Главная | Обратная связь | Поможем написать вашу работу!
МегаЛекции

Data protection. LANGUAGE FOCUS. 2. Word formation. Complete this table by filling in the correct forms. 3. Match the columns.




Data protection

The way you collect, store and distribute information that constitutes personal data on identifiable individuals is now subject to Data Protection legislation. If, for example, you ask potential customers to supply their address details via the web in the process of requesting further information concerning your business, you should also provide the data subject with information about the purpose of collecting the data. If your web page contains data relating specific employees, remember that this will be information readily available internatioanlly and nationally. You must have the consent of the individuals concerned allowing you to make such information available. That consent must be informed and freely given. Care must be taken in the management of personal web servers and server software and clear guidelines given to staff about your Internet policy in order to avoid falling foul of the law, for example, the defamation act. Finally, in addition to ensuring that you do not infringe regulations, you need to consider how to future-proof contracts you enter into, by considering potential and unknown developments which may affect your business.

 

 

LANGUAGE FOCUS

1. Give Russian equivalents for the following English words and phrases:

legislature legal advisors illegal activities breach of computer security unauthorized access illegally obtained content credit card fraud credit card scams identity (ID) theft financial benefit deception fraudsters aggravated ID theft defamation act fake sites bona fide phishing misrepresentation in reply to money laundering activities criminal prosecution to draft legislation to fall foul of the law to infringe regulations to affect business to take in to disclose account information to trick into  to commit crimes to charge with a crime

 

2. Word formation. Complete this table by filling in the correct forms.

Verb Noun
authorize  
protect  
  application
  advisor
  distribution
secure  
sign  
warn  
disclose  
  identity
  assistance
serve  
infringe  
  misrepresentation
  prosecution

 

3. Match the columns.

a.

1. legal 2. illegal 3. computer 4. unauthorized 5. virus 6. identity 7. personal 8. fake 9. money 10. criminal a. laundering b. access c. advisor d. information e. prosecution f. spreading g. activities h. theft i. sites j. security

 

b.

1. to commit 2. to disclose 3. to draft 4. to distribute 5. to infringe 6. to affect a. crimes b. business c. information d. legislation e. regulations  

 

4. Fill in the gaps with prepositions if necessary.

1) An unauthorized access _____ a computer is known as hacking.

2) The law deals _____ the disclosure of personal information.

3) If you do not have adequate security systems, your business is _____ risk.

4) Cybercrimes may affect _____your business.

5) He was charged _____ ID theft.

6) Elderly people are often taken _____ by fraudsters.

7) Never give _____ personal information to anyone on-line.

8) He sent the e-mail _____ reply to my request.

9) The businessman was tricked ____ illegal activities by his partner.

10) Please, provide me ______ information about that project.

11) Our company entered _____ a contract yesterady.

5. Read the text and decide whether the statements are true (T) or false (F).

1) New Internet technologies have led to innovative illegal activities.

2) Hacking includes both the breach of computer security and unauthorized access to a computer.

3) The process of stealing personal information and obtaining financial benefit thereby is known as money laundering.

4) When users are moved to fake web sites, it is called fishing.

5) When fraudsters use phishing or pharming, they are subject to administrative proceeding.

6) Data Protection legislation regulates the way employers collect, store and distribute personal information of their employees.

7) The management of a company must have the agreement of the Board of Directors to make personal staff information available.

SPEAKING

Answer the questions:

1) Have you ever been a victim of identity theft?

2) Give examples of real cybercrimes you know (have read about or learnt through mass media or Internet).

3) Give advice to your mates how to protect yourself against identity theft/cybercrimes.

 

 

ADDITIONAL READING

IDENTITY THEFTS

Changing addresses

According to experts, members of the public are placing themselves at considerable risk from identity theft, and are being told that they must be more vigilant about discarding personal records.

With enough biographical information, a criminal can take over another person’s identity to commit a wide range of crimes; for example, a false applications for loans, fraudulent withdrawls from bank accounts or obtaining other goods which criminals might otherwise be denied. If the criminal has the bill for the falsely obtained credit card sent to an address other than the victim’s, the victim may not become aware of what is happening until the criminal has already inflicted substantial damage on the victim’s assets, credit and reputation. The same is true of bank statements showing unauthorized withdrawls.

If you think you may become the victim of identity theft, you should place a fraud alert on your credit report as soon as possible. You should then review your credit reports carefully. Look for enquiries from companies you haven’t contacted, accounts you did not open and debts on your accounts that you cannot explain.

Once you have placed a fraud alert on your credit report, potential creditors must use what the law refers to as ‘reasonable polices and procedures’ to verify your identity before issuing credit in your name.

Поделиться:





Воспользуйтесь поиском по сайту:



©2015 - 2024 megalektsii.ru Все авторские права принадлежат авторам лекционных материалов. Обратная связь с нами...