• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The following report will compare differences between internal and external information sources relevant to four different organisational types, only one information type will be used per organisation.

Extracts from this document...


Wendy McIntyre HNC computing on-line Information Systems & Services Outcome 1 b, c, d & e August 2003 Introduction Information requirements differ greatly from one organisation type to another, depending on the nature of the business. But the categories from which this information is available remain similar. * Internal * External * Personal * Employment * Financial * Legal * Other For a computerised information system to be useful, it must be capable of organising and presenting information to the context of the business. The following report will compare differences between internal and external information sources relevant to four different organisational types, only one information type will be used per organisation. Examples of its end use will be outlined along with an over view of security requirements which apply to the use and storage of the information collected. Internal & External Information Sources As the name implies an internal source of information is information, which is gathered from within an organisation, and an external source from out with the organisation. Examples of internal sources of information are accounting ledgers, production/sales statistics, staff questionnaires/interviews, training records, internal market research, the list is unquantifiable and what is relevant is dependant on the organisation itself. Examples of external information sources could be information obtained from trade publications, legislation, economic reviews, competitors and market surveys. ...read more.


The value given to the threat is based on the probability of the event occurring e.g. the threat of inaccurate input is high while the threat of fire is usually low. Obvious threats would be threats from system failure, corruption, viruses and outside hackers, all to which of course the organisation must protect itself by the use of appropriate virus protection, firewalls and regular back up procedures. In an attempt to address some of the above issues The Computer Misuse Act was introduced on 29th August 1990. The main aim was to cover areas for which existing legislation did not appear to have any legal standing, like hacking and causing malicious damage through computer viruses. Basically it made hacking illegal but is still a shady area where prosecutions are concerned, and is not yet watertight at present. The organisations above and the data, which they hold represent a great deal of work and accumulated knowledge. If they are not kept safe then they could expect to lose them - replacing them would be an impossible task. It would be equally disastrous if the data were corrupted and therefore unusable, or if any part of the data was revealed to someone who had no right to this information. It is vitally important that the information can be seen only by those who are authorised to see it and can be changed only by those who are authorised to change it. ...read more.


Using pirate software lays the individual and the organisation open to prosecution under the Copyright Act. In addition, the use of non-standard software may cause difficulties with Systems Management and with communication between PCs and could contribute to system performance degradation. The copying of software for security purposes is generally permitted, provided that the copies are used only if the original version becomes corrupt. The software licensing conditions should be consulted before copying software, to check for any constraints. Summary In times where we are becoming more and more reliant on Information Technology it is important that companies learn to use the most relevant sources of information available, in order to monitor and plan future activities. It is also important that information is handled with care and used within certain legal guidelines as outlined above, in order to protect both the organisation and the individuals from criminal liability. Information is now as valuable a resource as money therefore must be treated with the same respect and looked after with adequate security to protect from theft, corruption and misuse. In order to achieve this it is important that the guidelines outlined above are followed and that all individuals employed in the use and storage of data understand that all systems, programs, and data are vital company assets. They also need to know and receive training about the risks and penalties associated with the Data Protection Act and Copyright Infringements, including software piracy. 2 28/04/2007 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Peer reviewed

    E-commerce - the legal considerations

    3 star(s)

    If the name is similar to an existing business you may not be able to use if...eg www.pcworlds.com (as opposed to the company called pc world) Website hosting If the site is being hosted externally you will need to put a hosting agreement in place.

  2. Data Protection Act

    Firstly it achieves the public authorities to make information available pro actively through a publication scheme. Secondly it requires them to deal with specific requests and to release information unless they can justify withholding information because exemption in the Act applies.

  1. The Data Protection Act 1998 - questions and answers

    In addition the Head Office collects, processes, collates and evaluates the time records of all our employees. What will be the effect of the new Act? You may have severe problems under the 1998 Act. The Eighth Data Protection Principle prohibits the transfer of personal data outwith the EEA unless

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    of hackers as this is mentioned in this specific law and need to be pursued by any organisation. Conversely, if she finds that her credit card details was unable to be kept private; she can sue the company that she is purchasing her product from i.e.

  1. Privacy and Data Protection: IT Law

    the US system adequate but then in 1998, engaged into serious discussions and began negotiating with the EU in order to ensure the continued transborder flows of personal data.66 The idea of the "Safe Harbor", initially proposed by Ambassador David Aaron, Under-secretary for International Trade in the Department of Commerce

  2. Assets table - recording the copyright information on the logos and pictures I used.

    the bottom and irrelevant text this is to show that united we can change the world, it also appealed to me because it shows that even in the worst conditions people stick together. Swap advert A house made from natural material image s N/A A house made from natural material

  1. Legal Aspects of Using Information Technology

    This well-known practice is known as, Social Engineering. Some of the examples include: * "Click here to receive a picture of Brad Pitt" * "I love you"- this is often referred as The Love Bug * Christmas cards, jokes, screensavers Laws relating to IT There are number of laws which are designed to govern any aspects of using the information technology within organisations, such as IKEA.

  2. Computer Legislation.

    above with intent, to commit an offence to which this section applies; or to facilitate the commission of such an offence (whether by himself or by any other person) * (Section 3)Unauthorised modification of computer material or data. A person is guilty of an offence if the person does any

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work