D2 - Evaluate the security policies used in an organisation for Unit 7 - Organisational Systems Security
D1 - Discuss the different ways that you can recover from a disaster for Unit 7 - Organisational Systems Security
All for this textbook (84)
Written for
BTEC
PEARSON (PEARSON)
Information Technology 2010 QCF
Unit 7 - Organisational Systems Security (T6017312)
All documents for this subject (17)
Seller
Follow
TechLad
Content preview
COMPUTER MISUSE ACT (1990) P6: REVIEW THE
LAWS RELATED TO
This act prevents the unauthorised access/modification of computer systems. If
caught, the punishments can range from 12 months in prison and/or a £5,000
THE IT SECURITY &
fine. The severity of these punishments can increase depending on whether or PRIVACY OF DATA
not the parties involved intended to commit any further criminal acts.
The act was controversial when it was first introduced by the UK government By George Mizen
as it punished people who hacked for ‘fun’ (E.g. video game modders who
create their own custom assets) the same way they would punish criminal
hackers, the likes of whom caused the act to be created in the first place.
The act has been amended many times over the years. One of the
amendments made in 2015 was that if serious damage is caused by any
unauthorised act, the punishment could be 14 years to life in prison, with the
likelihood of life imprisonment becoming more likely if national security was
heavily threatened/damaged by the act.
COPYRIGHT, DESIGNS & PATENT ACT (1998)
This act protects the rights of the owner of a piece of work to dictate how
SOURCES:
others can use it; this is the definition of copyright. It gives the owner the
exclusive right to adapt and sell their work, although this right can be sold with
the owner’s permission. An example of this happening was in the movie IMAGE = Password Shield
industry when George Lucas sold the rights to Star Wars to Disney. Computer Misuse Act Information
The copyright for creative works (i.e. movies, shows, games and books) last 70 Copyright Act Source #1
years after the owner has passed; 50 years if the work was fully/partially made Copyright Act Source #2
using a computer. The act has been amended many times over the years. One
Data Protection Source #1
of the amendments made in 2014 extended the limit in which creative works
could be copied fairly, taking into account the technological advancements Data Protection Bitesize Source #2
over the past decade. Freedom Information Act Information
Licenses Definition Source #1
CC License Types Definitions Source #2
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller TechLad. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $4.63. You're not tied to anything after your purchase.