Wednesday, May 8, 2019
Social And Legal Aspects Of Computing Assignment
Social And Legal Aspects Of work out - Assignment ExampleHowever, in this case study Susan failed to protect details of her group members by sell the knowledge to businessman and mishandling the mount training which was stored in a USB stick. The learning was non available to the users since the database became in accessible and Susan misplaced the only back up that was available. Personal details should also be kept in such a manner that they will portray the accuracy to the users. To achieve this, it is vital for the data to be kept in a place where they cannot be motleyed without the consent of the owners (Theda & Mary 2010). In the case study, Susan had written information which was irrelevant such as the details regarding the Caroline relationship with her power boyfriend Tom. Such information did not add any value to the information for the purpose it was think for. Furthermore, Susan allowed an some other personal to use the data il jurally which could result to it s loss in authenticity. In addition, Susan forgot the vicarious device in which the data was stored, and this created a loophole for other stack to access private data which they could alter to suit their personal desires rather than the use for the benefit of the members. Question 2 The principle of data shield act requires that the individual information being generated should be just and legitimate (Theda & Mary 2010). It is a legal requirement that such personal details should be obtained for a specific purpose only and not for any other apprehension whether legitimate or lawful. Susan violated this rule because she included private information regarding the relationship between Caroline and Tom (her former boy friend) and by adding that there relationship was not genuine, but a mere pretence just meant to hurt her. This information was not related to the reason for which the database of members was required. The regulations also require individual information regarding othe r people to be processed with their authority (Andrea & Deborah 2011). The information held by one person on behalf of others is not supposed to be used for any other purpose apart from the one it was meant for. In this case, Susan shared members personal details with light beam for commercial use and in fact she received compensation of ?1000. This was against members wishes since they were included in the deal. Therefore, members are authorise to compensation for the illegitimate use of personal details. Personal details should be kept safe where they cannot slowly be accessed by unauthorized parties, spoilt, or replicated (Andrea & Deborah 2011). Susan violated this rule by carelessly sharing information with other people which eventually caused blockage of data maintained in the members website. She also misplaced the backup gadget which contained members details and probably the gadget was taken by other people. Those people who took that gadget probably went ahead and abuse d the information contained in it for their personal gains. This denied the group members the right to apology of their personal details which may result to abuse of their details. Question 3 In the case study, rotating shaft replicated the data massively and sent numerous email messages to the clients. The members complained to Susan that
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.