• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Organisation Security Issues

Extracts from this document...


Organisational Security Issues - Security Issues Computer misuse act (1990): The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities, such as hacking into other people's systems, misusing software, or helping a person to gain access to protected files of someone else's computer. http://goo.gl/T26HQ Examples: Spanners 'R' us cannot edit or "modify" any of the computer settings as this would be classed as hacking, this is when a file needed to operate a computer has been edited to function differently. When a file has been changed the user could be in threat of their personal information stolen which would relate to identity theft. When a customer changes or edits any of the factory or "default" software Spanners 'R' us would have to look into the programs before fixing the computer, if the computer is found to have been edited then Spanners 'R' us would refuse to fix the computer system. Data Protection Act (1998): The Data Protection Act 1998 is a United Kingdom Act of Parliament which defines UK law on the processing of data on identifiable living people. ...read more.


Copyright, Designs and Patents Act (1988): The Copyright, Designs and Patents Act 1988 (c. 48), also known as the CDPA, is an Act of the Parliament of the United Kingdom which received Royal Assent on 15 November 1988. It reformulates almost completely the statutory basis of copyright law (including performing rights) in the United Kingdom, which had, until then, been governed by the Copyright Act 1956 (c. 74). It also creates an unregistered design right, and contains a number of modifications to the law of the United Kingdom on Registered Designs and patents. http://goo.gl/8A75F Principle of the Act: Copyright gives the creator of the product / media to have rights on what they have created. The copyright law stops anyone from publishing the product as a copied version, for example: an album would have a copyright law so it is not copied and sold on as in this case the person who is selling a copy of the original product is getting the money and not the artist of the song. ...read more.


Shareware: This license is just like freeware but you would be expected to pay a fee for the product to the creator. Open source: This license allows the user of the software to edit or tweak the software as well as suggest improvements (beta software's) Educational: This license would be provided with a discount as the software would be used for educational purposes. Students: This license would only be provided to students. (Microsoft office 2011) Freedom of information act (2000): The Freedom of Information Act 2000 is an Act of the parliament that creates a public "right of access" to information held by public authorities. It is the implementation of freedom of information legislation in the United Kingdom on a national level. http://goo.gl/3Dpe3 Principle of the Act: Staff at Spanners 'R' us cannot be asking about the customer's medical history as not only is this information confidential but also is irrelevant when purchasing a computer system or any other electrical product. Customers of Spanners 'R' us can't ask for information on staff as to where they live or what their contact details are, however they may ask when that particular member of staff's working hours are. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Policy, Strategy & Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Policy, Strategy & Systems essays

  1. ICT in Organisations.

    Li PC 71 Aluminium Full-TowerBottom of Form Power Supply (High Power Output) �83.90 Top of Form Antec TruePower 550W PSUBottom of Form Motherboard �36.50 Top of Form Asus P4S533-MX (Socket 478) Micro ATX MotherboardBottom of Form UPS �314.75 Top of Form APC Smart-UPS 1500 USB/RS-232Bottom of Form RAM 512MB �74.00

  2. The Use of Big IP in Gamer.TV.

    This was so that I couldn't inadvertently cause any damage to their system. All the personnel at Gamer are given a special VPN line so that they can connect to their workstation from any other computer even from home. This allows them to check things and to work from home,

  1. Free essay

    Reduce Damage to organisations

    And perhaps have security locks on the doors. Only authorized staff should have permission to enter the zone. Another technology an organisation can implement is swipe card door technology. An exception is Microsoft Vista which is designed to prevent external attacks and is self-protecting and healing.

  2. Produce a report for the Managing Director of Animal World Magazine outlining different ways ...

    address. The format of an IP address is a 32 bit numeric address written as four numbers separated by periods. Each number can be zero to 255. The four numbers in an IP address are called octets, because they each have eight positions when viewed in binary form.

  1. Threats to Organisations and Systems. Describe the countermeasures available to an organisation that ...

    computer program or system that produces an incorrect or unexpected result, or causes it to behave in unintended ways. A software failure for Teign and Tow would jeopardize the system, such as the website. If the website starts to fail, this would hinder the customers' into thinking that the website isn't working therefore taking their custom somewhere else.

  2. How a particular organisation can take advantage of IT developments

    Thus, creating a website would be the best for both, the organisation and the customers. This will give the customers the opportunity to see if a particular product is in stock or not or see when the item will be available again and even check the price for any items/products available.

  1. ICT Implementation

    has been placed on the quantity field, which means the user can only enter values between 1 and 24. The validation is working as the user has entered a quantity value above 24 and an error message has appeared. Another validation placed on the Item Stock table is the re-order level.

  2. implementation of an ITC system

    A Spread Sheet package (for high mathematic calculations when calculating income outcome, and taxes) a Databases Package, (for all of their customers, addresses, phone numbers, and credentials) and a Presentation package (to create multimedia presentations and slide shows about companies improvement)

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work