Operational Issues. Operational Changes It is important to organisations to ensure that they abide by the Law when caring for the safety of their employees,

Slides:



Advertisements
Similar presentations
Disaster Recovery The People Dimension. Today’s Agenda Why bother with any Disaster Recovery/Business Continuity Planning? Importance of the People Factor.
Advertisements

Unit 4- Assignment 3 P5, P6, M2 BTEC Business Level 3.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
113 Health & Safety Task B Test Research.
9 99 CHAPTER Privacy and Security - FAQ’s. 9 © The McGraw-Hill Companies, Inc Privacy How secure is data –On system –On Internet Private network.
Sixth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle.
Factors to be taken into account when designing ICT Security Policies
Fifth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
2. 11 Rights of employers and employees Rights of employer and employees Rights and responsibilities  Both employees and employers have legal rights.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
The laws Organizations are covered by lots of different laws
Patient Record System Team A DBM/381 February 4, 2013 John Italiano.
Higher Administration
Author: Andy Reedftp://topsurf.co.uk/reed FdSc IT/Computer Networking & IT(e-commerce) Communications Network Management An Introduction to Security.
Security Awareness Norfolk State University Policies.
Copyright ©2012 Delmar, Cengage Learning. All rights reserved. Chapter 11 Operating Computers and Office Equipment.
Evolving IT Framework Standards (Compliance and IT)
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Enw / Name. How legislation affects business computer users How important is health and safety legislation to a business and how does it affect a workers.
G041: Lecture 16 Section B Revision Questions
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Disaster Recovery Strategies & criteria for evaluation of information management strategies.
DEVELOPING A RISK ANALYSIS. What is a risk analysis? A Risk analysis is concerned with identifying the risks that an organisation is exposed to, identifying.
Chapter 1.5 Health and Safety at Work Act 1974 (HASAWA)
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Managing Technology and Information Chapter 15. Distinguish between data and information and explain the role of management information systems in business.
Information Systems Security Operational Control for Information Security.
Monitoring Employees on Networks: Unethical or Good Business?
Business Continuity and Disaster Recovery Chapter 8 Part 1 Pages 897 to 914.
Using Technology to Manage Information
8/2: Managing IT: Security & Ethics Security: Controls –Information Systems controls Input, processing (hardware, software), output, storage –Facility.
UNIT 15 WEEK 9 CLASS 1 LESSON OVERVIEW Pete Lawrence BTEC National Diploma Organisational System Security.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
Working with HIT Systems
ACCEPTABLE INTERNET USE POLICY BY: BRANDON POLK, SUBHAN NADEEM.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Chapter 16 Presented By: Stephen Lambert Disaster Recovery and Business Continuity.
ORGANIZING IT SERVICES AND PERSONNEL (PART 1) Lecture 7.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Chap 8: Administering Security.  Security is a combination Technical – covered in chap 1 Administrative Physical controls SE571 Security in Computing.
CONTROLLING INFORMATION SYSTEMS
Legal and Ethical Issues in Computer Security Csilla Farkas
Organisational Systems Security Assignment 2 tips (available on Wiki also)
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
A2 LEVEL ICT 13.6 LEGAL ASPECTS DISASTER RECOVERY.
Session 12 Information management and security. 1 Contents Part 1: Introduction Part 2: Legal and regulatory responsibilities Part 3: Our Procedures Part.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 3 OTHER DAMAGING THREATS.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
© 2003 McGraw-Hill Australia Pty Ltd, PPTs t/a Accounting Information & Reporting Systems by A. Aseervatham and D. Anandarajah. Slides prepared by Kaye.
Implementation of legislation (Chapter 47) By Haley Court.
Year 12: Unit 2, living in the digital world. 1. What is ICT? ICT is the use of technology to convert data to information. It covers many areas, especially.
Chapter 8 : Management of Security Lecture #1-Week 13 Dr.Khalid Dr. Mohannad Information Security CIT 460 Information Security Dr.Khalid Dr. Mohannad 1.
Welcome to the ICT Department Unit 3_5 Security Policies.
P3 Technological resources Physical resources Buildings and facilities
Information Security and Privacy in HRIS
Explaining strategies to ensure compliance with workplace legislation
WORKPLACE LEGISLATION
Business Continuity Plan Training
Unit 7 – Organisational Systems Security
INFORMATION SYSTEMS SECURITY and CONTROL
Unit 3 Information Systems
Understanding the issues related to the use of information
How it affects policies and procedures
AC1.3 Summarise the responsibilities of retail employees
Standard 6: Educational Leaders understand the social, legal, and ethical issues related to technology and model responsible decision-making related to.
LO3 Review mechanisms to control organisational IT security
Presentation transcript:

Operational Issues

Operational Changes It is important to organisations to ensure that they abide by the Law when caring for the safety of their employees, customers and assets (data). Without consideration of the legal and ethical factors organisations would open themselves up to devastating results on their current and future business. Eg Law suits, bankruptcy, imprisonment

Operational Requirements New Operational Requirements must be put in place and followed when using IT with personal and private data: facilities to protect data (from loss, ensure privacy, ensure integrity, protect copyright of data, protect from fraud and computer misuse) facilities to protect health and safety (ergonomics, office layout)

Impact on the business operation? Organisations must prove that their day to day operations now support both the legal and ethical issues. This will impact through the following constraints: Costs eg additional resources required, cost of development Impact of increasing sophistication of systems eg more trained personnel, more complex software Security of information Backups eg media types, cost of technology, security and retrieval Health and safety eg cost of ergonomic changes, health care Organisational policies eg time for development, staff training Business continuance plans

Plan of action for the continuation of business and how data will be dealt with and recovered. Needed to reduce risks in the case of data disaster eg building fire, terrorist attack, major virus, fraud, Computer Misuse level 3 infringement This will cover areas such as: How the business will recover How the data will be recovered and what happens with continuing new data The length of time for recovery How the business will continue through the recovery time Approximate costs of recovery

Task In pairs… A small company “Snowdon Renewable Goods” has decided to place all their customer records onto a local area network. They need to consider what needs to be in place before they can do this and what constraints will be placed on the way the business operates. Draw an information diagram that describes and gives examples of the operational constraints that the business will need to consider when setting up it’s IT systems.