• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Organisation Security Issues

Extracts from this document...

Introduction

Organisational Security Issues - Security Issues Computer misuse act (1990): The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities, such as hacking into other people's systems, misusing software, or helping a person to gain access to protected files of someone else's computer. http://goo.gl/T26HQ Examples: Spanners 'R' us cannot edit or "modify" any of the computer settings as this would be classed as hacking, this is when a file needed to operate a computer has been edited to function differently. When a file has been changed the user could be in threat of their personal information stolen which would relate to identity theft. When a customer changes or edits any of the factory or "default" software Spanners 'R' us would have to look into the programs before fixing the computer, if the computer is found to have been edited then Spanners 'R' us would refuse to fix the computer system. Data Protection Act (1998): The Data Protection Act 1998 is a United Kingdom Act of Parliament which defines UK law on the processing of data on identifiable living people. ...read more.

Middle

Copyright, Designs and Patents Act (1988): The Copyright, Designs and Patents Act 1988 (c. 48), also known as the CDPA, is an Act of the Parliament of the United Kingdom which received Royal Assent on 15 November 1988. It reformulates almost completely the statutory basis of copyright law (including performing rights) in the United Kingdom, which had, until then, been governed by the Copyright Act 1956 (c. 74). It also creates an unregistered design right, and contains a number of modifications to the law of the United Kingdom on Registered Designs and patents. http://goo.gl/8A75F Principle of the Act: Copyright gives the creator of the product / media to have rights on what they have created. The copyright law stops anyone from publishing the product as a copied version, for example: an album would have a copyright law so it is not copied and sold on as in this case the person who is selling a copy of the original product is getting the money and not the artist of the song. ...read more.

Conclusion

Shareware: This license is just like freeware but you would be expected to pay a fee for the product to the creator. Open source: This license allows the user of the software to edit or tweak the software as well as suggest improvements (beta software's) Educational: This license would be provided with a discount as the software would be used for educational purposes. Students: This license would only be provided to students. (Microsoft office 2011) Freedom of information act (2000): The Freedom of Information Act 2000 is an Act of the parliament that creates a public "right of access" to information held by public authorities. It is the implementation of freedom of information legislation in the United Kingdom on a national level. http://goo.gl/3Dpe3 Principle of the Act: Staff at Spanners 'R' us cannot be asking about the customer's medical history as not only is this information confidential but also is irrelevant when purchasing a computer system or any other electrical product. Customers of Spanners 'R' us can't ask for information on staff as to where they live or what their contact details are, however they may ask when that particular member of staff's working hours are. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Policy, Strategy & Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Policy, Strategy & Systems essays

  1. ICT in Organisations.

    Li PC 71 Aluminium Full-TowerBottom of Form Power Supply (High Power Output) �83.90 Top of Form Antec TruePower 550W PSUBottom of Form Motherboard �36.50 Top of Form Asus P4S533-MX (Socket 478) Micro ATX MotherboardBottom of Form UPS �314.75 Top of Form APC Smart-UPS 1500 USB/RS-232Bottom of Form RAM 512MB �74.00

  2. The Use of Big IP in Gamer.TV.

    They have What's Up Gold, which is their monitoring software to observe the software/hardware in action and if it goes down immediately alerts the specified people. Every 6 months in the main, they will swap the redundant system with the one that is operating to allow maintenance to take place.

  1. Free essay

    Reduce Damage to organisations

    It is crucial to make regular backup of the work and place the backups in a remote location where no one knows where it is and it is far away from the building so if the building goes on fire nothing harm will happen to the data.

  2. Produce a report for the Managing Director of Animal World Magazine outlining different ways ...

    An example of how an IP address looks like; 216.239.63.255 The above address translates to www.google.com. This address breaks down as follows; 216 - This shows geographical region number 239 - A division or country number 63 - LAN number 255 - Individual Machine Number IP addressing is based on the idea of hosts and networks.

  1. Threats to Organisations and Systems. Describe the countermeasures available to an organisation that ...

    computer program or system that produces an incorrect or unexpected result, or causes it to behave in unintended ways. A software failure for Teign and Tow would jeopardize the system, such as the website. If the website starts to fail, this would hinder the customers' into thinking that the website isn't working therefore taking their custom somewhere else.

  2. Computer crime can broadly be defined as criminal activity involving an information technology infrastructure, ...

    1998, Data Protection Act 1984, 1998, Forgery and Counterfeiting Act 1981, Fraud Act 2006 and Theft Act 1968. Reference Convention on Cybercrime: Lecture notes, 2008 [online] [2 February 2009] HYPERLINK "http://conventions.coe.int/Treaty/en/Summaries/Html/185.htm" http://conventions.coe.int/Treaty/en/Summaries/Html/185.htm Diane, Rowland., and Elizabeth, Macdonald., 2005, Infomation Technology Law: third edition: London: pg.

  1. How a particular organisation can take advantage of IT developments

    Thus, creating a website would be the best for both, the organisation and the customers. This will give the customers the opportunity to see if a particular product is in stock or not or see when the item will be available again and even check the price for any items/products available.

  2. ICT Implementation

    This means that If a stock in the database reaches the level set which is 3 then an order message shall appear. This was done firstly by: A lookup was also placed on the item stock table so the user can see what stock comes from which supplier.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work