Presentation on theme: "Unit 4- Assignment 3 P5, P6, M2. Data Protection Act 1998 Freedom of Information Act 2000 Computer Misuse Act 1990 Unauthorised access to computer."— Presentation transcript:
Unit 4- Assignment 3 P5, P6, M2
Data Protection Act 1998 Freedom of Information Act 2000 Computer Misuse Act 1990 Unauthorised access to computer materials Unauthorised access to computer systems with intent to commit another offence Unauthorised modifications of computer material
Data Protection Act this act ensures information held about people is used correctly. There are 8 different criteria that a business must follow (see pg 139) Freedom of Information Act this gives individuals the right to request information about them that is held by a public authority- e.g. You have the right to see your medical records. Computer Misuse Act this act makes it illegal to carry out certain activities on a computer, e.g. Hacking, misusing software, gaining access to secure files.
Use of Internet Whistle Blowing Organisational Policies Information Ownership
- a code of practice is common in businesses- this gives employees guidelines about appropriate use of . Internet- similar to - employees are guided as to what they can and cannot do when using the internet. Whistle Blowing- this is when an employee raises concerns about business practice, these concerns can be raised to management or sometimes the press. Organisational policies- business set policies regarding information to ensure they use information ethically. Information ownership- employees are responsible for the information they have. E.g staff information.
Explain each issue and then explain how a business ensures it follows these policies, this could be through staff training, through staff policies, through routine checking and reprimanding staff if necessary Legal issues should include Data Protection Act, Freedom of Information Act, Computer Misuse Act Explain how the organisation follows these acts, what practices are put into place to ensure the business follows these. Ethical information should include; use of , internet, whistle blowing, organisational policies. Explain how theses issues have an effect on how the company produces information/ the information they provide.
Security of Information Backups Health and Safety Organisational Policies Costs
Security of Information- This ensures digital information, records and knowledge management is kept secure by a business. Including confidential information left on the train!! Backups- a business needs to minimise the risk of loosing vital information using a reliable backup system. This should be common practice in any business Health and Safety- IT equipment must be used safely, this requires a number of criteria for staff who are required to spend a large amount of time using IT equipment. Organisational Policies- these are individual business policies that relate to using information. Cost- this needs to be considered, businesses may see the benefit of implementing some or all of these measures but they do come at a cost, either additional resources needed or the cost of development.
Using the same business explain which operational issues they follow and how these are implemented in the business.
You can incorporate this into P5 and P6, you need to explain how the company will deal with each of these issues – What effects will it have on the business? What action will it cause the business to take?