• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The following report will compare differences between internal and external information sources relevant to four different organisational types, only one information type will be used per organisation.

Extracts from this document...


Wendy McIntyre HNC computing on-line Information Systems & Services Outcome 1 b, c, d & e August 2003 Introduction Information requirements differ greatly from one organisation type to another, depending on the nature of the business. But the categories from which this information is available remain similar. * Internal * External * Personal * Employment * Financial * Legal * Other For a computerised information system to be useful, it must be capable of organising and presenting information to the context of the business. The following report will compare differences between internal and external information sources relevant to four different organisational types, only one information type will be used per organisation. Examples of its end use will be outlined along with an over view of security requirements which apply to the use and storage of the information collected. Internal & External Information Sources As the name implies an internal source of information is information, which is gathered from within an organisation, and an external source from out with the organisation. Examples of internal sources of information are accounting ledgers, production/sales statistics, staff questionnaires/interviews, training records, internal market research, the list is unquantifiable and what is relevant is dependant on the organisation itself. Examples of external information sources could be information obtained from trade publications, legislation, economic reviews, competitors and market surveys. ...read more.


The value given to the threat is based on the probability of the event occurring e.g. the threat of inaccurate input is high while the threat of fire is usually low. Obvious threats would be threats from system failure, corruption, viruses and outside hackers, all to which of course the organisation must protect itself by the use of appropriate virus protection, firewalls and regular back up procedures. In an attempt to address some of the above issues The Computer Misuse Act was introduced on 29th August 1990. The main aim was to cover areas for which existing legislation did not appear to have any legal standing, like hacking and causing malicious damage through computer viruses. Basically it made hacking illegal but is still a shady area where prosecutions are concerned, and is not yet watertight at present. The organisations above and the data, which they hold represent a great deal of work and accumulated knowledge. If they are not kept safe then they could expect to lose them - replacing them would be an impossible task. It would be equally disastrous if the data were corrupted and therefore unusable, or if any part of the data was revealed to someone who had no right to this information. It is vitally important that the information can be seen only by those who are authorised to see it and can be changed only by those who are authorised to change it. ...read more.


Using pirate software lays the individual and the organisation open to prosecution under the Copyright Act. In addition, the use of non-standard software may cause difficulties with Systems Management and with communication between PCs and could contribute to system performance degradation. The copying of software for security purposes is generally permitted, provided that the copies are used only if the original version becomes corrupt. The software licensing conditions should be consulted before copying software, to check for any constraints. Summary In times where we are becoming more and more reliant on Information Technology it is important that companies learn to use the most relevant sources of information available, in order to monitor and plan future activities. It is also important that information is handled with care and used within certain legal guidelines as outlined above, in order to protect both the organisation and the individuals from criminal liability. Information is now as valuable a resource as money therefore must be treated with the same respect and looked after with adequate security to protect from theft, corruption and misuse. In order to achieve this it is important that the guidelines outlined above are followed and that all individuals employed in the use and storage of data understand that all systems, programs, and data are vital company assets. They also need to know and receive training about the risks and penalties associated with the Data Protection Act and Copyright Infringements, including software piracy. 2 28/04/2007 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Assets table - recording the copyright information on the logos and pictures I used.

    Swap advert Fair trade fruit and juice image s N/A Fruit juice I have cropped the image and made it bigger this is to make it more visible for the target audience and to get rid of the irrelevant text.

  2. The Data Protection Act 1998 - questions and answers

    In addition the Head Office collects, processes, collates and evaluates the time records of all our employees. What will be the effect of the new Act? You may have severe problems under the 1998 Act. The Eighth Data Protection Principle prohibits the transfer of personal data outwith the EEA unless

  1. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    3C - Technology used by a person with special/particular needs Facebook While using Facebook, Sarah gave information on her name, e-mail address, location, pictures, work information, education information, date of birth and what she likes/dislikes. Facebook also holds similar information for hundreds of millions of other users.

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    The legislation also protects Maria Korelli at home. This is because she has installed an anti virus software which in accordance to the act, keeps her personal data away form the access and use of the numerous quantity of hackers. The software is licensed and a trademark of AVG company.

  1. Data Protection Act

    Updating is only qualified where necessary. 5.1 Fifth Principle "Personal data processed for any purpose or purposes shall not kept for longer than is necessary for that purpose or those purposes". The data controller will need to review their personal data regularly and to delete the information which is no longer required for their purposes.

  2. Is the UK copyright act of 1988 still an adequate means of protecting intellectual ...

    text, or images) by including a reference to the URL location of the material. No cache copy of the inlined material is made on the host server, since it is retrieved every time from the original source, yet many information providers feel threatened by this practice, because the inlined content appears as integral part of the page, to which it is inlined.

  1. Right of privacy under Hong Kong's current laws

    News always appears instantaneously in public areas, sad to say, such tightening of legislation necessitates the journalists to contemplate, or sometimes inquire, every single information subjects (e.g. all the people in a photo taken outside the high court) as to whether or not they have expectation of privacy.

  2. You have to explain how you have looked after the equipment and ensured its ...

    * Your knees are level with your hips. * Your feet are on the floor. * Your eye level is just above the top of the screen. Your forearm is nearly at a right angle to your upper arm, and your wrist is in a straight line with your hand and forearm.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work