SlideShare una empresa de Scribd logo
1 de 10
Royal Academy of Dance



             Potential Threats
         Methods of Protection
                   Legislation
Royal Academy of Dance

•   There are many potential threats to websites that sell products to the
    general public.
•   ‘Royal Academy of Dance’ (RAD) is a retail website which is used by
    people around the world every day for performing items such as clothes,
    badges, music and gifts.




•   In a result of RAD creating a website to trade has a negative effect by opening them up to threats to
    their website such as:

           - Stealing data

           - Hackers
           - Taking over website
           - Spam, phishing, pharming
           - International stealing of data
Methods of Protection
 RAD apply different methods of protecting there website and their customers

Hackers
    What is it?: Hacking is to use technology to gain unauthorised access to data and
                                         information.
 Protection: one way to know you are protected on a website is by checking in the URL
that it turns to https: and also the bar goes green. to show trusted certificate. Unfortunately
 RAD does not do this meaning that is less protective that other websites, such as Lloyds.

                           ‘http’




                          ‘https’                    Changed
                                                      green



  Although RAD is less protective than as it could be they do have a personal log in and
changeable passwords which are encrypted also stopping RAD workers from seeking your
                                       information
Legislation

    What is it?: Legislation is a law that is enforced to protect peoples
              information and computer use for buying online.
There are three specific acts that RAD must apply to their website, to ensure
        protection from viruses for themselves and their customers.


                          The Data Protection Act
                                     (1998)


                           Computer Misuse Act
                                     (1990)


                       Distance Selling Regulations
                                     (2000)
The Data Protection Act

The Data Protection Act: The Data Protection Act is mandatory for any
company online and its shows that the company operates with
responsibility for it’s customers information
RAD on there website must produce information clearly before taking
the general publics data.
Users of the website must know:
    – What the company is and there name
    – What the data will be used for
    – Who can access your data
The Data Protection Act
               RAD also publish on their website offering more information to their customers:




The reason for the data protection act to be created was for a few concerns by the Government; such as:

-    Who could see the stored information

-    People could copy the information

-    Was it possible to store information about a person without the individual’s knowledge or permission?

-    Was a record kept of any changes made to information
Computer Misuse Act
    What is it?: The Computer Misuse Act was formed to Illegalise
 unauthorised access to computer use, preventing access to hacking,
                      viruses and stolen data.


       The Computer Misuse Act has created three new criminal offenses:

                -Access to computer material unauthorised data

                        -Commission of further offenses

                -Unauthorised modification of computer material.



The penalties and punishments for these crimes range from 6 months in
             prison fine £5000, max 5 jail and unlimited fine
Unfortunately it is very hard to catch these criminals and many people do
                             not get punished.
Distance Selling Regulations

What is it?: Distance Selling Regulations (DSR) set up in 2000 to
protect customers when shopping online. DSR makes rules for
customers who purchase items without face to face contact.


RAD must show clear information about the supplier, the goods to
the general public before they decide to buy the product.


They must also give customers time to return product without
receiving a fine in writing, this protects people from payment
fraud.
Distance Selling Regulations

This is what RAD publish on their website for customers before they
                   consider to buy a product.
Royal Academy of Dance
                                    (RAD)




Legislation is in place to deter people
from committing crimes online however
very few people are prosecuted.

RAD aim to protect their customers
however their will be new threats due
to technology expanding, therefore
RAD must remain up-to-date which
their methods of protection.

Más contenido relacionado

La actualidad más candente

Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce JenVidaB
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..home based
 
It legislation
It legislationIt legislation
It legislationdoogstone
 
Topshop potential threats
Topshop potential threatsTopshop potential threats
Topshop potential threatsdaisy_maggs
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In PakistanTaha Mehmood
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in indiaNikhil Naren
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber LawPoonam Bhasin
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000V'vek Sharma
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2Vikas Saw
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An OverviewTalwant Singh
 
legal and ethcal issues of e business
legal and ethcal issues of e businesslegal and ethcal issues of e business
legal and ethcal issues of e businessKdnk Kiriti
 

La actualidad más candente (20)

Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
It legislation
It legislationIt legislation
It legislation
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Topshop potential threats
Topshop potential threatsTopshop potential threats
Topshop potential threats
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Cyber laws in india
Cyber laws in indiaCyber laws in india
Cyber laws in india
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Need And Importance Of Cyber Law
Need And Importance Of Cyber LawNeed And Importance Of Cyber Law
Need And Importance Of Cyber Law
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
Cyber law2
Cyber law2Cyber law2
Cyber law2
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
legal and ethcal issues of e business
legal and ethcal issues of e businesslegal and ethcal issues of e business
legal and ethcal issues of e business
 

Destacado

sleepys eCommece case study
sleepys eCommece case studysleepys eCommece case study
sleepys eCommece case studySalmon Limited
 
Tic 2.012[1]
Tic 2.012[1]Tic 2.012[1]
Tic 2.012[1]ovialonso
 
The royal academy
The royal academyThe royal academy
The royal academy73084
 
MONACO DANCE ACADEMY (FILEminimizer)
MONACO DANCE ACADEMY (FILEminimizer)MONACO DANCE ACADEMY (FILEminimizer)
MONACO DANCE ACADEMY (FILEminimizer)Laurence Cellario
 
Festival Dance Orientation
Festival Dance OrientationFestival Dance Orientation
Festival Dance Orientationcnbarnhart
 
Project-Student Financial Service System
Project-Student Financial Service SystemProject-Student Financial Service System
Project-Student Financial Service Systemchezhiang
 
Use Case Diagram Templates by Creately
Use Case Diagram Templates by CreatelyUse Case Diagram Templates by Creately
Use Case Diagram Templates by CreatelyCreately
 
Use Case Diagram
Use Case DiagramUse Case Diagram
Use Case DiagramKumar
 
Presentation on Dance Academy Management System Project
Presentation on Dance Academy Management System ProjectPresentation on Dance Academy Management System Project
Presentation on Dance Academy Management System Projectmegha walunj
 
Business Plan - Dance Academy
Business Plan - Dance AcademyBusiness Plan - Dance Academy
Business Plan - Dance AcademyRaw Jaw
 
Software Requirement Specification
Software Requirement SpecificationSoftware Requirement Specification
Software Requirement SpecificationNiraj Kumar
 
Software requirement specification
Software requirement specificationSoftware requirement specification
Software requirement specificationAmit Gandhi
 
Software Requirement Specification
Software Requirement SpecificationSoftware Requirement Specification
Software Requirement SpecificationVishal Singh
 
SRS on Online Blood Bank Managment system...
SRS on Online Blood Bank Managment system... SRS on Online Blood Bank Managment system...
SRS on Online Blood Bank Managment system... GCWUF
 
Use Case Diagram
Use Case DiagramUse Case Diagram
Use Case DiagramAshesh R
 
Example requirements specification
Example requirements specificationExample requirements specification
Example requirements specificationindrisrozas
 
Software requirements specification
Software  requirements specificationSoftware  requirements specification
Software requirements specificationKrishnasai Gudavalli
 

Destacado (20)

sleepys eCommece case study
sleepys eCommece case studysleepys eCommece case study
sleepys eCommece case study
 
Tic 2.012[1]
Tic 2.012[1]Tic 2.012[1]
Tic 2.012[1]
 
Vivek's Art Academy
Vivek's Art AcademyVivek's Art Academy
Vivek's Art Academy
 
The royal academy
The royal academyThe royal academy
The royal academy
 
MONACO DANCE ACADEMY (FILEminimizer)
MONACO DANCE ACADEMY (FILEminimizer)MONACO DANCE ACADEMY (FILEminimizer)
MONACO DANCE ACADEMY (FILEminimizer)
 
Festival Dance Orientation
Festival Dance OrientationFestival Dance Orientation
Festival Dance Orientation
 
Project-Student Financial Service System
Project-Student Financial Service SystemProject-Student Financial Service System
Project-Student Financial Service System
 
SRS Slide
SRS SlideSRS Slide
SRS Slide
 
Use Case Diagram Templates by Creately
Use Case Diagram Templates by CreatelyUse Case Diagram Templates by Creately
Use Case Diagram Templates by Creately
 
Use Case Diagram
Use Case DiagramUse Case Diagram
Use Case Diagram
 
Presentation on Dance Academy Management System Project
Presentation on Dance Academy Management System ProjectPresentation on Dance Academy Management System Project
Presentation on Dance Academy Management System Project
 
Business Plan - Dance Academy
Business Plan - Dance AcademyBusiness Plan - Dance Academy
Business Plan - Dance Academy
 
Software Requirement Specification
Software Requirement SpecificationSoftware Requirement Specification
Software Requirement Specification
 
Software requirement specification
Software requirement specificationSoftware requirement specification
Software requirement specification
 
Use case-diagrams
Use case-diagramsUse case-diagrams
Use case-diagrams
 
Software Requirement Specification
Software Requirement SpecificationSoftware Requirement Specification
Software Requirement Specification
 
SRS on Online Blood Bank Managment system...
SRS on Online Blood Bank Managment system... SRS on Online Blood Bank Managment system...
SRS on Online Blood Bank Managment system...
 
Use Case Diagram
Use Case DiagramUse Case Diagram
Use Case Diagram
 
Example requirements specification
Example requirements specificationExample requirements specification
Example requirements specification
 
Software requirements specification
Software  requirements specificationSoftware  requirements specification
Software requirements specification
 

Similar a Transactional Website

Unit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.pptUnit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.pptYäsh Chaudhary
 
Chapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and SafeguardsChapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and Safeguardslobnaqassem2
 
information, people $ threats
information, people $ threatsinformation, people $ threats
information, people $ threats07Deeps
 
Internet Security and Legal Compliance: Cyber Law in India
Internet Security and Legal Compliance: Cyber Law in IndiaInternet Security and Legal Compliance: Cyber Law in India
Internet Security and Legal Compliance: Cyber Law in IndiaRodney D. Ryder
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT actDivesh Mewara
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Is web scraping legal or not?
Is web scraping legal or not?Is web scraping legal or not?
Is web scraping legal or not?Aparna Sharma
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationChristina Gagnier
 
Rise of cyber security v0.1
Rise of cyber security v0.1Rise of cyber security v0.1
Rise of cyber security v0.1Sohail Gohir
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Business Days
 

Similar a Transactional Website (20)

Unit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.pptUnit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.ppt
 
cyber crime
cyber crime cyber crime
cyber crime
 
UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
 
Chapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and SafeguardsChapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and Safeguards
 
information, people $ threats
information, people $ threatsinformation, people $ threats
information, people $ threats
 
Internet Security and Legal Compliance: Cyber Law in India
Internet Security and Legal Compliance: Cyber Law in IndiaInternet Security and Legal Compliance: Cyber Law in India
Internet Security and Legal Compliance: Cyber Law in India
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Data Breach Detection: Are you ready for GDPR?
Data Breach Detection: Are you ready for GDPR?Data Breach Detection: Are you ready for GDPR?
Data Breach Detection: Are you ready for GDPR?
 
IPR & CYBER SECURITY.pptx
IPR & CYBER SECURITY.pptxIPR & CYBER SECURITY.pptx
IPR & CYBER SECURITY.pptx
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
cle ppt.pptx
cle ppt.pptxcle ppt.pptx
cle ppt.pptx
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Is web scraping legal or not?
Is web scraping legal or not?Is web scraping legal or not?
Is web scraping legal or not?
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
 
Rise of cyber security v0.1
Rise of cyber security v0.1Rise of cyber security v0.1
Rise of cyber security v0.1
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020
 
TAMUC LO 7
TAMUC LO 7TAMUC LO 7
TAMUC LO 7
 
Cyber Safety
Cyber Safety Cyber Safety
Cyber Safety
 
E commerce
E commerceE commerce
E commerce
 

Transactional Website

  • 1. Royal Academy of Dance Potential Threats Methods of Protection Legislation
  • 2. Royal Academy of Dance • There are many potential threats to websites that sell products to the general public. • ‘Royal Academy of Dance’ (RAD) is a retail website which is used by people around the world every day for performing items such as clothes, badges, music and gifts. • In a result of RAD creating a website to trade has a negative effect by opening them up to threats to their website such as: - Stealing data - Hackers - Taking over website - Spam, phishing, pharming - International stealing of data
  • 3. Methods of Protection RAD apply different methods of protecting there website and their customers Hackers What is it?: Hacking is to use technology to gain unauthorised access to data and information. Protection: one way to know you are protected on a website is by checking in the URL that it turns to https: and also the bar goes green. to show trusted certificate. Unfortunately RAD does not do this meaning that is less protective that other websites, such as Lloyds. ‘http’ ‘https’ Changed green Although RAD is less protective than as it could be they do have a personal log in and changeable passwords which are encrypted also stopping RAD workers from seeking your information
  • 4. Legislation What is it?: Legislation is a law that is enforced to protect peoples information and computer use for buying online. There are three specific acts that RAD must apply to their website, to ensure protection from viruses for themselves and their customers. The Data Protection Act (1998) Computer Misuse Act (1990) Distance Selling Regulations (2000)
  • 5. The Data Protection Act The Data Protection Act: The Data Protection Act is mandatory for any company online and its shows that the company operates with responsibility for it’s customers information RAD on there website must produce information clearly before taking the general publics data. Users of the website must know: – What the company is and there name – What the data will be used for – Who can access your data
  • 6. The Data Protection Act RAD also publish on their website offering more information to their customers: The reason for the data protection act to be created was for a few concerns by the Government; such as: - Who could see the stored information - People could copy the information - Was it possible to store information about a person without the individual’s knowledge or permission? - Was a record kept of any changes made to information
  • 7. Computer Misuse Act What is it?: The Computer Misuse Act was formed to Illegalise unauthorised access to computer use, preventing access to hacking, viruses and stolen data. The Computer Misuse Act has created three new criminal offenses: -Access to computer material unauthorised data -Commission of further offenses -Unauthorised modification of computer material. The penalties and punishments for these crimes range from 6 months in prison fine £5000, max 5 jail and unlimited fine Unfortunately it is very hard to catch these criminals and many people do not get punished.
  • 8. Distance Selling Regulations What is it?: Distance Selling Regulations (DSR) set up in 2000 to protect customers when shopping online. DSR makes rules for customers who purchase items without face to face contact. RAD must show clear information about the supplier, the goods to the general public before they decide to buy the product. They must also give customers time to return product without receiving a fine in writing, this protects people from payment fraud.
  • 9. Distance Selling Regulations This is what RAD publish on their website for customers before they consider to buy a product.
  • 10. Royal Academy of Dance (RAD) Legislation is in place to deter people from committing crimes online however very few people are prosecuted. RAD aim to protect their customers however their will be new threats due to technology expanding, therefore RAD must remain up-to-date which their methods of protection.