• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Organisation Security Issues

Extracts from this document...


Organisational Security Issues - Security Issues Computer misuse act (1990): The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities, such as hacking into other people's systems, misusing software, or helping a person to gain access to protected files of someone else's computer. http://goo.gl/T26HQ Examples: Spanners 'R' us cannot edit or "modify" any of the computer settings as this would be classed as hacking, this is when a file needed to operate a computer has been edited to function differently. When a file has been changed the user could be in threat of their personal information stolen which would relate to identity theft. When a customer changes or edits any of the factory or "default" software Spanners 'R' us would have to look into the programs before fixing the computer, if the computer is found to have been edited then Spanners 'R' us would refuse to fix the computer system. Data Protection Act (1998): The Data Protection Act 1998 is a United Kingdom Act of Parliament which defines UK law on the processing of data on identifiable living people. ...read more.


Copyright, Designs and Patents Act (1988): The Copyright, Designs and Patents Act 1988 (c. 48), also known as the CDPA, is an Act of the Parliament of the United Kingdom which received Royal Assent on 15 November 1988. It reformulates almost completely the statutory basis of copyright law (including performing rights) in the United Kingdom, which had, until then, been governed by the Copyright Act 1956 (c. 74). It also creates an unregistered design right, and contains a number of modifications to the law of the United Kingdom on Registered Designs and patents. http://goo.gl/8A75F Principle of the Act: Copyright gives the creator of the product / media to have rights on what they have created. The copyright law stops anyone from publishing the product as a copied version, for example: an album would have a copyright law so it is not copied and sold on as in this case the person who is selling a copy of the original product is getting the money and not the artist of the song. ...read more.


Shareware: This license is just like freeware but you would be expected to pay a fee for the product to the creator. Open source: This license allows the user of the software to edit or tweak the software as well as suggest improvements (beta software's) Educational: This license would be provided with a discount as the software would be used for educational purposes. Students: This license would only be provided to students. (Microsoft office 2011) Freedom of information act (2000): The Freedom of Information Act 2000 is an Act of the parliament that creates a public "right of access" to information held by public authorities. It is the implementation of freedom of information legislation in the United Kingdom on a national level. http://goo.gl/3Dpe3 Principle of the Act: Staff at Spanners 'R' us cannot be asking about the customer's medical history as not only is this information confidential but also is irrelevant when purchasing a computer system or any other electrical product. Customers of Spanners 'R' us can't ask for information on staff as to where they live or what their contact details are, however they may ask when that particular member of staff's working hours are. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Policy, Strategy & Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Policy, Strategy & Systems essays

  1. Threats to Organisations and Systems. Describe the countermeasures available to an organisation that ...

    Hardware failure Hardware is a physical fixation with the computer which con-insides with software. Hardware will eventually fail overtime which means that it might need to be replaced quite a bit. Pieces such as Disk drives, hard drives and even the fan can break ultimately.

  2. How a particular organisation can take advantage of IT developments

    By spreadsheet they will not need to keep typing up the item number and item name that has been sold. This will save Golita a lot of time as when every time someone buys a product, it will be recorded in the spreadsheet, therefore Golita will have a consistent record of the sold products.

  1. Free essay

    Reduce Damage to organisations

    A good alternative is to upload the data to an external server which is located in a different place/building.

  2. ICT Implementation

    From the screen above it can be seen that the supplier ID and the namesupp fields from the tblSupp have been chosen to be looked up. The lookup was successful the user can now select which supplier the stock comes from.

  1. implementation of an ITC system

    (Random Access Memory or RAM is a type of computer storage whose contents can be accessed in any order. This is in contrast to sequential memory devices such as magnetic tapes, discs drives (CD-ROM, CD-/+RW, DVD, in which the mechanical movement of the storage medium forces the computer to access data in a fixed order.

  2. Produce a report for the Managing Director of Animal World Magazine outlining different ways ...

    switching Packet-switched is a type of network in which relatively small units of chunk of data called packet, routes through from one system to another. How it Works The message is being broken down into small packets, with a destination address on each one telling the network where to send

  1. ICT in Organisations.

    The ones they would use are the Student record server and the Library server. Both of these servers run on a telnet server (on port 23), and this allows secure access to them from inside the campus. Domain Controllers All departments in the university have their own domain controllers.

  2. The Use of Big IP in Gamer.TV.

    This allows the System Administrators to go to the NOC where the servers and Cisco machines are and connect to their workstation under their desk and get vital information on particular parts of the NOC/servers without having to leave the NOC.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work