• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Organisation Security Issues

Extracts from this document...


Organisational Security Issues - Security Issues Computer misuse act (1990): The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities, such as hacking into other people's systems, misusing software, or helping a person to gain access to protected files of someone else's computer. http://goo.gl/T26HQ Examples: Spanners 'R' us cannot edit or "modify" any of the computer settings as this would be classed as hacking, this is when a file needed to operate a computer has been edited to function differently. When a file has been changed the user could be in threat of their personal information stolen which would relate to identity theft. When a customer changes or edits any of the factory or "default" software Spanners 'R' us would have to look into the programs before fixing the computer, if the computer is found to have been edited then Spanners 'R' us would refuse to fix the computer system. Data Protection Act (1998): The Data Protection Act 1998 is a United Kingdom Act of Parliament which defines UK law on the processing of data on identifiable living people. ...read more.


Copyright, Designs and Patents Act (1988): The Copyright, Designs and Patents Act 1988 (c. 48), also known as the CDPA, is an Act of the Parliament of the United Kingdom which received Royal Assent on 15 November 1988. It reformulates almost completely the statutory basis of copyright law (including performing rights) in the United Kingdom, which had, until then, been governed by the Copyright Act 1956 (c. 74). It also creates an unregistered design right, and contains a number of modifications to the law of the United Kingdom on Registered Designs and patents. http://goo.gl/8A75F Principle of the Act: Copyright gives the creator of the product / media to have rights on what they have created. The copyright law stops anyone from publishing the product as a copied version, for example: an album would have a copyright law so it is not copied and sold on as in this case the person who is selling a copy of the original product is getting the money and not the artist of the song. ...read more.


Shareware: This license is just like freeware but you would be expected to pay a fee for the product to the creator. Open source: This license allows the user of the software to edit or tweak the software as well as suggest improvements (beta software's) Educational: This license would be provided with a discount as the software would be used for educational purposes. Students: This license would only be provided to students. (Microsoft office 2011) Freedom of information act (2000): The Freedom of Information Act 2000 is an Act of the parliament that creates a public "right of access" to information held by public authorities. It is the implementation of freedom of information legislation in the United Kingdom on a national level. http://goo.gl/3Dpe3 Principle of the Act: Staff at Spanners 'R' us cannot be asking about the customer's medical history as not only is this information confidential but also is irrelevant when purchasing a computer system or any other electrical product. Customers of Spanners 'R' us can't ask for information on staff as to where they live or what their contact details are, however they may ask when that particular member of staff's working hours are. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Policy, Strategy & Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Policy, Strategy & Systems essays

  1. Threats to Organisations and Systems. Describe the countermeasures available to an organisation that ...

    Hardware failure Hardware is a physical fixation with the computer which con-insides with software. Hardware will eventually fail overtime which means that it might need to be replaced quite a bit. Pieces such as Disk drives, hard drives and even the fan can break ultimately.

  2. Intrusions from the Unknown: Importance of Network Security in Today's Environment and Security Issues ...

    A simple jamming transmitter can make communications impossible could be some distance from the actual physical network. As data on a Wireless networks is sent over the air, it can extend over the physical boundary of a network. This would make is liable for a hacker to tap the information

  1. How a particular organisation can take advantage of IT developments

    This would save Golita a significant amount of time due the fact that otherwise they would have to do it using a calculator and/or by hand. Another advantage or benefit of spreadsheet would be that Golita would not have to waste papers and time on writing or making a note of the item name or serial numbers.

  2. ICT in Organisations.

    Because all the domain controllers are kept on campus, if JANET was to go down for some reason, for example, the cable was dug up; all the university domains would still work. So, a clumsy fore person does not check that the area they will be digging in is clear of cables, and they begin work.

  1. Produce a report for the Managing Director of Animal World Magazine outlining different ways ...

    TCP/IP uses two transport protocols: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Advantages * Good failure recovery * Can add network without interrupting the existing services * Independence Platform * Low data operating cost * Work on almost any processor * Can operate without an OS Disadvantages *

  2. Free essay

    Reduce Damage to organisations

    Preventing Technologies One of the technologies that can be used to protect an organisations' computers is by simply using firewalls. By using firewalls it will prevent intruders from getting into the organisations' computers. It works by checking the filters that are coming through the network or internet and if they

  1. The Use of Big IP in Gamer.TV.

    Application Function: The function of the software is to process users requests faster. It does this by the way it is set up, say the Systems Administrator sets the software up to allow users to go through the server with the most processing power left, out of all the servers

  2. implementation of an ITC system

    When using manual methods in a large business you have to have a huge filing system with all the clients and all their records. For example, when ICT is involved you can create manage and build a database of all the clients and all of their records can be stored on a single computer.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work