• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

'Explain why security is important to supermarkets. Discuss ways in which a supermarket can ensure data information in general products can be made secure.'

Extracts from this document...

Introduction

Elizabeth Warwick 10B 'Explain why security is important to supermarkets. Discuss ways in which a supermarket can ensure data information in general products can be made secure.' Security is important to supermarkets because their computers are a cog in the running of the supermarket, it is vital no-one without authority can access the computer systems as they contain private and vital information, dealing with many aspects of the running of the supermarket. Computers in supermarkets deal with so many things, such as CCTV cameras, their web sites, automatic stock check, EPOS, advertisements and posters, food labels, bar codes, even the automatic doors. If at any point the information was changed or lost it was cause disaster in the supermarket franchise business. Systems can be protected by the use of passwords; this is a simple measure and can quickly be installed. Each staff member can have their one username and password to hopefully disable unauthorised users to enter the computer system, or certainly make it harder for them to do so. In a business there is almost no way of knowing other peoples passwords as there is such a large number of people, and such a variety of passwords, it would almost be impossible to guess. ...read more.

Middle

The Data Protection Act works in two ways. As well as giving you certain rights, it states that those who record and use personal information must be open about how the information is used and must follow the eight principles of 'good information handling.' When data is handled following these eight principles it ensure that it is being handled correctly according to the Data Protection Act. It must fairly and lawfully processed, processed for limited purposes, adequate, relevant and not excessive, accurate, not kept for longer then is necessary, processed in line with your rights, be secure and not transferred to countries without adequate protection. If supermarkets make sure they have details about this on their computers there would be great benefits for the good of the business. It would help to fight crime i.e., the system being entered by unauthorised persons and being used illegally, affecting the business substantially. Better medical care is another benefit. Benefits like this infect would make employees become more motivated which is the highest thing in the hierarchy of needs for employers. This would make a business run altogether more efficiently, as well as protecting the systems. ...read more.

Conclusion

Physically things can be stolen which means insurance premiums are increased, staff no longer feel that their belongings are secure so resign or sue the company, causing the company to become bankrupt or left with no employees. Another result of the computer system being hacked into because of the lack of security is prices being changed so customers do not want to buy products in the supermarket. They could be fooled if someone has changed the barcode number in the system so the number on the database and product are not compatible, or confusion. It may even cost the business money or the customer money, making the business liable to be legally battled by the customer. Automatic stock checks could also be changed by hackers so there is not enough stock in the supermarket, or they receive too much and as they haven't even made the profit from it they can't afford to re-order more. Supermarkets rely on ICT and the products they sell, if hackers change information that is private to the business effecting the products and general running of the business and destructing the whole business, it will eventually no longer be able to run as a business! This is why security is so essential to a business. Elizabeth Warwick 10B 01/05/2007 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level ICT in Business section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level ICT in Business essays

  1. UNIT4: PRESENTING BUSINESS INFORMATION

    Since it's a notice board, then every one is meant to read what is on the notice board. Employees have different shifts so it will be hard for the manager to pass on relevant information to all staff members. In Tesco, shifts timetables are displayed on the notice board to

  2. For my business report I am investigating the Co-op erative society supermarket.

    Disadvantages: * Co-op erative has the weaknesses of most democratic organizations. * The manager has to always remember that he/she is responsible to the membership of the group, and this may put a brake on the initiative and flexibility he/she can use in operating the Co-op .

  1. The process of electroplating and how it is used to protect products.

    This information will be on primary and secondary sources. - I will need to look at primary and secondary sources to find out the function of the raw materials and what they are used for when electroplating. This is so that I know they are being used for a purpose rather than being wasted.

  2. The purpose of this document is to define the Context of Cain Motors Information ...

    * Deployment Plan for rollout of application * Training Materials including user manuals * Design Model - updated from elaboration phase * Data Model - updated from elaboration phase * Test Suite of cases to validate each iteration of implementation 16.1.1.

  1. Apple must follow many policies to keep information safe and secure from system failure ...

    We will retain your personal information for the period necessary to fulfill the purposes outlined in this Privacy Policy unless a longer retention period is required or permitted by law. This shows that Apple have stated that they make it easy for their customers to access their own information.

  2. Articles on franchise

    The franchisee may have to pay a small percentage to the franchisor for these services. Proven business format- The franchise business is proven to be successful as it is presumably well established and well known. There is also tried and tested product or services and a set of established operational guidelines which avoid major problems in the start-up period.

  1. The Use of Geographical Information Systems (GIS) And International Technology Transfer by Non-Governmental ...

    The threat of Bolshevik Revolution inspiring Third world sought to be countered by a promise of "development" and "development assistance" will help the "underdeveloped" societies catch up with the "developed" (Md. Anisur Rahman, 1991 p. 8). The state of development to which the underdeveloped nations were assumed to aspire was

  2. Free essay

    Managing information

    Some political factors businesses may need to take into consideration are laws, political pressures and government's view. Economic The performance of the economy having impacts on organisations. The business cycle is very important because it affects consumer and business spending.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work