100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Summary

Summary Unit 7 Assignment 3

Rating
-
Sold
-
Pages
15
Uploaded on
07-07-2024
Written in
2023/2024

Completed to distinction standard.

Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Study Level
Publisher
Subject
Course

Document information

Uploaded on
July 7, 2024
Number of pages
15
Written in
2023/2024
Type
Summary

Subjects

Content preview

Unit 7
Assignment 3
Employment contracts and security
Hiring policies
Within organisations a hiring policy will need to be established, this must abide to the
national employment law.
When employing new staff is it great importance to carry out a background check whereby
past employment records are gathered as well as criminal records, references and an
assessment task will also be typically set [to determine whether they are fit for the job].
Organisations usually will have a probation period in place whereby new staff are given
restricted access [until the probationary period is over], this allows time for the organisation
to establish trust with the new employee and allow them responsibility one stage at a time.
Separation of duties
To ensure an organisation doesn’t become reliant on any one member of staff with regards
to the entire security system organisations separate the duties between many team
members. The individual team members all have one critical duty to manage and a deputy,
who is also experienced in that area, is employed to cover the team member in case of
absence or departure.
The same applies to how the system is understood, in that no one individual has full
knowledge of the entire system or how each induvial element is configured. The chief
officer may have an overview of the entire system, however, they will not have a detailed
knowledge of the rules of the induvial components.
Ensuring compliance including disciplinary procedures
Employees and businesses partners who are suspected to be the cause of infringement to
the originations security system must be dealt with in a fair, confidential and legally
acceptable manner, ensuring compliance with the established disciplinary and investigation
procedures.
The person who may be suspected for being the cause of the security systems infringement
may in fact not be the perpetrator and to falsely convict someone is asking for legal action
to be taken against the organisation [leading to hefty fines from damaging the person’s
reputation].
If a staff member is the likely cause of the infringement organisations may take the
following, appropriate steps:

 Suspension [whereby the employee is still payed]
 An independent party recruited to investigate the matter unbiasedly
 If the situation appears to be a crime – immediate involvement of the police may be
appropriate.




1|Page
Matthew Lloyd-Jones

, Unit 7
Assignment 3
On the employee’s contract [and job description] a clear definition of their roles and
responsibilities will be stated, upon this, the penalties will be listed for if the employees
breach their contractual terms.
Training and communicating with staff as to their responsibilities
While no lawful order is in place to ensure the staff of adequate training, it is expected for
the employer to train staff ensuring they will complete their job(s) acceptably. The employer
should also keep in regular contact with their staff to ensure the staff are aware of their
responsibilities.
Laws
Legislation
With the rapidly evolving computer technology of today came the ability to subvert the
rights and intellectual property of others. Within the management of organisational systems
security you will need to be made aware of the following laws:

 Computer Misuse act, 1990
 Copyright, Designs and Patents Act, 1988
 Data Protection Acts of 1984, 1998 and 2000
 Freedom of Information Act, 2000
Computer Misuse Act 1990
The Computer Misuse Act is criminal law. There are three main areas to it, effectively it
combats any known instances of hacking, access and network use.
The three main areas will be stated below:
1. Unauthorised access to computer material
i. The use of another person’s username and password to gain entry into a
computer system, use data or run a program
ii. Altering, deleting, copying, moving a program/ data or simply printing out
data with no permission
iii. Creating a way whereby you obtain a password
2. Unauthorised access to a computer system with intent to commit or facilitate the
commission of a further offence [e.g. creating a backdoor Trojan]
3. Unauthorised modification of computer material, including the distribution of
viruses, as well as the amendment of data to gain personal advantage.
Copyright, Design and Patents Act 1988
This act allows for creators of unique works the right to retain the intellectual property and
seek action for damages against those who distribute their work or steal their work and pass
it over as their own.




2|Page
Matthew Lloyd-Jones

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MatthewIT AQA
Follow You need to be logged in order to follow users or courses
Sold
79
Member since
8 year
Number of followers
61
Documents
19
Last sold
1 year ago

I studied IT (Business) for an Extended Diploma in a 2 year BTEC course; I finished the course achieving the best possible grade while my attendance was only 70%. I aimed and received nothing less than a distinction throughout my work, this is a great opportunity to use my work to your advantage. If you did not receive the information you were looking for upon purchasing my work feel free to message me and I will FOR FREE give you additional information. All the best, Matthew

Read more Read less
3,8

10 reviews

5
3
4
3
3
3
2
1
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions