• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

importance of data security and data safety

Extracts from this document...

Introduction

Why is it important to keep customer information confidential? (P6) To prevent companies from using or passing on confidential information to other companies without the permission of the person who the data is about, companies will need to protect the data. With the popularity of the Internet there are opportunities for thieves to steal their personal data. So the government set a law (data protection act) which is used to protect people's rights concerning how data is used and you also have the right to see such information and have any errors corrected. Also organisation will want to keep data confidential because it will not want its competitors to know how the business is going. List the 8 principles of the Data Protection Act The Data Protection Act says the personal data should: 1. Be adequate, relevant and not excessive. For example college should keep students details and details must be just what is needed and nothing more. 2. Be processed in accordance with the data subject right. For example the person that the data refers to have the right to read the information about him/her and the organisation should provide hem/her with information they need. 3. Be accurate and be kept up to date. ...read more.

Middle

Identification of Users: A system of user ID's and passwords is a simple method of preventing unauthorised personnel accessing the system. These should be managed by the system administrator. With this, only some users will have access to certain programmes and data therefore increasing the level of security on sensitive data. In addition, some users may only be able to read the data and not write the data. Other users may not have the ability to delete or even to access certain files. Encryption software: the data may be encrypted (coded) into a form, which can only then be decoded by the intended user. If the data falls into the wrong hands, it will be meaningless. Backups: To guard against the loss of data, backups should be regularly made. These backups should be stored in a separate place, preferably in a fireproof environment. Passwords software: Password protection usually involves a person typing in: * A User Name - to identify the person. * A Password - to identify the person. He should be the only one to know what it is. Computer viruses: which are programs that destroy the way computer operates without the knowledge of the user, there are huge numbers of viruses some are extremely malicious with the ability to delete or damage files and programs. ...read more.

Conclusion

* Aims: Built good non-food sales expanded into retailing services and exploited e-commerce successfully. * Objective: 1. To deliver a consistently strong customer offer. 2. Making their shopping trip as easy as possible. 3. Constantly seeking to reduce their prices to help customer spend less. * Logo: Cadbury Characteristics * Type of company: is an international retailer and is a publicly owned company (Public Limited Company Plc). * Products: chocolate and drinks brands. * Profit / loss: Cadbury Profit and Loss � (Millions) 2006 � (Millions) 2005 Turnover 6,508.00 6,085.00 Operating Profit / (Loss) 1,003.00 825.00 Net Interest (188.00) (205.00) Pretax Profit 843.00 642.00 Post Tax Profits 703.00 497.00 Total Dividend Paid n/a n/a Retained Profit / (Loss) for the financial year n/a n/a * Size of company: they operate in more than 35 countries and they employs over 55,000 people * Location: Americas, Europe, Middle East and Africa and Asia Pacific. * Purpose of company: the organization work together to create brands people love. * Aims : 1. Deliver shareowner performance. 2. Ensure their capabilities are best in class. 3. Reinforce reputation with employees and society * objective: 1. Responding to consumer needs quickly. 2. Grow shareowner value. 3. Attract and develop the best kind of people. * Logo : ?? ?? ?? ?? ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    Designing a data system for a vintage clothes business.

    3 star(s)

    Data may also be input incorrectly which may also cause problems later. There is currently no system which takes into account data that is sold to the same buyer which may lead to large amounts of re-written data to different forms.

  2. Peer reviewed

    information systems assignment 2

    4 star(s)

    This system would run on a larger server with internet and intranet to help the system complete its functions. Software Within a supermarket the software is very important and affects how the supermarket works and how popular and successful it is.

  1. GCSE I.T Security Case Study - Riverside Leisure Centre

    This must be done before information is used because unlawful usage of data possesses a �5000 fine in a magistrate's court and an unlimited fine in a High court. If a person suffers due to unlawful usage of data they also can claim compensation from the company and the courts, adjusted with the severity of the case, decide this amount.

  2. Smart Card System

    Others use the term ``triple-DES'' for E(K1,D(K2,E(K3,x))) or E(K1,E(K2,E(K3,x))). Key encrypting keys may be a single DEA key or a DEA key pair. Key pairs should be used where additional security is needed (e.g., the data protected by the key(s) has a long security life). A key pair shall not be encrypted or decrypted using a single key.

  1. System I designed in order to produce a promotion package for her newly formed ...

    29 SINGH PIARA F 01/01/39 SLOUGH 4 Poppy Drive Cheque 30 CUBRA ROGER M 04/07/59 HALIFAX 23 Lord Street Visa Best Data File I think my third data file was the best because it is the easiest and quickest way for the user to locate a customer.

  2. Discuss the relationship that exists in the UK between the legal rules that govern ...

    of which states; "Every company should be headed by an effective board, which is collectively responsible for the success of a company." The Combined Code 2003 S1A.1 This can also be reflected in the articles of association which contain rules governing the powers of internal constitution of a company such

  1. Propose to research the WTLS or Wireless transport layer security protocol along with the ...

    Currently, that seems to be the reason for the two different standards being used. WTLS's function is to add as much security as possible to low CPU-powered wireless devices by making the cryptography efficient. Because wireless device's CPUs are typically slow, using SSL end to end can take anywhere from

  2. Infernowear is a new company run by a self-employed creative designer aiming to producing ...

    be printable on standard A4 label paper * Payment is made through another system but there must be an option that can be check to show which customers have given correct payment. * The stock level should be updated each time an item is booked out.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work