100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Essay

IT Technical Support Assignment 3

Rating
-
Sold
-
Pages
12
Grade
A
Uploaded on
08-07-2021
Written in
2017/2018

The document contains all criteria for assignment 3: P2, M2, D1. I received full marks for this assignment.

Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Connected book

Written for

Study Level
Examinator
Subject
Unit

Document information

Uploaded on
July 8, 2021
Number of pages
12
Written in
2017/2018
Type
Essay
Professor(s)
Unknown
Grade
A

Subjects

Content preview

P2 - Produce an
The Computer Misuse Act
information booklet
explaining how 4 policies
Policies
The computer misuse act is aimed
at combating various forms or
such as Data Protection,
Health and Safety,
and
deliberate misuse of computer
systems.
Within a company the IT
Copyright etc. and 4
company’s IT procedures,
Procedur
Technician would need to report if
there was a broken machine and
then find out how it was broken.
explain how these have an
impact on providing es
They also need to make sure that
technical support to users
the security software is up to date
in case someone tries to hack the
systems.
By having this act in place, it
means that anyone who tried to
cause damage or attempt to access
the computer system without the
authorization they can be
prosecuted using The Computer
Misuse Act.
Procedures when dealing with this
act could be making sure that after
every day the computers are
checked for any damage. This is a
crucial thing to check in case a
computer needs to be repaired and
so that if it was deliberate the last
person to use that PC will be
questioned about it.

, Data Protection Act Health and Safety Act Copyright Protection Act


The data protection act helps control how The Health and safety act makes sure The copyright protection act helps to
your personal data is used within a that the employers of the company or make sure that creators have the right
company or business. educational facilities have the correct to make sure no one copies their work
health and safety measures. This also or uses it without permission.
This would relate to an IT Technician as
counts those who visit the property,
they would have access to all the data Within a company the Copyright Law can
temporary staff and clients.
and they need to make sure that it is be enforced if they haven’t got a real
secure and no one else has access unless In a workplace with computers the IT version of a software, this means that
they have permission. Technicians job it to make sure that none they have got it without paying or with a
of the computers can cause any harm to 3rd party license.
The 8 principles of the act are:
anyone near them. They would also need
· Personal data shall be processed fairly and
to check regularly on the cables To prevent copyright, you can get
lawfully permission from the owner, for
connecting to the computer in case they
· Personal data shall be obtained only for one are damaged or faulty as this could cause example if you were to use some
or more specified and lawful purposes graphics work then you must sign an
a problem.
· Personal data shall be adequate, agreement with the owner to make
relevant and not excessive Furthermore, when working with sure that you can use it and can’t be
computers and changing or installing new sued as you got permission.
· Personal data shall be accurate and
where necessary kept up to date components anti-static bands must be
Some of the known procedures that are
warn as part of the health and safety act.
· Personal data processed for any purpose needed to not get Copyright claimed is:
This has to be done so that no one gets
shall not be kept longer than is
necessary hurt or the computer components don’t 1. Ask the user or creator for
get damaged. permission to use their content
· Personal data shall be processed in
accordance with the rights of data 2. Within the work place make sure
Procedures and precautions to take when
subjects to have up to date and valid
in the work place:
· Appropriate technical and organizational licenses to use the software
measures shall be taken against 1. When handling components make 3. See if there is an open access
unauthorized or unlawful processing. sure to wear an anti-static band agreement, this needs to be
· Personal information shall not be 2. When walking around make considered when publishing
transferred to a country outside the sure nothing is on the floor or information
Europeans Economic Area. make sure it hasn’t got any spilt
8 principles source liquid
3. Make sure to be aware of your
The main procedure is to make sure that surroundings and be careful
all data is safe and secure and that only when in an area with fragile
certain people can have access to that items or data
information as it may be confidential.
$11.98
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
ItsKenzie
5.0
(9)

Also available in package deal

Get to know the seller

Seller avatar
ItsKenzie University
Follow You need to be logged in order to follow users or courses
Sold
20
Member since
6 year
Number of followers
10
Documents
78
Last sold
2 year ago
IT and Cyber Security Notes For Computing Students

I prepare and sell top quality notes and essays that are concise and easy to understand to fellow computing students. It can be overwhelming when you get your first few projects or assignments, using my notes and essays can help you to better understand the modules and hopefully help you get the grades you want. Thanks for visiting my profile, feedback is always appreciated.

5.0

9 reviews

5
9
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions