Organisation Security Issues

Authors Avatar

Organisational Security Issues – Security Issues

Computer misuse act (1990):

The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities, such as hacking into other people’s systems, misusing software, or helping a person to gain access to protected files of someone else's computer.                        http://goo.gl/T26HQ

Examples: Spanners ‘R’ us cannot edit or “modify” any of the computer settings as this would be classed as hacking, this is when a file needed to operate a computer has been edited to function differently. When a file has been changed the user could be in threat of their personal information stolen which would relate to identity theft. When a customer changes or edits any of the factory or “default” software Spanners ‘R’ us would have to look into the programs before fixing the computer, if the computer is found to have been edited then Spanners ‘R’ us would refuse to fix the computer system.

Data Protection Act (1998):

The Data Protection Act 1998 is a   which defines UK law on the processing of data on identifiable living people. It is the main piece of legislation that governs the  in the UK. Although the Act itself does not mention , it was enacted to bring UK law into line with the  which required Member States to protect people's fundamental rights and freedoms and in particular their right to privacy with respect to the processing of personal data. In practice it provides a way for individuals to control information about themselves.                                                                                                                                    

Join now!

Examples: It is important that Spanners ‘R’ Us keep both staff and customers information secure. This would prevent any data from going missing or even misused. Also staff must remember to not access any websites which may need you to input personal data. Because if they use the computers to access this sort of information, the business might have a key logger which will record the keystrokes e.g. even usernames and passwords that might be used on these websites.

Copyright, Designs and Patents Act (1988):

The Copyright, Designs and Patents Act 1988 (c. 48), also known as the CDPA, is an ...

This is a preview of the whole essay