BCS Business Processes Flashcards
What is the computer misuse act?
The CM act protects personal data held by organisations from unauthorised access to computer material.
What is the data protection act?
The DPA protects the privacy of data held on individuals by businesses and other organisations. It makes sure the user has access to their data.
What is the GPDR?
General Data Protection Regulation
It protects European Union customer data, and hopes to reduce the severity of security breaches of personal data on the web.
What is ISO 27001?
International Standard for an ISMS (Information Security Management System)
What is an ISMS
A system for managing information security effectively.
Give me an example of how a business uses ISO 27001
regulating passwords for users
Controlling access to online sites
Managing the risk of supplies.
e.g. 3rd party providers
Give me an example of using the computer misuse act?
Hacking into someones device
unauthorised access to someones files
Give an example of using the data protection act
Having unauthorised access to confidential information.
What are the first 4 data protection principle acts?
- ) Personal data shall be processed fairly and lawfully
- ) Personal data must be obtained and processed for specified lawful purposes.
- ) Personal data shall be adequate, relevant and not excessive.
- ) Personal must be accurate and kept up to date.
What are the last 4 data protection principle acts?
- ) Personal data shall not be kept for any longer than is necessary.
- ) Personal data shall be processed in accordance with the rights of data subjects.
- ) Personal data must be kept safe and secure at all times.
- ) Personal data shall not be transferred outside the European area unless sufficient protection is ensured.
Who enforces the data protection act?
The Information Commissioner’s Office (ICO)
What is the difference between on premise and off premise?
On Premise: A solution hosted in house and usually supported by a third party.
Off Premise: A solution hosted by a third party and usually supported by a different third party.
Define Infrastructure as a service (IaaS)?
A service model that delivers computer infrastructure to support operations
Define Software as a serivce (Saas)?
A software distribution model in which a 3rd party provider hosts applications and makes them available to customers over the internet.
Define Platform as a service (PaaS)
A Cloud computing model in which a 3rd party provider delivers hardware and software tools to users over the internet.
What is the difference between Agile and Waterfall methods of software development?
The Agile method is known for its flexibility.
The waterfall method is structured towards software development.
what is the GDPR
General Data Protection Regulation
The legal framework that sets guidelines for the collection and processing of personal information from individuals who live in the European Union (EU).
How many principles are in the GDPR
7.
- ) Lawfulness, fairness and transparency
- ) Purpose Limitation
- ) Data Minimisation
- ) Accuracy
- ) Storage Limitation
- ) Integrity and Confidentiality
- ) Accountability
What is a standard operating procedure (SOP)
a set of step-by-step instructions compiled by an organization to help workers carry out complex routine operations.
SOPs aim to achieve efficiency, quality output and uniformity of performance, while reducing miscommunication
Give me some examples of confidential information
- bank details,
- contact information
- date of birth, name and age
What is confidential information
any information or document that a business or individual wishes not to make public.
What is not classed as non-confidential information
Any information or document which is open to the public.
What is an example of non-confidential information
Census records
What are the benefits of using SOP’s
- Efficiency
- Save on Training Costs
- simplify performance management
What is a disaster recovery plan
a plan for business continuity in the event of a disaster that destroys part or all of a business’s resources, including IT equipment, data records and the physical space of an organization.
What is an IT disaster recovery plan
The plan should include a strategy to ensure that all critical information is backed up. Identify critical software applications and data and the hardware required to run them. Prioritize hardware and software restoration.
Document the IT disaster recovery plan as part of the business continuity plan.
what is the freedom of information act 2000?
A right of access to all types of recorded information held by most UK public authorities
What are the 8 principles of data protection?
- ) Fair and Lawful
- ) Specific for its purpose
- ) Be adequate
- ) Accurate and up to date
- ) Not kept no longer than needed
- ) Take into account peoples rights
- ) Kept safe and secure
- ) Not to be transferred outside the EU