• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Everyone has the right to privacy. This is the right to not have details about our lives to be held or circulated without our knowledge/consent. Data of personnel nature are collect every so often by organisations.

Extracts from this document...

Introduction

Chapter 13 - Protecting Data Issues of Privacy Everyone has the right to privacy. This is the right to not have details about our lives to be held or circulated without our knowledge/consent. Data of personnel nature are collect every so often by organisations. For example: * Employers hold personnel records that include data on address, age, qualification, salary, sick leave and so on. * Stores hold detail on credit card payment, accounts history, items purchased; * Banks hold details on salary, income and withdrawals, direct debits to various organisations; * Insurance companies hold detail on property, cars, accidents, claims and health. This list is endless. Modern technology has made it possible to store vast quantities of data, so that it can be viewed from all over the world and so that it can be used to create a profile of an individual. Threats to information Systems Organisations can protect the integrity of data (by preventing inaccurate data entry, malicious or accidental alteration), and simple measures can be taken to protect the security of data form theft or destruction. Data Integrity This refers to the correctness of data. The data held on a computer may become incorrect, corrupt or of 'poor quality'. ...read more.

Middle

e.g. A hospital receptionist may have the right to view and change some patient details, such as the name, address, and appointments. But they may not have access to the patient's medical file. Access rights to data could be set to 'read only', 'read/write' or 'no access'. This way a user in a company can gain access to data which they are permitted to see and can only change data if they are authorised to do so. Likewise, the computer it self can be programmed to allow access to data from a particular terminal, and only at a certain time of day. The terminal in the administrator's office may be the only terminal which has authorisation to change the structure of a database. An access directory can be made, which shows each user's access rights. Securing against fraudulent use or malicious damage Organisations are often exposed due to: * The possibility of fraud; * The deliberate corruption of data by unhappy employees; * Theft of software or data which may fall into the hands of their competitors. Measures to oppose these risks are as follows. * Careful selection of employees * Immediate removal of employees who have been sacked or who hand in their resignation, and the cancellation of their passwords and authorisation. ...read more.

Conclusion

A simple disk head crash can destroy a disk packing a fraction of a second. System designers must provide a reasonable backup facility that does not degrade the performance of the system and is not very expensive. The cost of lack of planning for a computer failure can be ruinous. Periodic Backups The most common way to ensure that data is not lost is to make regular copies of files into a safe place. This is called 'Periodic Backups'. This scheme has several weaknesses: * All updates to a file since the last backup may be lost; * The systems may need to be shut down during backup operations; * Backups of large files can be time consuming; * When a failure occurs, recovery from the backup can be even more time consuming. A benefit is that files which may have been fragmented can be reorganised to occupy smaller amounts of same, resulting in faster access time. It is important to store copies of data in secure areas. One copy of data can be held in a fire-proof safe in a building and another off-site. Recovery procedures A contingency plan needs to be developed to allow rapid recovery of major disruptions. It is necessary to do the following in backup procedures: 1. Identify alternative compatible equipment and security facilities, or implement a service agreement which provides equipment when needed. 2. Have provision for alternative communication links. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    An introduction to Identity Theft

    4 star(s)

    court action, seizure of goods and the attendance of bogus debt collectors to the business premises. * Network Invasion This is potentially the most insidious tool for corporate identity theft. The following is an example as to how the criminal can access the network; A telephone call is made by

  2. I have been given the task to design a database for a company called ...

    Thus showing that the query is definitely working correctly. Finding ID I used the business 'Hats are you', you can see from appendix one what the correct data should be. Below is a screen print of the findings via the query.

  1. Different ways of data capture

    *Faulty connection between hardware could mean characters are transmitted incorrectly. VERIFICATION AND VALIDATION VALIDATION CHAECK: Validation is making sure info is inputted sensibly/realistically and not necasarrily correct. USED TO DECREASE DATA ENTRY ERRORS Presence check - Certain fields must be present/filled in. Format Check - Code has a set format.

  2. With diagrams compare and contrast the relative advantages and disadvantages of digital transmission over ...

    This is though not true while WDM is more of a part of FDM. FDM can be used in coaxial cables for example but WDM can only be used in optical fibers. In WDM we mention about wave-lengths and in FDM about frequencies.

  1. Free essay

    Setting up and E-Commerce Site

    The fact that the services allows the user to take full control over the catalogue is very good, this means that it is in their full control whilst if anything goes wrong they can still ask for the support and service of the people that created and implemented it in the first place.

  2. Security Issues of E-Commerce

    Previous Names We can see that if a un trusted user were to try and gain access or purchase with someone else's details or cards then the chances of success are limited greatly, whereas the chip and pin is a lot easier to sue.

  1. Introduction to Viruses

    "Eternal Damnation". This worm almost entirely based on Sircam, contains messages similar to those of its predecessor. The attachment is a modified version of Sircam, which after sending itself to all the user's contacts, opens the default browser to www.sell-your-soul.com and, using private information found on the user's machine, automatically

  2. Smart Card System

    Several people have made DES code available via ftp. Stig Ostholm [FTPSO]; BSD [FTPBK]; Eric Young [FTPEY]; Dennis Furguson [FTPDF]; Mark Riordan [FTPMR]; Phil Karn [FTPPK]. A Pascal listing of DES is also given in Patterson [PAT87]. Antti Louko <alo@kampi.hut.fi> has written a version of DES with BigNum packages in [FTPAL].

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work