• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15

From the e-commerce strategy you gave me earlier I understand that by having a website and selling goods via the site I need to be aware of certain laws and regulations, can you please give me a brief description of each law and how they will affect the c

Extracts from this document...

Introduction

Assignment 3 Unit 8 and 28 P1 Outline the web architecture and components which enable internet and web functionality P2 Explain the user side and server side factors that influence the performance of a website P3 Explain the security risks and protection mechanisms involved in website performance. M1 Explain the role of web architecture in website communication D1 Explain the role of the TCP/IP protocol and how it links to application layer protocols. Q1 (EP4) From the e-commerce strategy you gave me earlier I understand that by having a website and selling goods via the site I need to be aware of certain laws and regulations, can you please give me a brief description of each law and how they will affect the company. The Copyright and Patents Act of 1988 The Copyright and Patents Act of 1988 is an act of parliament where inventors can apply for patents to prevent anybody copying their designs for up to 20 years. To qualify for a patent the invention must be novel and have an inventive step not obvious to an expert in the field. You cannot patent literary or artistic works, presentation of information or computer code. These come under copyright. Copyright means you can't you copy something that has already been copyrighted. For something to be copyrighted, you must be the owner of the work, and it must be your own creation. This means copy and use copyrighted material (text and pictures for the website) without the copyright holder's express permission. This will affect Bolton Area Divers in the way that they have to check all of their products or information for any Copyright or Patent infringement. You can now outsource this job to companies that sort through the new patents and put them into plain English, and tell you about all the new patents concerning a new subject, e.g., diving equipment. Providing you produce all your own materials, you shouldn't be infringing on any copyright and providing you display your copyright notices, people are not legally allowed to copy from you. ...read more.

Middle

II. Your organisation is supposed to have up to date security measures but organisation can consider cost when purchasing new (new to them) security measures. III. If you have members of staff who work from home you have to ensure that data is secure from their home across the open network. IV. The security measures should be proportionate and appropriate to the security risk and the consequence of an information breach. If a security breach occurs, you are supposed to effectively manage the breach. The correct way of handling a security breach is:- 1. Whenever a security breach happens, you are supposed to contain and recover. You are supposed to respond to the breach and where necessary you are suppose to use data recovery and damage limitation plans. 2. When a breach occurs you should assess the situation. You should assess the impact on individuals and how likely they are to be affected. 3. You should the relevant people when a breach occurs. You should be clear about why you are contacting the people and what the individuals concerned should do about the attack. You consider notifying the following bodies: the ICO, other regulatory bodies; the police, bands, the media and other third party bodies. You should also contact the individual concerned. 4. Investigate the cause of the breach and if necessary you should update your policies and procedures according to the effectiveness of your response. Q3. (P3, EM2) Surely for each of these issues there must be some kind of security feature that can prevent / minimise the impact? What kind of protection should we have in place to try and prevent these issues? Explain the security risks and protection mechanisms involved in website performance. Data Protection Act of 1998 General Protection Mechanisms You need to have good Firewalls, anti-malware, training in data protection and refresher courses and other courses which would be helpful such as digital security. ...read more.

Conclusion

How many hits and how much server side coding the pages have, will also affect it. How much needs to be downloaded/uploaded Some flash games and other sorts of streaming are constantly frames or the next part of the game. How graphically intense the webpage is and how quick the internet connection is to download them. How much data needs to be uploaded, such as validation and file uploads. Downloading is usually up to 20Mbit but uploading normally a lot slower. Layout of webpage Different layouts of pages take different times to render. Tables take longer to render, frames take longer to render and download. Bandwidth The amount of bandwidth you have on your bandwidth and the server's bandwidth will affect the performance of the website. If you or the site have used up the allocated bandwidth for the month, the page will not load. Browser Some browsers are a lot slower than others. IE generally is the slowest and some specialised versions of Firefox can be slow due to the way they are configured. Crome is the fastest graphical browser, Lynx is a fast text-only browser. Cookies The amount of cookies you have on your system can slow down the performance as the computer has to search through a directory full of cookies. If the right cookies for the right websites it can speed your computer up. What is turned on and off If you have Javascript turned off, it could load faster, but it wouldn't load everything. The same with most things like Java, Cookies and Flash, etc. Malware Malware, such as spyware will slow your computer down as it will be emailing other people information. Malware can download vast amounts of data over and jam up your bandwidth. It can upload vast amount of unneeded data or delete your files. At worst it could delete crucial files from your computer making access to the Internet impossible. The same with servers as well. ?? ?? ?? ?? Joe Alt Monday, 04 July 2011 Assignment 3 Unit 8 and 28(.coursework.info) Page 1 of 17 [1] From ICO [2] From W3Schools ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Peer reviewed

    Explain the role of web architecture in website communications

    3 star(s)

    Examples of resources that can be outsourced: * Servers providing computing capabilities, * Solution for storage or archiving * Software * Messaging or collaborative services * Office applications * CRC Tools Using Cloud Computing, these resources are supported and made available through private service providers.

  2. ict as level coursework

    The vision I had for my menu page was for it to be simple yet appealing to look at and importantly have relevance to the company. Important factors that had to be considered whilst making the menu page was the fact that logo were made to be consistent as is it a representation of the company.

  1. How successful was the Poor Law Amendment Act in 1834 in meeting the needs ...

    of labourers were full-time but receiving no wages which caused their wives and children to find a job and avoid possible starvation. It proved impossible not to give out relief to the poor in the north as thousands would have starved and there were far too many to be accommodated in the workhouses.

  2. Threats to Data

    This protocol was developed by Visa and MasterCard with the help of some major computer companies including IBM. SET is a set of rules by which transactions are governed and the rules of this protocol include two encryption methods being applied to transmitted data.

  1. Discuss the Causes and Effects of the Digital Divide

    Schools in the UK also take free up to a billion in pounds from the government so students can have enough computers to improve their IT skills each you however this is not always evenly distributed because some schools have computers for each and every student which may force students

  2. Communication & Employability Skills for IT. OCR Cambridge Technicals Unit 1 LO1-P1

    This is a responsibility of the hotel receptionist. * Requires qualifications of the employees- this would inform the employee about the qualifications needed in order to have the job and do the work successfully. * Position title- this tells the employee about what they may be regarded as and tells them the position that they are applying for.

  1. Evaluate the use of e-commerce in a brick and click organisation

    This would not happen in a brick store, if you do not have the money you will not be able to pay for the items. Similarly, brick stores have more payment methods than a click store which is beneficial. Online you can only pay for items using a debit or

  2. Explain the potential risks to an organisation of committing to an e-commerce system

    Viruses could shut down a business?s due to the malicious harm it does which means the businesses wouldn?t be able to survive.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work