Administrative Practices Outcome 1

Slides:



Advertisements
Similar presentations
Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Advertisements

Unit 4- Assignment 3 P5, P6, M2 BTEC Business Level 3.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
Admin & IT. Identification of Hazards and measures to ensure safe practice Accidents happen but it is important that hazards minimised to reduce the number.
Higher Administration and IT Administrative Practices.
Factors to be taken into account when designing ICT Security Policies
Health and Safety Legislation
Data Protection Act.
The Legal Framework Can you work out which slide each bullet point should go on?!
CENTRAL SCOTLAND POLICE Data Protection & Information Security Stuart Macfarlane Information Governance Unit Police Service of Scotland.
Administrative Practices Outcome 1
Higher Administration
Reception.
Reception Unit 2c.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
General Purpose Packages
Handling information 14 Standard.
Health & Social Care Apprenticeships & Diploma
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
Data Protection Property Management Conference. What’s it got to do with me ? As a member of a management committee responsible for Guiding property you.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
Communication in Administration (Security)
Information Systems Unit 3.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
Safety & Security By Kieran Bolko. Laws The main law that you should be taking note of is the Data Protection Act 1998 – this law sets rules for the electronic.
Learning Intention Security of Information. Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Data protection act. During the second half of the 20th century, businesses, organisations and the government began using computers to store information.
Learning Intention Legislations impact on security of information
Explaining strategies to ensure compliance with workplace legislation
Data security OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013.
Data Protection GCSE ICT Mrs N Steventon-2005.
PowerPoint presentation
Lesson 3 Protecting ICT systems Data Protection Act 1998.
Implications of Digital Technology for Business and Customers
Handling Personal Data
Privacy & Confidentiality
Mastering Administration
Handout 2: Data Protection and Copyright
Legislation in ICT.
Data Protection Act.
Protecting Client Confidentiality for Volunteers and Agency Staff
Data Protection Legislation
Security of People, Property and Information
County HIPAA Review All Rights Reserved 2002.
Unit 7 – Organisational Systems Security
Identify the laws and guidelines that affect day-to-day use of IT.
Legal and Ethical Issues
Information management and communication
General Data Protection Regulations 2018
Security of Data  
Legislation in ICT.
How it affects policies and procedures
G061 - Network Security.
Handling information 14 Standard.
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

Administrative Practices Outcome 1 Administrative Practices Outcome 1.4 Security of People, Property and Information Administration and IT National 4 and National 5

Security of People Reception is at the front of an organisation, which provides a key role in security. Reception Staff will: Check staff ID badges/security passes Monitor CCTV Control an entry system Manage the Appointments Book, Visitors Book and Staff Sign In/Out Book Issue Visitor Badges Security

Security of People Additional security measures may include: Keypads/combination locks/swipe cards Locked doors Staff uniform Security Guards Alarm the Building Think about why each of the items above would help… discuss with a partner. Security

Security of Property Property may be secured using some of the following methods: Attach equipment to desks Mark equipment with UV pens Keep an inventory of equipment (inc asset numbers) Use security cables Keep doors/windows locked Alarm the building Security guard and lighting Security blinds Security

Security of Information Access to areas of the building where confidential information is stored should be limited. Visitors should never be left unsupervised. Be aware of problems that might occur with: Filing cabinets (locks?) Photocopiers/Printers (leaving unattended?) Fax machines (sending to the right destination/unattended?) Information should be filed after use, or shredded if no longer required. Security

Electronic Files Security

Electronic Files Use of usernames/passwords: Used to login to computer system Sometimes used to access certain files/programs - different levels of access May also be used with a screensaver Members of staff should be trained on password strength – search online for the most common passwords Computer system forces a password reset every eg 30 days Confidential information should never be left on screen for others to see. Security

Electronic Files Read-only documents Label and store external storage devices safely Security ID cards/keys inserted before use into a computer Voiceprint/fingerprint recognition Anti-virus software Encryption software Backup procedures (does not prevent theft, but allows a restore of critical information) In addition all files should be regularly backed up to a secure location – preferably off-site. Security

The Data Protection Act Protects both the data subject and the data user. Data users must be registered with the Data Protection Registrar and follow the principles of the Act. Security

The Data Protection Act Individuals can request data held about them The Data Protection Act Principles of the Data Protection Act The Act states that information must be: Fairly and lawfully processed Used for the registered purposes only Adequate, relevant and not excessive Accurate Kept for no longer than necessary Kept securely Processed in line with the individual’s legal rights Transferred outside the EU only if the individual’s rights can be assured. Failure to comply can result in fines or prosecution Security

The Data Protection Act Watch the video… A shortcut can be found at this address: knox.is/dpa

The Computer Misuse Act This act makes it illegal to: Access computers without permission (eg hacking) Access computers with the intention of committing a criminal offence Access computers to change or alter details without permission. Security

Task: BBC Bitesize & Questions Use the BBC Bitesize website to revise ICT security, attempt the activity and then test your knowledge of data security. Questions: Explain why the reception area plays a crucial role in the security of an organisation. Describe three security measures taken by the receptionist. State how keypads/combination locks/swipecards can restrict unauthorised access. Describe three security measures taken by an organisation to protect property. List two ways that usernames and passwords can restrict access to information. List three other methods of protecting information held on computer. State what is meant by the term “back-up”. Outline the main principles of the Data Protection Act 1998. Give the purpose of the Computer Misuse Act 1990. Security

Task: Staff Handbook Update the extract from the staff handbook with relevant information on employee and organisational responsibilities with regard to security in the organisation. The file can be found on the server. Security

Organisations view the security of people, property and information very seriously. They employ a range of measures to ensure that they are kept secure. Organisations should ensure that they comply with the Data Protection Act 1998 and the Computer Misuse Act 1990. People: staff ID badges; monitor CCTV; intercoms/entry phones; appointments, visitors and staff in/out book; staff uniforms; swipe cards etc Property: attaching equipment to desks; UV pens; inventory of equipment; security cables; doors/windows locked; alarms; security guard; security blinds Paper-Based Information: restrict access to the building; lock filing cabinets; confidential information not left lying around; file/shred information after use Computer-Based Information: usernames/passwords; encrypt confidential information; read-only files; voice/fingerprint recognition; iris scanners; anti-virus software; storage media locked away Outcome Summary Security

Complete the Learning Checklist for this Outcome Outcome Summary Administrative Assistant

Administrative Practices Outcome 1 Administrative Practices Outcome 1.4 Security of people, Property and Information Administration and IT National 4 and National 5