E-Commerce Laws and Legislation - The Data Protection Act

Nick Strife Data Protection Act The Data Protection Act was implemented to protect the privacy of living individuals who could be identified from the data, or from a combination of data held by the data controller. This also includes any opinions expressed about the individual. When Collecting data, the data controller must ensure they tell the individual who they are, what the information is going to be used for and ensure that they do not collect more information than is necessary. The data must be kept securely and not kept for longer than it’s needed. It must also be kept up to date and accurate. Individuals have the right to access their data at any time. Companies may charge a fee for this but they must respond within a set timeframe set out by their particular contract. The act contains eight “Data Protection Principles”. These specify that personal data must be: . Processed fairly and lawfully. 2. Obtained for specified and lawful purposes. 3. Adequate, relevant and not excessive. 4. Accurate and up to date. 5. Not kept any longer than necessary. 6. Processed in accordance with the “data subject’s” (the individual’s) rights. 7. Securely kept. 8. Not transferred to any other country without adequate protection in situ. This has an impact on businesses because they must ensure anyone involved in collecting or accessing personal data

  • Ranking:
  • Word count: 1594
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Administrative systems - The place where I worked for 'work experience' was in Tesco plc in Covent Garden.

Administrative systems The place where I worked for 'work experience' was in Tesco plc in Covent Garden. It was a two weeks 'work experience' in Tesco. One week I worked on the shop floor and the second one I worked in the office. It was an enjoyable work experience and I've learned a lot during two weeks. Tesco is one of the best-known names in the High Street. It is a large public limited company (plc) with approximately 165 000 share holders. By 1995, Tesco had become the largest food retailer in the UK, overtaking Sainsbury's. The company operates 800 stores throughout Europe. What is meant by the term 'administrative systems'? Administrative: relating to the arrangements and work, which is needed to control the operation of a plan or organization. System: a way of doing things. 'Administration system' is a procedure/process to help the business run smoothly. Why are administrative systems important to a business in general? It is important for a business to have 'administrative systems' in place to: * Save money * Help the business run smoothly * Make it easy for supervisors to manage their staff. * Save resources * Save time The main systems at my work placement are: * Answering the telephone. Answering the telephone wasn't that good because when there was a big queue hardly anyone thought of answering the phone, which don't make a quite good 'customer

  • Ranking:
  • Word count: 543
  • Level: AS and A Level
  • Subject: ICT
Access this essay

The history of Hackers.

Valuable information or valuables themselves can be stored in protected areas such as banks, stores, or even computers. Wherever they are, there will always be the threat of a criminal mastermind who will attempt to break into these protected areas. In the modern age of computers, banks are no longer the main target of extracting lucrative amounts of money illegally. In this day and age, computers hold an abundant amount of information that can access money. Criminals who break into computer systems electronically are commonly called 'Hackers'. In today's highly technological computer world, the computer hacker is digging their way through our nation's computer systems to embezzle money, create chaos, manipulate figures, and to seek enjoyment. However, hackers are even used for finding security breeches. The birth of hackers in the Sixties, shortly came after the advent of elite engineering students who called themselves 'Phreakers' (1). Phreakers would tap the phone lines in order to place a local or long distance phone calls for free. The motivation came from the Sixties movement to expand tech- nology from the government and large corporations to individuals (1). Phreakers were able to do this because of a mishap by Bell Telephone Systems. Bell published a journal that contained the sequence of multifrequency tones used to place a call (1). This journal was only intended

  • Ranking:
  • Word count: 1340
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Hacking today.

HACKING As given in the dictionary, hacking means to break into or use a computer network or use a system without authorization, as a hacker might do. Personal computers came into this world about 25 years back and revolutionised the world. It led to modernization and paved the path for greater human advancement,even in the space. They help us in almost every way but nowadays they are also in danger. Danger from humans. Hacking is the word.some people for various ways cause destruction to ones computer by either spying on it by hacking the system servers or logging on to someone's pc ust for fun which is awfully wrong and shouldnt be done.Privacy has become the thing of the past. These hackers as they are called have various techncal ways to harm ones pc .It is not as tough as it seems.Anybody with basic knowlegde can get on with this sneaky business.no expertise knowlegde is required.Only a linux based system and basic knowldge about hacking is to be known and thats all. It has a become a serious pest.There is no end to it. The best targets are the biggest companies which have huge branches with turnovers of several crores.Governments of the world should start recognizing it has a worldwide problem which needs to care of as fast as possible. Even an individual should protect himself from the dark and dungy place called internet where all the 'stuff' takes place.

  • Ranking:
  • Word count: 526
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Colorwarepc.com is entirely an online E-commerce business, therefore the website needs to ensure that their customers information will remain 100% safe from the time which it is submitted.

Section C - Security Risk Assessment Colorwarepc.com is entirely an online E-commerce business, therefore the website needs to ensure that their customers information will remain 100% safe from the time which it is submitted. The way in which companies do this is by hiring a security team with a lot of background knowledge and experience in ethical hacking. The security team should also be aware of the best firewall and antiviral services that are available. The security team at Colorwarepc.com have a lot of practice in ways, which hackers would attempt to gain entry into a business server system. They will frequently test the security systems and if a problem arises they can resolve it quickly. Furthermore it is important that Colorwarepc.com image doesn't get duplicated as this leads customers to sign up to Colorwarepc.com mimic, meaning that the customers personal information and financial information will be use for fraud and other internet crime. Physical security Physical security falls varies from anything like protecting a company's information on their computers to a simply locked door to more complex methods of security. It is the measures that prevent or detect hackers from using a service, resource or information stored on physical media. As Colorwarepc.com is a company based solely online I would expect they have a very good physical security measures in

  • Ranking:
  • Word count: 493
  • Level: AS and A Level
  • Subject: ICT
Access this essay

A Report on My Office Job Environment

A Report on My Office Job Environment To: Mrs McAulay From: Richard Jones Date: Autumn 2002-09-27 Introduction: 1. The aim of the coursework is to investigate how a real business communicates within the business and with the out side world. Then I will make decisions to decide weather the way they communicate is the best way or if it can be improved. I will look at different ways in which the business I choose communicates internally and externally. After I analyse my data I will decide if there could be improvements. 2. The business I am going to use is Industrial Fork truck Parts Ltd, the contact I have I have chosen is my mum she is a personal assistant at the work place and she uses forms of communication mostly to contact clients in other countries. Research methods: I hope to research the internal and external ways in which the company I have chosen communicate. I hope to collect this information from 4 sources, my mum, her boss the Internet and by books. I will collect as much information as possible to. It also helps me a lot that my contact is my mum and that she works locally my mum should be able to give me enough information to help me complete my research. Year 11 Communication studies Communication Methods: * Letters: a letter is a written form of communication mainly used for external communication. * Memo: a memo is a

  • Ranking:
  • Word count: 724
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Online shopping

Online services The internet provides a vast array of online services. The internet can provide services on a variety of different subjects whether it is concerned with communication, education, entertainment etc. This is why increasing number of people are using online services rather than the alternatives already offered. In this section I will be investigating five different online services available on the internet and try to give a comprehensive picture of their benefits but also the limitation of such services on the internet. Services cover a wide range of information on the internet therefore I will use one service from each of the five types of services. The services that I will be investigating are listed below; Online Shopping Online shopping is simply when a customer buys products from the internet. Online shopping has grown more popular with customers as people are finding shopping online more efficient and as most will be using the internet in their homes it allows them to shop in a comfortable environment. Many companies now have online websites where you are able to buy the same products from the internet as in the actual stores in the high street. Here is an example of how online shopping may work: This is an example of how online shopping works when using the Tesco website. The first thing that you must do is register and in this case giving details

  • Ranking:
  • Word count: 1053
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Computer Crime

Table of Contents Cybercrime: An Overview of Computer Fraud and Abuse 3 What is Cybercrime? 3 New and emerging technologies and their impact on personal privacy protection 4 I-Phone 4 I-Pad 5 RFID Tagging 5 The Affect of Computer Crime on Society 7 What has been done by companies and governments to control the problem? 8 Penalties Imposed by Australian Law for Cybercrime 9 Weaknesses currently existing in Australian Cyber law 10 What proposed changes are being or should be suggested to overcome these loopholes 11 Chances of a computer criminal being caught and prosecuted 12 Reference List 13 Appendix 15 Cybercrime: An Overview of Computer Fraud and Abuse "New times bring new crimes. It's a story as old as humanity and as new as the Internet. First came cars, then car thieves followed. Telephones are followed by telephone fraud. Now we've got computers." (Anonymous1 Year Unknown) In the past decade technology has exponentially increased, and along with it computer crime. All new and emerging technologies are being affected by this transgression and this has been creating many problems for consumers, companies, agencies and the government. Companies and agencies have only now become conscious of the fact that their computers are prone to attack. In response to this, new security systems have been implemented and penalties for such an act increased. This

  • Ranking:
  • Word count: 4447
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Information Age

Research Book Name: Subject: As ICT Topic: Online Services Topic 1: Real Time Information Question 1: What features are available on this type of online service? Source Information * Network rail (www.networkrail.com) (22/09/08) Monday * This page was last modified on 6 October 2008, at 01:39. * BAA Gatwick * www.gatwickariport.com This website provides information precisely, for It gives the real time information of the train that is on service on particular day time and it also gives information of the particular train going towards particular direction. The top of the page has main navigation link and search engine facility. In a further navigation there is a second menu that changes to reflect the various sections as you browse through the website. In the middle of the page you will find a text of the page you have browsed to. The right hand navigation has links and features related to the current page. At the bottom of the page you will find footer with contact us, site map, terms and conditions, privacy policy and help links The Gatwick airport website gives precise information of the flight to and from Gatwick. Airport information, shop, eats, relax and enjoy information, route plan information. Besides it also provides information on various sources such as customer services, terminal maps, airport parking, booking a flight, hiring a car and

  • Ranking:
  • Word count: 5393
  • Level: AS and A Level
  • Subject: ICT
Access this essay

e commerce

Commerce Shopping online has expanded so much that you can buy whatever you want at whatever time, any day. This online service is useful for people that work from 9-5 and don't have time to go shopping, or go to the bank. Shopping From the increase of online services it is now possible to shop online. You can shop for anything you like, e.g. you can do your food shopping or shop for clothes. 85% of people now shop online instead of physically shopping Sellers set up their own website displaying what they have to offer with descriptions and images to show what they are selling. The shopper then chooses the item or items that they want to buy then the item then transfers into a virtual shopping basket or shopping trolley. When the customer has finished their shopping, the consumer goes to a separate set of pages which then manages the payment and delivery. You can pay for these items using a credit and debit card or when you shop for food online you can pay when you get the delivery in cash or buy cheque. When shopping for clothes the retailers add features to a basic structure, one feature that they may add; allow you to pick an item up and look at it in different angles and close up to see the details of the item., when shopping for CDs it is possible to look at the track list, Table of contents etc. shopping online is a useful service for people who don't have time to go

  • Ranking:
  • Word count: 1275
  • Level: AS and A Level
  • Subject: ICT
Access this essay