• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The following report will compare differences between internal and external information sources relevant to four different organisational types, only one information type will be used per organisation.

Extracts from this document...

Introduction

Wendy McIntyre HNC computing on-line Information Systems & Services Outcome 1 b, c, d & e August 2003 Introduction Information requirements differ greatly from one organisation type to another, depending on the nature of the business. But the categories from which this information is available remain similar. * Internal * External * Personal * Employment * Financial * Legal * Other For a computerised information system to be useful, it must be capable of organising and presenting information to the context of the business. The following report will compare differences between internal and external information sources relevant to four different organisational types, only one information type will be used per organisation. Examples of its end use will be outlined along with an over view of security requirements which apply to the use and storage of the information collected. Internal & External Information Sources As the name implies an internal source of information is information, which is gathered from within an organisation, and an external source from out with the organisation. Examples of internal sources of information are accounting ledgers, production/sales statistics, staff questionnaires/interviews, training records, internal market research, the list is unquantifiable and what is relevant is dependant on the organisation itself. Examples of external information sources could be information obtained from trade publications, legislation, economic reviews, competitors and market surveys. ...read more.

Middle

The value given to the threat is based on the probability of the event occurring e.g. the threat of inaccurate input is high while the threat of fire is usually low. Obvious threats would be threats from system failure, corruption, viruses and outside hackers, all to which of course the organisation must protect itself by the use of appropriate virus protection, firewalls and regular back up procedures. In an attempt to address some of the above issues The Computer Misuse Act was introduced on 29th August 1990. The main aim was to cover areas for which existing legislation did not appear to have any legal standing, like hacking and causing malicious damage through computer viruses. Basically it made hacking illegal but is still a shady area where prosecutions are concerned, and is not yet watertight at present. The organisations above and the data, which they hold represent a great deal of work and accumulated knowledge. If they are not kept safe then they could expect to lose them - replacing them would be an impossible task. It would be equally disastrous if the data were corrupted and therefore unusable, or if any part of the data was revealed to someone who had no right to this information. It is vitally important that the information can be seen only by those who are authorised to see it and can be changed only by those who are authorised to change it. ...read more.

Conclusion

Using pirate software lays the individual and the organisation open to prosecution under the Copyright Act. In addition, the use of non-standard software may cause difficulties with Systems Management and with communication between PCs and could contribute to system performance degradation. The copying of software for security purposes is generally permitted, provided that the copies are used only if the original version becomes corrupt. The software licensing conditions should be consulted before copying software, to check for any constraints. Summary In times where we are becoming more and more reliant on Information Technology it is important that companies learn to use the most relevant sources of information available, in order to monitor and plan future activities. It is also important that information is handled with care and used within certain legal guidelines as outlined above, in order to protect both the organisation and the individuals from criminal liability. Information is now as valuable a resource as money therefore must be treated with the same respect and looked after with adequate security to protect from theft, corruption and misuse. In order to achieve this it is important that the guidelines outlined above are followed and that all individuals employed in the use and storage of data understand that all systems, programs, and data are vital company assets. They also need to know and receive training about the risks and penalties associated with the Data Protection Act and Copyright Infringements, including software piracy. 2 28/04/2007 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Assets table - recording the copyright information on the logos and pictures I used.

    Swap advert Fair trade fruit and juice image s N/A Fruit juice I have cropped the image and made it bigger this is to make it more visible for the target audience and to get rid of the irrelevant text.

  2. The Data Protection Act 1998 - questions and answers

    In addition the Head Office collects, processes, collates and evaluates the time records of all our employees. What will be the effect of the new Act? You may have severe problems under the 1998 Act. The Eighth Data Protection Principle prohibits the transfer of personal data outwith the EEA unless

  1. Data Protection Act

    Firstly it achieves the public authorities to make information available pro actively through a publication scheme. Secondly it requires them to deal with specific requests and to release information unless they can justify withholding information because exemption in the Act applies.

  2. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    Breaking this agreement usually also breaks the Data Protection Act and they can face very serious charges. Mr Ajaib can sue and take the companies to court. But some sites take advantage of long drawn-out agreements. They usually take advantage of those signing up by making them agree to allow their data to be used for the company's own needs.

  1. 3E-The legislation that protects individuals and groups from the misuse of ICT

    With the data protection act in place, MR. Obrien can give his personal details to organisation without any worries because he knows the data protection act ensures confidentiality of his personal information and if any flaws were found in his data, Mr.

  2. The legislation that protects individuals and groups from the misuse of ICT

    the work, for this reason it is apparent that individuals who own the copyrights for pieces of work are not protected to a full extent. To improve the overall impact and effect of the Copyright, designs and Patent Act, certain improvements need to be made to

  1. Right of privacy under Hong Kong's current laws

    News always appears instantaneously in public areas, sad to say, such tightening of legislation necessitates the journalists to contemplate, or sometimes inquire, every single information subjects (e.g. all the people in a photo taken outside the high court) as to whether or not they have expectation of privacy.

  2. You have to explain how you have looked after the equipment and ensured its ...

    * Your knees are level with your hips. * Your feet are on the floor. * Your eye level is just above the top of the screen. Your forearm is nearly at a right angle to your upper arm, and your wrist is in a straight line with your hand and forearm.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work