100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Ensayo

IT Technical Support Assignment 3

Puntuación
-
Vendido
-
Páginas
12
Grado
A
Subido en
08-07-2021
Escrito en
2017/2018

The document contains all criteria for assignment 3: P2, M2, D1. I received full marks for this assignment.

Institución
Grado









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Libro relacionado

Escuela, estudio y materia

Nivel de Estudio
Editores
Tema
Curso

Información del documento

Subido en
8 de julio de 2021
Número de páginas
12
Escrito en
2017/2018
Tipo
Ensayo
Profesor(es)
Desconocido
Grado
A

Temas

Vista previa del contenido

P2 - Produce an
The Computer Misuse Act
information booklet
explaining how 4 policies
Policies
The computer misuse act is aimed
at combating various forms or
such as Data Protection,
Health and Safety,
and
deliberate misuse of computer
systems.
Within a company the IT
Copyright etc. and 4
company’s IT procedures,
Procedur
Technician would need to report if
there was a broken machine and
then find out how it was broken.
explain how these have an
impact on providing es
They also need to make sure that
technical support to users
the security software is up to date
in case someone tries to hack the
systems.
By having this act in place, it
means that anyone who tried to
cause damage or attempt to access
the computer system without the
authorization they can be
prosecuted using The Computer
Misuse Act.
Procedures when dealing with this
act could be making sure that after
every day the computers are
checked for any damage. This is a
crucial thing to check in case a
computer needs to be repaired and
so that if it was deliberate the last
person to use that PC will be
questioned about it.

, Data Protection Act Health and Safety Act Copyright Protection Act


The data protection act helps control how The Health and safety act makes sure The copyright protection act helps to
your personal data is used within a that the employers of the company or make sure that creators have the right
company or business. educational facilities have the correct to make sure no one copies their work
health and safety measures. This also or uses it without permission.
This would relate to an IT Technician as
counts those who visit the property,
they would have access to all the data Within a company the Copyright Law can
temporary staff and clients.
and they need to make sure that it is be enforced if they haven’t got a real
secure and no one else has access unless In a workplace with computers the IT version of a software, this means that
they have permission. Technicians job it to make sure that none they have got it without paying or with a
of the computers can cause any harm to 3rd party license.
The 8 principles of the act are:
anyone near them. They would also need
· Personal data shall be processed fairly and
to check regularly on the cables To prevent copyright, you can get
lawfully permission from the owner, for
connecting to the computer in case they
· Personal data shall be obtained only for one are damaged or faulty as this could cause example if you were to use some
or more specified and lawful purposes graphics work then you must sign an
a problem.
· Personal data shall be adequate, agreement with the owner to make
relevant and not excessive Furthermore, when working with sure that you can use it and can’t be
computers and changing or installing new sued as you got permission.
· Personal data shall be accurate and
where necessary kept up to date components anti-static bands must be
Some of the known procedures that are
warn as part of the health and safety act.
· Personal data processed for any purpose needed to not get Copyright claimed is:
This has to be done so that no one gets
shall not be kept longer than is
necessary hurt or the computer components don’t 1. Ask the user or creator for
get damaged. permission to use their content
· Personal data shall be processed in
accordance with the rights of data 2. Within the work place make sure
Procedures and precautions to take when
subjects to have up to date and valid
in the work place:
· Appropriate technical and organizational licenses to use the software
measures shall be taken against 1. When handling components make 3. See if there is an open access
unauthorized or unlawful processing. sure to wear an anti-static band agreement, this needs to be
· Personal information shall not be 2. When walking around make considered when publishing
transferred to a country outside the sure nothing is on the floor or information
Europeans Economic Area. make sure it hasn’t got any spilt
8 principles source liquid
3. Make sure to be aware of your
The main procedure is to make sure that surroundings and be careful
all data is safe and secure and that only when in an area with fragile
certain people can have access to that items or data
information as it may be confidential.
$11.98
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
ItsKenzie
5.0
(9)

Documento también disponible en un lote

Conoce al vendedor

Seller avatar
ItsKenzie University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
20
Miembro desde
6 año
Número de seguidores
10
Documentos
78
Última venta
2 año hace
IT and Cyber Security Notes For Computing Students

I prepare and sell top quality notes and essays that are concise and easy to understand to fellow computing students. It can be overwhelming when you get your first few projects or assignments, using my notes and essays can help you to better understand the modules and hopefully help you get the grades you want. Thanks for visiting my profile, feedback is always appreciated.

5.0

9 reseñas

5
9
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes