This discussion is closed.
SUPERMiKE
Badges:
#1
Report 17 years ago
#1
The piece of homework below was given to me by my computing teacher, I understand what its asking but not how to answer it, I know what to put down but cant seem to express it an example would be helpful
Thanks in advance

Computer security, legal requirements etc. (PC 1c)

DB Synthetics plc have identified that employees need guidance on how to handle the various situations where the law might be broken or confidentiality betrayed. It has been decided that a code of practice for their information systems staff would be useful. This is to provide them with outline practices and procedures for dealing with matters concerning security, confidentiality, legal requirements and general integrity of data under their stewardship . given the attached skeleton outline you have been asked to develop a first-cut code of practice. For some suggestions as to contents obtain and read the sample corporate policy statement of FAST, course notes/handouts on computer law (Data Protection Act, Software copyright, Computer Misuse etc.), course notes/handouts on computer security and course notes/handouts on data controls and system controls. Also of some use might be the computer lab rules – a copy of which is posted in each computer lab

Information systems code of practice (skeleton layout)

Principles

DB’s Code of Practice is based upon the following principles
1. Integrity.
2. Confidentiality.
3. Security.
4. Legality.

1. Integrity.
All members of the IS division will strive to ensure the accuracy, soundness, completeness, consistency and nescessity of data and information stored and used by the devices.
Procedures to be observed.
1.1.
1…
1.n..

2. Confidentiality
All members of the IS Division will strive to ensure the requirements of confidentiality of information. No employee will disclose, or permit to disclose, or use to his/her own advantage, any confidential information relating to his/her employers or their employees or their customers/clients without their prior permission.
Procedures to be observed.
2.1.
2…
2.n.

3. Security
All members of the IS Division will strive to ensure the security of information used or stored by the Division.
Procedures to be observed.
3.1. Procedures affecting physical security
3.1.1.
3.1…
3.1.n.
3.2. Procedures affecting system security.
3.2.1
3.2…
3.2.n.

4. Legality.
All members of the IS Division will strive to ensure that all legislation relating to computers, and their use, and use of the information processed by, or stored in, computer equipment, will be rigidly observed.
4.1 Procedures ensuring compliance with data protection legislation.
4.1.1.
4.1…
4.1.n.
4.2. Procedures ensuring compliance with software copyright legislation.
4.2.1.
4.2…
4.2.n.
4.3. Procedures concerning computer misuse.
4.3.1. etc
0
Unregistered
Badges:
#2
Report 17 years ago
#2
Doubt anyone is going to do that for you.
0
X
new posts
Back
to top
Latest
My Feed

See more of what you like on
The Student Room

You can personalise what you see on TSR. Tell us a little about yourself to get started.

Personalise

Have you made your firm and insurance uni choices yet?

Yes (111)
55.22%
Yes, but I want to swap them (16)
7.96%
No, but I know who I want to choose (18)
8.96%
No, I still don't know who I want to choose (48)
23.88%
I have decided I don't want to go to uni anymore and will not be choosing (8)
3.98%

Watched Threads

View All