May 13,
BUSINESS DOCUMENTATION
2016
ASSIGNMENT TITLE: P5, P6 AND M2
STUDENT NAME MAHBUB RAHMAN
COURSE TITLE BUSINESS COMMUNICATIONS
UNIT TITLE 4
TEACHER NAME MISS JANA
, ASSIGNMENT TITLE P5, P6 AND M2
Table of Contents
Introduction .........................................................................................................................................2
Assessment Criteria – P5/M2 ..................................................................................................................2
Legal Issues ..........................................................................................................................................2
Ethical Issues ........................................................................................................................................3
Assessment Criteria – P6/M2 ..................................................................................................................4
Operational Issues ...............................................................................................................................4
Conclusion ............................................................................................................................................6
MAHBUB RAHMAN 1
, ASSIGNMENT TITLE P5, P6 AND M2
Introduction
For this task, I am going to help update the staff handbook by producing three sections of
the handbook, regarding the issues related to the use of information. These sections will
explain the legal issues in relation to the use of information, the ethical issues in relation to
the use of information, and the operational issues in relation to the use of information.
Assessment Criteria – P5/M2
Legal Issues
Legal issues refer to the law, and there are a number of acts which protect the use of
business information. One of these acts is the Data Protection Act 1998. This act protects
the information that organisations have on people from being misused (such as address,
bank details, identification etc.), and is mostly associated with personal data. This act
demands that the information that businesses store must be obtained fairly and lawfully
(not discretely without the person’s permission), must only be used for the purposes stated
to the individual at the time of obtaining the information, must not be kept for longer than
necessary, must be accurate, must undergo procedures which prevent unlawful processing,
accidental loss, destruction and damage to personal data, and must be protected from
transfer to an area outside of the European Economic Area (unless valid protection exists for
that data in the area). This act mainly applies to Tesco Bank, as we cannot reveal or misuse
our customers’ bank details inappropriately, and must undergo security checks when doing
so. This also applies to the HR department, as we cannot misuse or reveal certain
information about employees. If this does happen, Tesco may face criminal charges, which
will harm the reputation of the business. This hasn’t occurred before and the correct
procedures do currently take place at Tesco, so it is unlikely for it to happen.
The Freedom of Information Act 2000 gave organisations (and people in general) the right
to request information held by public authorities (government departments, NHS, schools
etc.). It also means that public authorities must publish certain information about their
activities. However, this act can be exempted in some cases (for example, the cost of a
request for information may exceed the appropriate limit, the public authority may decide
that denying the request is more beneficial for the public than to give the information).
Another important act is the Computer Misuse Act 1990. This legislates against certain
activities with the use of computers. For example, hacking into other systems, gaining
access to protected files on someone else’s computer, or misusing software. This act is split
up into three sections. These sections describe what is made illegal. The first section is
‘unauthorised access to computer material’, the second is ‘unauthorised access to computer
systems with intent to commit further offences’ and the third is ‘unauthorised modification
of computer material’. This act is relevant to Tesco, as it helps prevent hackers from causing
harm to the business (for example, stealing money electronically). Employees at Tesco must
also make sure they do not violate this act themselves (for example, misuse of software).
MAHBUB RAHMAN 2