How Businesses manage Information and Data and why these Methods are used Flashcards

10.1 Key Requirements of Legislation relating to the Security of Information and Data. (17 cards)

1
Q

What are the two categories on the behaviours of organisations and business?

A
  • Imperatives
  • Incentives
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is imperatives?

A

Result from legislation or regulation and force organisations and businesses to act e.g. an employer’s responsibilities under health and safety legislation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Incentives?

A

Come from the benefits organisations gain from taking action e.g. changes to tax rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some examples of consequences for an organisation/business not manageing info and data properly?

A
  • financial penalties,
  • reputational damage
  • loss of clients
  • customers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some of the techniques that can be applied to minimise the risk of things going wrong?

A
  • Staff Training
  • Version Control
  • Access Controls
  • Indexing
  • Cyber Security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does Staff Training help employees to understand?

A

The organisation’s current policies and procedures as well as their individual responsibilities to ensure they protect personal data and business info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What should staff training raise awareness to?

A

The ongoing risk to data security from hacking and other cybercriminal activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is version control used to do?

A

ensure accuracy of info and establish that employees are working with the most up-to-date info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does version control help to do?

A

ensure that personal data is kept up to date and managers make informed decisions based on the latest info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why do access controls need to be put in place?

A

Some data may be confidential or sensitive. This means managers may restrict the number of people that need access to this type of data, to reduce the potential for data breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What ways can data be protected on electric devices?

A
  • Password protection
  • Stored in a secure drive that only certain people can open.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What ways can data be protected on paper?

A

Keep it in a locked filing cabinet or storage room which only certain people have access to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

how can data be protected without having access controls?

A

Records can have personal data removed so that staff can access any data they need without compromising access to data they do not need to view.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Indexing?

A

Data is usually stored or catalogued in a way that allows it be searched efficiently and effectively. This will help managers make informed decisions and work out any data breaches and the extent of them quickly and respond to request for info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can you protect your data from hackers (cyber security)?

A
  • use reputable ant-virus software which is regularly updated to detect and then delete suspicious code or software.
  • set up and use a firewall. – regular checks or audits to proactively identify any potential security vulnerabilities and take action quickly.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Firewall?

A

A specialist Security feature that selectively manages the communication of data into, within or out of a network.

17
Q

What is a firewall intended to do?

A

It is intended to block data that is considered potentially dangerous or is not trusted.