1.5 Flashcards
How to protect information against unauthorised access?
Password-protecting documents, computers and networks
Installing anti-virus software
Installing anti-spyware software
Granting staff different levels of access rights
Screensaver time-out when computers are left unattended
Positioning computer screens so the public cannot view them
What is inappropriate use of IT equipment and software
Using workplace computers for non-work activities
Installing unauthorised software
Installing software that is licensed only for business use on home computers
What are the consequences of inappropriate use of IT equipment and software?
Wasted business time
Charges of gross misconduct
Fines for breaking the law