• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

From the e-commerce strategy you gave me earlier I understand that by having a website and selling goods via the site I need to be aware of certain laws and regulations, can you please give me a brief description of each law and how they will affect the c

Extracts from this document...


Assignment 3 Unit 8 and 28 P1 Outline the web architecture and components which enable internet and web functionality P2 Explain the user side and server side factors that influence the performance of a website P3 Explain the security risks and protection mechanisms involved in website performance. M1 Explain the role of web architecture in website communication D1 Explain the role of the TCP/IP protocol and how it links to application layer protocols. Q1 (EP4) From the e-commerce strategy you gave me earlier I understand that by having a website and selling goods via the site I need to be aware of certain laws and regulations, can you please give me a brief description of each law and how they will affect the company. The Copyright and Patents Act of 1988 The Copyright and Patents Act of 1988 is an act of parliament where inventors can apply for patents to prevent anybody copying their designs for up to 20 years. To qualify for a patent the invention must be novel and have an inventive step not obvious to an expert in the field. You cannot patent literary or artistic works, presentation of information or computer code. These come under copyright. Copyright means you can't you copy something that has already been copyrighted. For something to be copyrighted, you must be the owner of the work, and it must be your own creation. This means copy and use copyrighted material (text and pictures for the website) without the copyright holder's express permission. This will affect Bolton Area Divers in the way that they have to check all of their products or information for any Copyright or Patent infringement. You can now outsource this job to companies that sort through the new patents and put them into plain English, and tell you about all the new patents concerning a new subject, e.g., diving equipment. Providing you produce all your own materials, you shouldn't be infringing on any copyright and providing you display your copyright notices, people are not legally allowed to copy from you. ...read more.


II. Your organisation is supposed to have up to date security measures but organisation can consider cost when purchasing new (new to them) security measures. III. If you have members of staff who work from home you have to ensure that data is secure from their home across the open network. IV. The security measures should be proportionate and appropriate to the security risk and the consequence of an information breach. If a security breach occurs, you are supposed to effectively manage the breach. The correct way of handling a security breach is:- 1. Whenever a security breach happens, you are supposed to contain and recover. You are supposed to respond to the breach and where necessary you are suppose to use data recovery and damage limitation plans. 2. When a breach occurs you should assess the situation. You should assess the impact on individuals and how likely they are to be affected. 3. You should the relevant people when a breach occurs. You should be clear about why you are contacting the people and what the individuals concerned should do about the attack. You consider notifying the following bodies: the ICO, other regulatory bodies; the police, bands, the media and other third party bodies. You should also contact the individual concerned. 4. Investigate the cause of the breach and if necessary you should update your policies and procedures according to the effectiveness of your response. Q3. (P3, EM2) Surely for each of these issues there must be some kind of security feature that can prevent / minimise the impact? What kind of protection should we have in place to try and prevent these issues? Explain the security risks and protection mechanisms involved in website performance. Data Protection Act of 1998 General Protection Mechanisms You need to have good Firewalls, anti-malware, training in data protection and refresher courses and other courses which would be helpful such as digital security. ...read more.


How many hits and how much server side coding the pages have, will also affect it. How much needs to be downloaded/uploaded Some flash games and other sorts of streaming are constantly frames or the next part of the game. How graphically intense the webpage is and how quick the internet connection is to download them. How much data needs to be uploaded, such as validation and file uploads. Downloading is usually up to 20Mbit but uploading normally a lot slower. Layout of webpage Different layouts of pages take different times to render. Tables take longer to render, frames take longer to render and download. Bandwidth The amount of bandwidth you have on your bandwidth and the server's bandwidth will affect the performance of the website. If you or the site have used up the allocated bandwidth for the month, the page will not load. Browser Some browsers are a lot slower than others. IE generally is the slowest and some specialised versions of Firefox can be slow due to the way they are configured. Crome is the fastest graphical browser, Lynx is a fast text-only browser. Cookies The amount of cookies you have on your system can slow down the performance as the computer has to search through a directory full of cookies. If the right cookies for the right websites it can speed your computer up. What is turned on and off If you have Javascript turned off, it could load faster, but it wouldn't load everything. The same with most things like Java, Cookies and Flash, etc. Malware Malware, such as spyware will slow your computer down as it will be emailing other people information. Malware can download vast amounts of data over and jam up your bandwidth. It can upload vast amount of unneeded data or delete your files. At worst it could delete crucial files from your computer making access to the Internet impossible. The same with servers as well. ?? ?? ?? ?? Joe Alt Monday, 04 July 2011 Assignment 3 Unit 8 and 28(.coursework.info) Page 1 of 17 [1] From ICO [2] From W3Schools ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    a password system for security; UR35: be easy to understand for the user. UR36: be able to back-up data UR37: have a disaster recovery plan management strategy Information Requirements In addition to the end-user requirements, I have also been able to discern the information that the new system will hold and use.

  2. Marked by a teacher

    Investigating a Transactional Website (www.latestdvd9.com)

    4 star(s)

    You only need to give your details. It is only possible to see what other customers also bought if there were usernames for every customer, which would allow others to see what each customer bought from the website. Furthermore there is the problem that this would not be that helpful

  1. Marked by a teacher

    Social Implications of E-Commerce

    The main way today's shopping experiences differ from those of the past is the accessibility of an endless array of products. Shopping is now a much more global experience.

  2. Marked by a teacher

    Evaluation. In this unit of controlled assessment I have developed a website using multimedia ...

    I explained the frame rate used and explained that it seemed fit for purpose. Banner- I also produced an animated banner combining both text and a graphic. In this animation I included the name of the school the website is promoting and an image of a school bus.

  1. The Impact of Mobile Phones on social Interaction

    of particular words and symbols that were incorporated as "SMS language" also helped differentiate the networks through such common and "tacit" knowledge that was only shared by the community members. Similarly, according to this report, it provided a way of signifying group or community membership, as a way of marking outsiders and giving the group a clearer identity.

  2. Threats to Data

    This protocol was developed by Visa and MasterCard with the help of some major computer companies including IBM. SET is a set of rules by which transactions are governed and the rules of this protocol include two encryption methods being applied to transmitted data.

  1. How successful was the Poor Law Amendment Act in 1834 in meeting the needs ...

    Conversely, there were many faults in the system which still did not solve the problems for the poor; many historians assumed that the Law dealt with the effects of the poor and not the causes of poverty. The new system ignored the causes of poverty and unemployment, and believed that

  2. Discuss the Causes and Effects of the Digital Divide

    Schools in the UK also take free up to a billion in pounds from the government so students can have enough computers to improve their IT skills each you however this is not always evenly distributed because some schools have computers for each and every student which may force students

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work