Course - DT249/1 Subject - Information Systems in Organisations Semester 1, Week 11 REGULATION AND COMPLIANCE 1 Module Content Title From the course document, this week’s lecture refers to: Information Technology regulation and compliance 2 Textbooks? The Laudon and Laudon book, ‘Management Information Systems’ (Seventh Edition): all of Chapter 15. 3 Information Systems Management and the Law Management must understand the scope of the organisation’s legal and ethical responsibilities. To minimise liabilities/reduce risks, the person responsible for information security must: ◦ Understand the current legal environment ◦ Stay current with laws and regulations ◦ Watch for new issues that emerge 4 IS Management and the Law (2) The law is the set of rules that can be enforced in a court. There are many sets of laws and they exist in a jurisdiction. A jurisdiction is usually a geographical area controlled by government or royalty and might be, for example, a province, state, principality or country. 5 IS Management and the Law (3) The nature of organisations is such that they are subject to ‘laws of the land’ and they will also have internal rules and policies. The information systems of an organisation – because of their complexity and expense – become subject to some of these laws and policies. 6 IS Management and the Law (4) Management must differentiate between laws and ethics. They must identify the major national laws that relate to the practice of information security. They must understand the role of culture as it applies to ethics in information security. 7 Law and Ethics in Information Systems Laws: rules that mandate or prohibit certain societal behaviour. Ethics: define socially acceptable behaviour. Cultural mores: the fixed moral attitudes or customs of a particular group. (Ethics are based on these.) Laws carry the sanctions of a governing authority; ethics do not. 8 Ethics and Information Systems Ethics, in the context of information systems, will be ‘rules of conduct’ that will account for: ◦ making free choices ◦ behaviour ◦ ways of thinking Especially in situations where the developers’ /users’ choice can affect the dignity and wellbeing of others. 9 Ethics and Information Systems (2) Ethical principles: Treat others as you wish to be treated. Put value on outcomes and understand the consequences of actions. Incur the least harm or cost. Morally sensitive actions are not – or are rarely – ‘consequence-free’. If an action is not right for everyone, it is not right for anyone. 10 Ethics and Information Systems (3) Is copying software wrong? Is copying some software more wrong than others? Is ‘hacking and cracking’ (code cracking) wrong? Are these things acceptable in the case of some users but not others? What do you do if your boss asks – or tells you to do it? These questions are difficult to answer definitively. 11 Do Computer Professionals Need a ‘Code of Ethics’? Copying from the Web is not seen as a crime, but as a right by many people. Hardware and software products are frequently shipped ◦ ◦ ◦ ◦ ◦ that have bugs and defects, that are, themselves, excessive compared to need, unworkable, unsupportable, overpriced. Who must take responsibility for the above? DT249-1 Information Systems 12 Do Computer Professionals Need a ‘Code of Ethics’? (2) ‘Flaming’ and ‘spam’ are common on the internet. ◦ On the Internet, flaming is giving someone a verbal lashing in public but is also the term sometimes used to describe sending large numbers of meaningless e-mails to clog up a user’s e-mail Inbox. ◦ Spam is a form of bulk mail, usually advertisements, sent to a list of users on e-mail distribution lists that are bought for the purpose. To the user-receiver it is usually viewed as junk email. DT249-1 Information Systems 13 Do Computer Professionals Need a ‘Code of Ethics’? (3) Viruses are common on shipped software and e-mailed messages/information products. Computer ‘professionals’ are often responsible for all the above – sometimes by accident, other times by design. DT249-1 Information Systems 14 ACM Code of Conduct The ACM (Association for Computing Machinery) is an international body representing the Computing industry and is based in New York, USA. A large part of its remit is to govern the ethical practices of professionals in Computing. The organisation has a general list of imperatives. 15 ACM Code of Conduct General Moral Imperatives Contribute to society and human well-being Avoid harm to others Be honest and trustworthy Honour property rights, copyrights and patents Give credit for intellectual property Access only authorised resources Respect the privacy of others DT249-1 Information Systems 16 ACM CODE OF CONDUCT Specific Professional Responsibilities (1 of 2) Strive to achieve the highest quality, effectiveness and dignity in both the process and products of professional work. Acquire and maintain professional competence. Know and respect existing laws pertaining to professional work. Accept and provide appropriate professional review. DT249-1 Information Systems 17 ACM CODE OF CONDUCT Specific Professional Responsibilities (2 of 2) Give comprehensive and thorough evaluations of computer systems and their impacts, including analysis of possible risks. Honour contracts, agreements, and assigned responsibilities. Improve public understanding of computing and its consequences. Access computing and communication resources only when authorised to do so. 18 ACM CODE OF CONDUCT Organisational Leadership Imperatives (1 of 2) Articulate social responsibilities of members of an organisation unit and encourage full acceptance of those responsibilities. Manage personnel and resources to design and build information systems that enhance the quality of working life. Acknowledge and support proper uses of an organisations computing and communication resources. 19 ACM CODE OF CONDUCT Organisational Leadership Imperatives (2 of 2) Ensure that users and those who will be affected by a system have their needs clearly articulated. Articulate and support policies that protect the dignity of users and others affected by a computing system. Create opportunities for members of the organisation to learn the principles and limitations of computer systems. 20 Types of Law Civil Criminal Tort Private Public 21 Ireland’s Legal Areas In Ireland the laws that apply to Information and Communication Technologies (ICTs), focus on five main areas: Privacy, Data Protection, e-Commerce, Intellectual Property and Crime. 22 Ireland’s Legal Areas (2) Constitution Common law ◦ Made by a judge’s judgement ◦ Often uses a ‘precedent system’. Statute law (legislation) ◦ Oireachtas ◦ Primary legislation – Acts ◦ Secondary legislation – Regulations ◦ European Community Law 23 Privacy Privacy is one of the hottest topics in information systems and security. This type of privacy is a “state of being free from unsanctioned intrusion”. The ability to aggregate data from multiple sources allows the creation of information databases previously unheard of. 24 Privacy (2) Privacy – “the right to be left alone” Fair Information Practices (FIP): No secret personal records to be kept. Individuals should be able to access and amend information about themselves. Information to be used only with prior consent from those whom the information is kept. Managers are accountable for damage done by systems. Governments can intervene. 25 Data Protection Data protection is built around four rules: 1. 2. 3. 4. There has to be a legitimate basis for the data processing to take place; The processing has to comply with the principles of data protection; The processing has to comply with certain sectoral rules such as the prohibition on the processing of sensitive personal data; The rights of the subject, such as access and objection, have to be respected. 26 Privacy and Data Protection Act The Data Protection Acts of 1988 and 2003 - Section 2(1)(a) of the Acts requires that: "The data or, as the case may be, the information constituting the data shall have been obtained, and the data shall be processed fairly". This fair obtaining principle generally requires that a person whose data are processed is aware of at least the following: The identity of the person processing the data. The purpose or purposes for which the data are processed. Any third party to whom the data may be disclosed. The existence of a right of access and a right of rectification. 27 E-Commerce The Electronic Commerce Act, 2000 relates to the creation of contracts made electronically. It codifies elements of the existing common law of contract and implements much of the EU Directive on Electronic Signatures 1999/93/EC. The Act provides that the acceptance of an offer between parties may be made by electronic means and normal contractual rules apply. There are complex provisions setting out the time and place where an electronic communication may be deemed to have been dispatched and received. 28 Intellectual Property Intellectual property is the term given to describe a number of different statutory rights: ◦ Copyright law ◦ Patent law ◦ Trade mark law 29 Intellectual Property (2) Intellectual Property: Intangible creations protected by law. Trade Secret: Intellectual work or a product belonging to a business that is not in the Public Domain. Copyright: A Statutory Grant protecting intellectual property from copying by others for ‘life of author + 50 years’. 30 Intellectual Property (3) Patent: A legal document granting the owner an exclusive monopoly on an invention for 20 years (generally). Trade Mark: A legally registered mark, device, or name to distinguish goods produced by an individual (company). Open source: Of software; ‘free-to-use’ software. 31 Crime – Cyber Crime Information systems crime: Computers can be used maliciously to damage others, what might be termed ‘hacking’ type offences; Computers can be used to communicate with victims, what might be termed ‘fraud’ type offences; Computers may be used to create, display and publish material that is criminal in nature, what might be termed ‘content’ offences; Computers may be used to organise other offences, which do not themselves involve the use of computers, this gives rise to issues of evidence. 32 Crime - Hacking Computer hacking involves identifying and exploiting vulnerabilities in others computer systems. Though there are some common law offences that might be applied to computer crime, in theory, Ireland’s computer crime laws centre upon two items of legislation: the Criminal Damage Act 1991, and the Criminal Justice (Theft and Fraud Offences) Act 2001. 33 What is Regulation? Regulation, in the context of information systems and the law in Ireland come under laws of privacy and ethical trading with e-commerce established by the European Union. There are no specific laws governing all information systems in Ireland. Regulations for technology are often associated with the Data Protection Act and trading acts. You could say that regulation in information systems comes mainly from individual contracts set up by organisations. 34 What is Compliance? Where there are regulations – either by law or company policy, compliance could be seen as observance of the official requirements of the regulation(s). The act or process of complying with a demand or recommendation that comes from regulation is usually a task for a member of management. 35 Legal Issues The laws associated with information technology have many aspects. We can look at commonly discussed legal issues related to information systems or IT: ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ Contracts Outsourcing Software licencing Data protection Acceptable use Intellectual property rights Computer fraud Taxation 36 Contracts Contracts are legal documents defining the legal implications of buying, selling or becoming involved with products and services of – in this MIS context – hardware and software systems and the issues surrounding them. Contracts can take many forms – what follows is a general, basic description of a contract. 37 Contracts (2) The structure of a contract in our context is, generally: ◦ The date on which the contract was entered into ◦ The names and addresses of those entering the contract ◦ A description of what the contract is about – having titles such as ‘Background’, ‘Recitals’ or ‘Whereas’ ◦ Definitions of terms used in the contract ◦ Provisions made by one party (e.g. Supplier) ◦ What must be paid to the provider (supplier) 38 Contracts (3) Buying hardware, software and/or services (for support and maintenance, very often) often involves a contract – a contract for procurement or a contract of procurement. 39 Hardware Procurement Contract The details for a hardware procurement contract might include: ◦ ◦ ◦ ◦ ◦ ◦ ◦ A description of the hardware A warranty for the quality of the hardware Delivery dates Price Acceptance testing (description) Future maintenance description Training 40 Software Procurement Contract Software purchase is much more complex in terms of contract design. The software may be developed specifically for the organisation (bespoke) or be ready to sell ‘off-the shelf’. More of this type of contract is mentioned in the section on Software Licencing. 41 Software Procurement Contract (2) The contract for procurement is carefully drawn up to reflect what type of software will be provided, what the software is required to do, whether there is a maintenance feature to the deal, what provision there is for the cessation of the supply company and many other aspects of law surrounding the idea of ‘keeping the software working’. 42 Services (Consultation) Procurement Contract If buying consultancy services – as distinct from maintenance and support – where there is a need to consult on design and implementation, for example, the contract details might include: ◦ Definition of deliverables – what the consultant is expected to do ◦ Payment arrangements ◦ Copyright and confidentiality ◦ Insurance (professional indemnity) ◦ Key personnel listing (A list of people expected to be involved in the consultant’s interviews, questionnaires, etc.) ◦ Termination arrangements 43 Outsourcing In the context of Management Information Systems or Information Systems in Organisations, outsourcing is the supply of goods and/or services to a client – which could be an individual or an organisation. Legally, there are usually contracts involved. Types of contract are: ◦ Facilities management ◦ Business process outsourcing ◦ Application service provision 44 A Contract for Outsourcing It is difficult to specify a typical contract for product or service outsourcing, but – very generally – a contract for software services, as an example, may contain: ◦ The statement of requirements ◦ The technical solution ◦ An output specification 45 A Contract for Outsourcing (2) Similar to hardware, software and services procurement, there is often a special contract that is applied to outsourcing called a Service Level Agreement (SLA). An SLA often has the details of: ◦ Service levels to be achieved ◦ Targets for service levels ◦ Mechanisms for monitoring and reporting service levels against those targets ◦ Consequences of failure to meet targets 46 Software Licencing One might view software licencing as another form of contract. A licence should confirm that the software supplier owns the copyright in the software or has the right to licence it to the organisation. Usually, the software supplier is not selling ownership of software to an organisation but the permission to use it as they wish. This leaves the supplier able to provide copies of the software to other people or organisations. 47 Software Licencing (2) Usually a contract is drawn up – called the licence agreement, since the licence is really a legal agreement between the software supplier and a client. (The client being the organisation, for example.) There are variations in such agreements; ◦ Is the licence restricted to one office, one department, one organisation or can the software be lent to ‘sister companies’? …/ continued 48 Software Licencing (3) ◦ Is there a user restriction? Does the agreement allow up to, say 20 users? Do extra users require individual licences or another group licence? ◦ Are there time constraints? One year? Two Years? ◦ Are there any other restrictions? 49 Data Protection (Reprise) As an organisation processing data one must ensure that the processing is lawful. The data must have been obtained fairly and lawfully. When obtaining data from a third party you must inform the subject of the data that you have data pertaining to them, telling the subject why you are using the data and how you will use them. 50 Data Protection Reprise (2) Personal data must be: ◦ ◦ ◦ ◦ ◦ ◦ Fairly and lawfully processed Processed for limited purposes Adequate, relevant and not excessive Accurate Not kept longer than necessary Processed in accordance with the data subject’s rights ◦ Secure ◦ Not transferred to countries without adequate protection 51 Acceptable Use Employees use computers for their information work – they may also use their employer’s computers for personal matters, such as booking a cheap flight, buying books and gifts and sending e-mails to friends and family. While all of these are viewed in different terms – from ‘perks of the job’, through ‘a bit of a cheek’ to ‘an offence suitable for reprimand’ the truth is that they are not the Crime of the Century! 52 Acceptable Use (2) The view may be ‘acceptable use’ of computers through to ‘not very acceptable use’ but hardly ever make it out of the ‘grey area’ into misuse of computer systems. Misuse might be seen as an ◦ excessive waste of staff time and resources, ◦ actions exposing the organisation to claims for discrimination, harassment, defamation or worse, ◦ failure to include information that results in criminal liability. ◦ (On the employer’s side;) health and safety requirements for screens and other computer equipment must be met. 53 Acceptable Use (3) Usage policies Computer usage policies are very often established because employers can be held responsible for wrongful actions carried out by employees in the course of their employment. 54 Acceptable Use (4) Common usage problems are: ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ Racial harassment Sexual harassment Downloading pornography Defamation of management, customers or competitors, Breach of confidence Copyright infringement Hacking (into systems) Breaches of the Data protection Act 55 Computer Fraud Computer fraud is common and undesirable – that is a given! Many Management Information Systems service providers see the responsibility of avoiding this fraud to belong to the organisation itself. Corporate governance is the term for the idea that an organisation ‘watches out’ for computer fraud. 56 Computer Fraud (2) Corporate governance can be, in part at least, dealt with using technical audits. The same audits as mentioned back in the IT Security notes. Internal audit activity should contribute to the organisation’s governance process though which values and goals are established, communicated and accomplished. This is the responsibility of management. 57 Computer Fraud (3) The European Confederation of Institutes of Internal Auditing (ECIIA), of which IIA - UK and Ireland are members, has, in documentation, described how the professional practice of internal auditing makes a positive contribution to achieving good corporate governance and effective risk management in organisations based in Europe and beyond. 58 Taxation E-commerce means that organisations can trade across borders. There is an Electronic Commerce Act, established by the Oireachtas in 2000. A Communications Regulations Bill (2007) amended the state law on e-commerce, giving ComReg more power in controlling data and information flow on the internet, with regard to buying and selling. 59 Taxation (2) Issues for taxation in e-commerce include: ◦ ◦ ◦ ◦ Identification of a transaction Identification of the parties to a transaction Verification of the details of the transaction Application of the correct taxing rules and remittance to the taxing authority ◦ Generation of an audit trail. ◦ The country of the supplier, generally, has the government to which the tax laws apply. 60 What Next? Next week: Interaction: (Human-Computer Interface) 61