP Penetration Tester Role, Practitioner Level

Application Guidance CCP Penetration Tester Role, Practitioner Level August 2014 Issue No: 1.0 Application Guidance CCP Penetration Tester Role, Practitioner Level Application Guidance CCP Penetration Tester Role, Practitioner Level Issue No: 1.0 August 2014 This document

More information

Whistleblower Act, 2006 Act 720

Whistleblower Act, 2006 Act 720 Whistleblower Act, 2006 Act 720 ARRANGEMENT OF SECTIONS Section Information the disclosure of which is protected 1. Disclosure of impropriety 2. Person who qualifies to make disclosure of impropriety 3.

More information

The Cloud and Cross-Border Risks - Singapore

The Cloud and Cross-Border Risks - Singapore The Cloud and Cross-Border Risks - Singapore February 2011 What is the objective of the paper? Macquarie Telecom has commissioned this paper by international law firm Freshfields Bruckhaus Deringer in

More information

PERSONNEL SECURITY PRACTICAL ADVICE FOR HR AND SECURITY MANAGERS

PERSONNEL SECURITY PRACTICAL ADVICE FOR HR AND SECURITY MANAGERS PERSONNEL SECURITY PRACTICAL ADVICE FOR HR AND SECURITY MANAGERS A DELICATE BALANCE Every year brings stories of organisations falling victim to the embarrassing, costly or disruptive consequences of staff

More information

Discipline. Managing People. VOIP 2000 - HR Direct Fife Council April 2015 1 DI02. P o l i c y a n d P r o c e d u r e. 1 Purpose and Scope

Discipline. Managing People. VOIP 2000 - HR Direct Fife Council April 2015 1 DI02. P o l i c y a n d P r o c e d u r e. 1 Purpose and Scope Discipline P o l i c y a n d P r o c e d u r e 1 Purpose and Scope This procedure is designed to help and encourage all employees to achieve and maintain standards of conduct. This procedure applies to

More information

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005 UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The

More information

A Policy Regarding Misuse of Alcohol and Drugs by Staff and Students

A Policy Regarding Misuse of Alcohol and Drugs by Staff and Students A Policy Regarding Misuse of Alcohol and Drugs by Staff and Students The Policy The abuse of alcohol and drugs is inconsistent with work and study and with the high standards of behaviour that society

More information

Architects Accreditation Council of Australia. Regulation of the Architect Profession within Australia An Overview

Architects Accreditation Council of Australia. Regulation of the Architect Profession within Australia An Overview Architects Accreditation Council of Australia Regulation of the Architect Profession within Australia An Overview February 2015 Table of Contents 1. Introduction... 3 2. Registration Requirements for Individuals...

More information

Guidance ETHICAL PROCUREMENT AND SUPPLY

Guidance ETHICAL PROCUREMENT AND SUPPLY ETHICAL PROCUREMENT AND SUPPLY Published by the British Institute of Facilities Management June 2015 Introduction The importance of ethical procurement and supply The majority of organisations use supply

More information

REHABILITATION OF OFFENDERS (Criminal Procedure and Evidence Act 2011) GUIDANCE NOTE

REHABILITATION OF OFFENDERS (Criminal Procedure and Evidence Act 2011) GUIDANCE NOTE REHABILITATION OF OFFENDERS (Criminal Procedure and Evidence Act 2011) GUIDANCE NOTE This guidance note provides background information on Part 25 of the Criminal Procedure and Evidence Act 2011 which

More information

Human Resources Author: Lou Hassen Version: 1 Review Date: Dec 2012 Page 1 of 7. Trinity Academy Disciplinary Policy

Human Resources Author: Lou Hassen Version: 1 Review Date: Dec 2012 Page 1 of 7. Trinity Academy Disciplinary Policy Page 1 of 7 Trinity Academy Disciplinary Policy Policy Statement The purpose of the Disciplinary Procedure is to give staff members every opportunity to improve standards of behaviour and conduct and to

More information

Other Review Dates: 15 July 2010, 20 October 2011

Other Review Dates: 15 July 2010, 20 October 2011 POLICY:- Policy Title: Mobile Telephone Policy File reference: F10/618-04 Date Policy was adopted by Council initially: 18 December 2008 Resolution Number: 404/08 Other Review Dates: 15 July 2010, 20 October

More information

MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009

MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009 MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009 Current Laws: A person may not knowingly, willfully, and with

More information

Title 32: PROFESSIONS AND OCCUPATIONS

Title 32: PROFESSIONS AND OCCUPATIONS Title 32: PROFESSIONS AND OCCUPATIONS Chapter 32: OCCUPATIONAL THERAPISTS Table of Contents Section 2271. DECLARATION OF PURPOSE... 3 Section 2272. DEFINITIONS... 3 Section 2273. BOARD OF OCCUPATIONAL

More information

Please see the attached document which contains this information.

Please see the attached document which contains this information. Freedom of Information Request Reference No: I note you seek access to the following information: I would be grateful if you could please forward details of your Policies regarding Police Officer Misconduct,

More information

Disciplinary Policy and Procedure

Disciplinary Policy and Procedure Disciplinary Policy and Procedure Policy 1. Purpose of the policy and procedure Disciplinary rules are important for the running of the University so that everyone understands what is expected of them

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Directors Duties in association with the Institute of Directors Ireland. MHC.ie

Directors Duties in association with the Institute of Directors Ireland. MHC.ie Directors Duties in association with the Institute of Directors Ireland MHC.ie Recent Court Decisions Consequences for Directors Shelley Horan BL, BCL, LL.M, CEDR Accredited Mediator, Adjunct Assistant

More information

How do we Police Cyber Crime?

How do we Police Cyber Crime? How do we Police Cyber Crime? Thursday 4 th June 2015 Craig Jones, SEROCU Presentation Content UK policing cyber crime programme Cyber threat landscape and impact Cyber business resilience Future Challenges

More information

NEWMAN UNIVERSITY DISCIPLINARY POLICY AND PROCEDURE

NEWMAN UNIVERSITY DISCIPLINARY POLICY AND PROCEDURE 1. Scope and Purpose NEWMAN UNIVERSITY DISCIPLINARY POLICY AND PROCEDURE 1.1 Newman University [hereafter referred to as the University] recognises disciplinary rules and procedures are necessary for the

More information

CONSULTATION PAPER NO 2. 2004

CONSULTATION PAPER NO 2. 2004 CONSULTATION PAPER NO 2. 2004 REGULATION OF GENERAL INSURANCE MEDIATION BUSINESS This consultation paper explains the need for the Island to regulate general insurance mediation business and examines the

More information

Protecting betting integrity

Protecting betting integrity Protecting betting integrity October 2013 1 Introduction 1.1 The UK Gambling Commission (the Commission) was set up under the Gambling Act 2005 to regulate commercial gambling in Great Britain. We are

More information