GCSE I.T Security Case Study - Riverside Leisure Centre

Authors Avatar
Riverside Leisure Centre's Security Measures

GCSE I.T Security Case Study

Background Information

Riverside Leisure Centre is situated in Chelmsford, Essex and is owned by Chelmsford Borough Council. They have had only one reported unauthorised entry to the complex in the last five years.

The complex contains three swimming pools, an outdoor, heated indoor and a toddler indoor. It also has a Techno gym, ice rink, sports hall, licensed bar and a children's indoor play area. Due to the wide range of activities available, Riverside has a lot of visitors to it's complex. The bigger the crowds attracted, the bigger the risk of the security of customer's and employee's data being misused by unauthorised members of the public. This therefore calls for a good quality security system, both physically and via software.

Having analysed the security systems at Riverside, with the help of answered questionnaires from the centre's management and from sketches of the leisure centre itself, I have noticed that there is a good quality system in use here. In this case study I will explain the methods, advantages and disadvantages of the current system and make recommendations on how to make the leisure centre more secure.

Software Security Of Riverside

Passwords

Riverside uses a password log on system on all computers within the centre. Each employee has it's own username and password to log on to the computer, which holds data. This makes it impossible for intruders to log on to the computer without having access to an employee's user name and password. This is useful because it prevents unauthorised access but also allows management to pinpoint who has been on the computers at any one time. If an employee told an unauthorised person their username and password and that person obtained data from the computer, management could see exactly which employee had loaned their username/password and deal with them appropriately.

Riverside also operates a hierarchy system when using passwords to access data. If the system holds some high security data the system is able to block certain users (even authorised system users) from accessing it. This means that management get to see high security data exclusively and therefore reducing the risk of it falling it to the wrong hands.

Policies of Shareware/Freeware

Riverside does not download freeware or shareware from the Internet as it recognises the dangers of hidden viruses in the attachments and programs themselves. These programs are often not certified and therefore if downloaded, crucial files may become corrupt as a result of a virus being let into the system this way.

Data Protection Act

Riverside also abides by the Data protection Act (1998 as amended). The Act is in place to protect the data held by the data user (in this case the data held will be addresses, bank details, fitness levels of customers and the data user will be Riverside). There are eight principles to the Data Protection Act, as was there in the 1984 version. The only difference between the 1984 version and the amended version of 1998 is that the 1998 version has been widened to include data that is stored on computers and can easily be transferred to another country by use of email.

Principles of the Data Protection Act

The following principles will apply to Riverside when it is using the data it has collected from customers.

/Personal data must be processed fairly and lawfully and at least one of the processing conditions is met, and in the case of processing the data must be processed fairly and lawfully and at least one of the conditions for processing sensitive personal data is met.

The conditions for each of these categories would usually be that the subject has given consent.

Personal data processing conditions:

The subject's consent may not be required if the processing is to protect the subject as in the case of urgently retrieving a subject's medical record after a serious accident, or for the administration of justice, or to comply with legal obligations, or in the public interest.

Processing conditions

The subject's consent may not be required if:

* The Data Controller has legal obligations to process the subject's employee data

* or if the data subject is unable to give consent, e.g. unconscious

* In order to protect the vital interests of the data subject or another person

* In a case where consent on or behalf of another person has been unreasonably withheld, e.g. parent's religious beliefs preventing their child's right to hospital treatment and life.

* Or where processing is necessary for legal reasons, e.g. obtaining legal advice, exercising or defending legal rights, for the administration of justice.

Or

* The processing is carried out as part of the lawful activities of any non-profit making political, philosophical, religious, or trade union organisation. The processing must safeguard the rights and freedoms of the data subjects. It must be limited to members or persons in regular contact with the organisation and it must not disclose any personal data to others without the data subject's consent.
Join now!


Or the Secretary of State may specify cases where this condition is excluded or modified, e.g.

* Where the processing is necessary for medical purposes

* Where sensitive personal data is necessary for monitoring equal opportunities for people of different racial or ethnic origins and is carried out with the usual safeguards for the rights and freedoms of data subjects.

2/Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes. There are ...

This is a preview of the whole essay