Computer Security & legal issues
Task 1a Security concerns
The common data security concerns for businesses are:
- Viruses
- Spyware
- Date theft and hacking
Viruses can cause a lot of damage to software, by deleting and changing programs, date and files. In most cases they are carried on email attachments, and if one computer of a networked system organisation gets infected, then other computers are more likely to get infected as well.
Spyware is a kind of program that is installed on a computer while downloading software from websites without the user being aware of it. Computers with spyware are vulnerable; because it monitors the way the computer is used and scans files for passwords and other confidential data.
It then transmits all this information to its originator. They can also slow down the computer by taking up memory.
Data theft and hacking is another threat to business organisations with unsecured computer system. Unauthorised access to computers can cause damage to organisations. Confidential data can be read, copied, altered or even deleted.
Task 1b Legal issues
Copyright
Copyright protects an intellectual property such as; writings, music, films, artistic works, software products and websites. These kinds of properties should not be copied without the copyright owners’ permission. These laws are clearly stated in Copyright Designs and Patents Act 1988.
Data Protection
The Data Protection Act 1998 protects people from misuse of their personal information. People want to keep their personal details including bank details and medical records private and away from anyone, so that they prevent their personal data from being misused by anyone i.e. identity theft.
Many organisations and businesses collect and store personal data such details of their employees and customers. Most of them are very sensitive and confidential and some can be quite detailed. The Data Protection Act applies whenever information about living persons is stored. So these organisations and businesses that process and store personal data must first apply to the Information Commissioner for approval by registering and must declare what information will be collected and stored, for how long, how they will be used and their intention of securing these data.