IT Summary Chapter 7

download IT Summary Chapter 7

of 3

Transcript of IT Summary Chapter 7

  • 8/12/2019 IT Summary Chapter 7

    1/3

    Chapter 7 Summaries

    Storage, communication and disposal of data and information

    Organisational goals and information systems

    Mission statement defines organisation's purpose or what it is trying to achieve

    Organisational goals explain how an organisation intends to go about achieving its

    mission System goal explains the specific role of the information system in achieving the

    organisational goal and ultimately the companies mission

    Legal obligations of organisations and individuals

    Privacy Act 1998

    Deals with 3 Main Areas: Safeguards relating to the collection and use of TFN by federal government agencies

    Protection of individuals private information stored by federal government departments

    Information about peoples credit-worthiness held by credit reporting agencies and credit

    providersPrivacy Amendment (Private Sector) Act 200011 National Privacy Principles0. Manner and purpose of collection of personal information1. Solicitation of personal information from the individual concerned2. Solicitation of personal information generally3. Storage and security of personal information

    4. Information relating to records kept by the record keeper5. Access to records containing personal information6. Alteration of records containing personal information7. Record keeper to check accuracy etc of personal information before use8. Personal information to be used only for relevant purposes9. Limits on the use of personal information10.Limits on the disclosure of personal informationInformation Privacy Act 2000Victorian government policy outlining the privacy obligations of state government agenciesand contractors working for the state government.Health Records Act 2001

    Aim to protect patients medical information. Created separately to IPA as to cover both thepublic and private hospital sectors. Protects patients information to be used only for theirprimary purpose for which it was gathered.Copyright Act 1968Intellectual property might be defined as any product of human thought that us unique andnot self evident. The copyright act protects this property.There are allowances made for formats such as audio music where you are allowed toburn tracks to another cd for personal use and transfer them to mp3 players.Other formats are much more heavily restricted such as games and computer softwarewhere there may be multiple complex copyright issues with the design of a game.

  • 8/12/2019 IT Summary Chapter 7

    2/3

    PenaltiesMost copyright infringements are dealt with as civil matters. When there has beencommercial distribution of pirated material the case will be tried as a criminal matter.Civil matters will vary in the remedy awarded to the defendant.In criminal cases, fines may be imposed up to $60500 and or up to 5 years imprisonment.

    Ethics and information systemsEthics refers to behaving ways based on our morals.Key areas that affect employees, employers and clients or customers: The responsibilities of employers and employees to each other and clients

    Codes of conduct

    Company computer use policies

    Employee monitoring

    Free speech on the internet

    Steps to solving ethical dilemmas11.Identify the problem12.Identify the stakeholders13.Identify possible alternatives14.Identify ethical standards15.Evaluate options16.Make a decision

    Workplace responsibilitiesBetween one another and customers or clients. Employer must pay staff for the workcarried out and provide a suitable environment that work can take place.Organisation is expected to provide good quality products or high level service to

    customers.

    Codes of conduct and computer use policesCode of conduct is a set of conventional principles and expectations considered binding onany member of a particular group.Computer use policy should be in place by an organisation. This explains clearly to thoseusing the equipment what management believes should and should not be done on thecomputers or peripherals.

    Employee MonitoringManagers often use monitoring systems to check what their employees are doing. This

    includes email checks for obscene language or attachments such as .exe or .jpg.Mangers also monitor the use of the Internet as many employees "misuse" the net forpersonal purposes.

    Netiquette

    Not posting to inappropriate groups

    Refraining from commercial advertising

    Personal messages to one or two individuals should not be posted to newsgroups

    When responding to posting, the minimum necessary context should be quoted

    Lines should be less than 70 characters long

    Before asking a question a user should read existing questions and the groups FAQ

  • 8/12/2019 IT Summary Chapter 7

    3/3

    Threats to data and information

    What is security?Any measures that an organisation can take to minimise the potential loss of data by

    intentional or accidental threats.

    Intentional DamageVirusesHacking/CrackingTampering with filesInformation theftVandalism of hardwareTheft of hardware

    Accidental Damage

    User errorFailure to follow file management proceduresEquipment failure/damage

    Consequences of violating security and privacy measures

    Consequences include but are not limited to: Breaches of privacy

    Loss of intellectual property

    Loss of income due to unavailability of information or services