Cyber Law Project: Analysis of Cyber Law for University SMS

Verified

Added on  2023/02/01

|20
|1040
|29
Project
AI Summary
This project examines cyber law principles and their application to a student management system (SMS) within a university setting in New South Wales, Australia. It begins with an introduction to cyber law, followed by an overview of the university's plan to implement an in-house built SMS. The project then outlines the legal obligations of the university under various laws, including the Cybercrime Act 2001 and the Privacy Act 1988. It explores regulations set by the Australian Cyber Security Centre and the Australian Cyber Security Commission, detailing requirements for software usage, data security, and password protocols. The project also discusses various cybercrimes as defined in the Crimes Act 1914 and concludes with a summary of the importance of cyber law and the need for continuous updates and amendments to protect information in the digital age. References are provided at the end.
Document Page
Cyber Law
Project
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Content
Introduction
Overview
In house built system
Student management system (SMS)
Various crimes as provided in
Crimes Act, 1914
Obligations of University A under
various types of laws
Non-compliance
Regulations by Australian Cyber
Security Commission
References
Document Page
Introduction
Cyber law is a branch of legal system which
is applicable on the matters related with
internet, cyberspace and related areas. It
is wider in context as it provides legal
provisions governing freedom of
expression, access to and usage of
internet and online privacy.
Document Page
Overview
University A in NSW, Australia university to
implement a whole new Student
Management System to have better
management of operations. This fulfils
variety of requirements like improved
compliance, better response of University
to market conditions, to improve student
experience and many more.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
In house built system
This involves activities whereby a product is
produced by an entity within the premises
of an organization. In this process, a
company does not rely on outsourcing.
Employees of the organization are used to
build the product.
Document Page
Student management system (SMS)
It is a software which is programmed to
manage routine operations of school and
colleges. It contains information about
every student which is important. There are
software like SAP, J2E etc. which are used
for designing the software package that can
fulfil needs of clients.
Document Page
Cyber system
There are other considerations apart from
cost which hold importance such as
legislation applicable on Cyber
system. Software and internet are two
components which are used in SMS
for efficient working.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Regulations
There are legal provisions which must be
complied with in order to avoid legal
consequences. Australian Cyber
Security Centre has provided certain
requirements which should be there
before proceeding with development of
SMS, these are as follows:
Document Page
Australian Cyber Security Centre Regulations
Expertise to use the software by a person who is capable and equipped with
adequate knowledge and skills to handle and work on the system.
Information about number of laws applicable on data that will be contained in
the system.
Adequate security for protecting hacking, phishing or any other cyberattacks.
Document Page
Various crimes as provided in Crimes Act, 1914
Hacking: Unauthorised access into a
computer or computer networks. Person
involved in this illegal activity is known as
hacker. It can change security features and
make the system weak.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Obligations of University A under various types
of laws
Cybercrime Act, 2001: Obligations of University A under this act are as follows:
Not to allow any act which is unknown related to premises, computers, or
telecommunications services within the University.
To gather information which can help with the whole system.
To obtain a certificate from prescribed authority certifying that all the formalities have
been complied with and security has been incorporated.
Document Page
Usages of Information technology
The usages of Information technology has
increased in the past few years due to
which people have become aware about
pros and con of it. A work can be done
easily and accurately with the use of
software.
chevron_up_icon
1 out of 20
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]