90 likes | 215 Views
ICT in running a small business. Amy McCarthy. Customer data storage. The most convenient way to store customer data is electronically. It is much safer and easier than storing it physically.
E N D
ICT in running a small business. Amy McCarthy
Customer data storage. • The most convenient way to store customer data is electronically. It is much safer and easier than storing it physically. • However, you need to follow the data protection act that was formed to refer to data controllers and data subjects.
The data protection act. • The data protection act consists of 8 sections, you need to make sure you meet all of these requirements. • Fairly and lawfully processed- cannot collect data for one purpose, then use it for another without the permission of the subject. • Processed for registered purposes- if you intend to send data to another company it must register with the Information Commissioner. • Adequate, relevant and not excessive- irrelevant data should be deleted. • Accurate and up to date- organisation must take steps to ensure data is accurate.
Continued • Not kept longer than is necessary- data held for any identified purpose must be removed once the purpose has been met. • Processed in line with your rights- data subjects may have the right to inspect data held on them. They have the right to as for inaccurate data to be corrected. • Secure- you need security to prevent unauthorised access to the data. Backup copies should be taken so your data is protected against loss. • Not transferred to countries without adequate protection- personal data cannot be transferred to countries outside the EU unless the country has an adequate level of protection on their computer systems.
Threats to your ICT system. • With lots of important data stored on your ICT system, you need to make sure you are prepared for potential threats to the IT infrastructure. • First of all, viruses may attempt to attack your computer system, they can come in the form of: malware, botnets, trojansand phishing. • Malware: is a software that is intended to damage or disable computers or computer systems. • Botnets: is a network of private computers infected with harmful software that is controlled without the owner’s knowledge. For example, sending spam. • Trojans: is a non-self-replicating malware which appears to perform a certain function, but in reality it gains unauthorised access to the users computer. • Phishing: it is an attempt to gain information such as usernames and passwords by masquerading as a trustworthy entity.
Weak points within an ict system. • Weak points within an ICT system can threatened by crime or malpractice. Crime is illegally accessing information for a purpose that is against the law. Malpractice is the access of information that is not intended to cause harm, for example somebody leaving their computer unlocked. • Spyware: attaches to an operating system and can track a user’s use of the internet. • Hacking: gains unauthorised access through telecommunication links and can damage or steal data. • Internal IT personnel: companies securities are usually made up of their employees. Dishonest employees can pose as a threat.
Continued • Networks: data on a network are vulnerable to external threat and can be tapped to allow eavesdropping. • Data stored offline: for example a memory stick, they can easily be lost or stolen so they should be kept locked away. • Data stored on a computer: a users’ personal computer can be vulnerable if attached to a network and unauthorised users can access information. • Data entry: data can be entered into a system with criminal intentions.
How to protect your infrastructure. • Hardware measures- make sure if you keep information on a USB or disk that you keep it safe and don’t lose it. Don’t leave USBs lying around unattended with important data on them. • Software measures- always keep it up to date and use anti-virus software and keep that up to date. • Procedures- keep your PC locked when unattended and make sure the password is not predictable. Keep back up copies of data in case it is ever lost.
Case studies. • Below are two news stories on companies who have been hacked. • According to computerworld 90% of companies get hacked according to surveys. • Twitter resets 'hacked' passwords after being compromised. Source: http://www.computerworld.com/s/article/9217853/90_of_companies_say_they_ve_been_hacked_Survey Source: http://www.bbc.co.uk/news/technology-20256682