Presentation is loading. Please wait.

Presentation is loading. Please wait.

Primary/secondary data sources Health and safety Security of Data Data Protection Act.

Similar presentations


Presentation on theme: "Primary/secondary data sources Health and safety Security of Data Data Protection Act."— Presentation transcript:

1 Primary/secondary data sources Health and safety Security of Data Data Protection Act

2

3 1.5 ICT Data Systems in Business  be aware that there are a wide range of primary and secondary sources of data

4  Primary data is collected first hand by a business (e.g. through questionnaires and surveys)  Secondary data is information that’s been collected by someone outside the business (e.g. market research reports, government publications, articles in newspapers or on the internet)  Primary research is expensive and time-consuming ◦ But it is directly relevant to the business  Secondary research is cheap and instantly available ◦ But it may not be up to date or completely relevant

5

6 1.4 Health and Safety  be aware of the responsibilities of employers to provide a safe working environment and for employees to act in a safe manner  be aware of how health and safety regulations affect ICT users, (e.g. the Display Screen Regulations) and their implications on workstations and office layout

7  BBC bitesize  Click on GCSE  Click on ICT  Scroll down to “Risks and implications of ICT”  Click on “Health and safety when working with computers”  Read the information; do the test

8  List three health problems that may affect employees who use computers for long periods of time ◦ Eye strain ◦ RSI ◦ Backache and neck pain ◦ DVT ◦ Stress

9  Name 3 things that employees should do to reduce health and safety risks at work ◦ act responsibly and take care of their and other people’s safety ◦ take reasonable precautions to reduce risks ◦ use breaks to walk around and exercise fingers and hands ◦ carry out tasks as they have been trained to ◦ report dangerous practice

10

11  Open these slides from the shared area Business Studies/year 11/8 Theory/Revision/session 3

12 1.6 Data Security  understand the importance of the security of data (personal and financial) and the main methods of protecting data from unauthorised access (both internally and externally) including virus protection software, firewalls, passwords, encryption of documents and screen-savers.  be aware that the Data Protection Act places legal restrictions on the collection, storage and communication of personal data.

13  Stolen data can be used to commit identity theft or steal money from bank accounts and credit cards  Some data could reduce a companies competitiveness if leaked to competitors  Data that is corrupted or altered by unauthorised users is useless to a business

14  Physical security (locks and alarm systems)  Access security (user names and passwords, firewalls, screen-savers, encryption software)  Defensive security (anti-virus software, anti- spam software, anti-adware software, anti- spyware software)

15  Open the word document from the shared area Business Studies/year 11/unit 8 theory/5 data security/security measures  Explain how each of the security measures keeps data more secure

16  Anti-virus software is a program that is designed to prevent, search for, detect, and remove software viruses, and other malicious software like worms, trojans and adware.  As files are downloaded anti-virus software will scan the file to make sure that it doesn’t contain a virus. The software will also scan your whole computer regularly to check that no viruses have been introduced.  If a virus is found the file containing it will either be quarantined or deleted.

17  A firewall is software (or hardware) that checks information coming from the Internet or a network, and then either blocks it or allows it to pass through to your computer, depending on your firewall settings.  A firewall can help prevent hackers or malicious software (such as worms) from gaining access to your computer through a network or the Internet. A firewall can also help stop your computer from sending malicious software to other computers.

18  Passwords can be set on user accounts and on individual files. Without a password a user cannot log on to the system. Without a file password a user cannot open the file.

19  Encryption “scrambles” data so that it cannot be read unless the computer/person trying to read it has the key. Encryption cannot prevent a message being intercepted, but it can prevent anyone being able to read the message unless they have the key.

20  A screen saver pops up after a certain length of inactivity and so the data on screen cannot be read. In some cases when the screen saver comes on, the screen also “locks” so that the user has to re-enter their password in order to continue using the computer.

21  As well as software security physical security should be used to keep data secure. For example, the data server room could be locked so that only authorised users can enter the room.

22

23  The Data Protection Act (1998).  It states that: ◦ any business or organisation that holds personal data about individuals (data subjects) must comply with the 8 data protection principles ◦ data subjects have various rights to see, correct and prevent their personal data being processed or used for marketing without their permission

24  Go to  www.teach-ict.com www.teach-ict.com  Choose ICT/Key Stage 4/GCSE ICT  Click on “New Resources”  Scroll down to “Legal Issues”  Click on “Data Protection Act”  Click on “Quizzes”


Download ppt "Primary/secondary data sources Health and safety Security of Data Data Protection Act."

Similar presentations


Ads by Google