Introducing
Your new presentation assistant.
Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.
Trending searches
3 symbols used in DFD's
2 benefits of Green IT for an organisation
1 principle of the computer misuse act 1990
To understand the principles of information security
To identify legislation that seeks to enforce these principles
Think about all of the data various organisations and individuals hold about you
Consider if this data was stolen and you were no longer able to access it
Consider if it was stolen so somebody else could use it.
Bullet point these in your books
Ensuring that data can only be accessed by those authorised to do so
DPA
Physical measures
Logical measures
Loyalty cards
GPS tracking via apps
CRM systems (even used by takeaway restaurants)
Social Media
Web browsers - targeted marketing
Making sure that data is up to date, accurate, complete and fit for purpose
DPA
Should have planned data maintenance
What happens if the data is wrong?
If we find that something is wrong, what should we do?
Ensuring that data can be accessed by the individuals or groups that need to use it.
This includes keeping it safe from unauthorised access
DDOS?
Describe the importance of Confidentiality, Integrity and Availability in the day to day running and management of the school with examples.
10 marks