This website uses cookies to ensure you have the best experience. Learn more

I.T. Report

1866 words - 7 pages

Gigwiz IT Manager Tom Robertson Group A DigicomGigwiz I.T. Security ReportIntroductionThis report is being written in response to concerns expressed by some of our customers, over the safety of their personal data. Through this report I shall briefly explain the various security procedures we have in place to keep our data safe.PasswordsPasswords: as far as passwords are concerned these should be memorable but not easily guessed,(passwords like your favourite football team, children's names are easily guessed with a little knowledge), ideally password should be made up of a mix of letters, numbers and characters in upper and lower case. We have brief detailed instructions on the contacts page of the website (also embedded in the form, which only allows entry of data in a set format.) Within the company itself we use a hierarchy of passwords i.e. personal password for our individual workstations and different passwords for internal departments e.g. HR, I.T.If someone forgets their personal password they should inform the I.T. department and we will supply a temporary password in order for you to reset it. As a company we run the policy of changing internal passwords every 3 months.Personal InformationIn 1998 the Data Protection Act was passed by parliament to control the way information was stored and utilised by companies, and to give legal rights to the people the information was about. Other European countries have also passed similar laws as information is often stored in more than one country.The company must register with the information Commissioner. The Data Controller (person in charge of the data), must provide certain information to the commissioner i.e.Each entry in the register contains:1. The data controller's name and address.2. A description of the information to be stored.3. What they are going to use the information for.4. Whether the data controller plans to pass on the information to other people or organisations.5. Whether the data controller will transfer the information outside the UK.6. Details of how the data controller will keep the information safe and secureThe data controller must also adhere to the eight principles of data protection which are:For the personal data that controllers store and process:1. It must be collected and used fairly and inside the law.2. It must only be held and used for the reasons given to the Information Commissioner.3. It can only be used for those registered purposes and only be disclosed to those people mentioned in the register entry. You cannot give it away or sell it unless you said you would to begin with.4. The information held must be adequate, relevant and not excessive when compared with the purpose stated in the register. So you must have enough detail but not too much for the job that you are doing with the data.5. It must be accurate and be kept up to date. There is a duty to keep it up to date, for example to change an address when people move.6. It must not be kept longer than...

Find Another Essay On I.T. Report

Organizational Culture at Hands-On Labs Essay

924 words - 4 pages . Although several leaders had come and gone, one group of leaders convinced the president of their ideas regarding change. From there, the company’s culture developed into a unified, team-based organization. The new leadership style transformed the bureaucratic style into a matrix organization as described by Conrad & Poole (2012) that required people to report to different departments, in addition to their main department. Furthermore, they

Business Ethics Essay

1018 words - 4 pages continuity and act as a responsibility in public interest as well as a way to symbolize professionalism. Adverse harm will be done to company like corporation collapse in extreme if weak ethics compliance in a business.1b) It is the employee responsibility to report the behavior which is ethic violation.After suspecting the unethical behavior, I will immediate review the ethics handbook to following the instructions to report the issue then avoid

What is Supply Chain Management?

1478 words - 6 pages departments, suppliers and customers. Since it’s emergence in 1900’s RFID has been implemented in supply chain by major global players in varied sectors such as Walmart in retail, Cognizent in I.T and Gardeur A.G in Clothing.[3] RFID has been the most comprehensive introduction in supply chain to overcome the various shortcomings of bar codes technology. As quoted by Omar Massoud Salim Hassan Ali in his thesis, companies can use RFID to

New Printer Testing: Reducing Time and Cost through Innovation

2255 words - 10 pages having a defined process and the proper tools to test new printers has caused severe delays of two to four months, hindering the I.T. Departments ability to deliver new printer models to the departments and end users with efficiency and financial responsibility. The purpose of this report is to present a couple of options for tools to be used to test new printers, in a more efficient manner that will allow for a defined process while permitting the

Education and Economic Growth in Trinidad and Tobago

2205 words - 9 pages the ones who will be the future business owners or entrepreneurs, working within corporate offices, carpenters or doing some form of work that they are interested in. Notable also is that education from early childhood to the tertiary level is a continuum, and it is articulated by common threads of lifelong learning. Base on a report found online from 2004 on Trinidad and Tobago, it noted that if the country is seeking to reach developed

An investigation into the impact IT has had on the modern world with particular reference to business and social problems

3375 words - 14 pages the creation of customer profiles. The re-ordering of food is now totally automated. Decisions are made at all levels of the company as a result of collecting and processing data into useful information.It is very important for food retailers to know about the customers buying habits because of the fierce competition between them. Companies such as Tesco, ASDA, and Sainsburys all use I.T. (information technology) to create customer profiles

Employment and Work Experience

727 words - 3 pages in fulfilment of localised mid-term goals. These tasks combined contributed substantially to meeting the overarching objective within South Somerset National Trust of a complete operational overhaul by Q2 2015. Compiled into a concise 10,000 word report, my research outlined (and suggested viable solutions to) the conservational, curatorial and contextual challenges that Montacute House will be facing in the future. The report also concerned

The Church Industry

1580 words - 6 pages In 2006, Package Facts report on religious market showed that the overall religious market for publishing inspirational merchandise, audio and video tapes, software product would grow to 9.5.billion dollars by 2010. The church opened creative minds and business thinkers to new business opportunities in the I.T world. Electronic bibles, church accounting soft ware, bible software are developed and improved upon year in year out. Some I.T

Comparing Two Engineering Careers: Electrical and Computer

1532 words - 7 pages LETTER OF TRANSMITTAL Michael Andres Clow Water Systems December 12, 2012 To: Michael Andres Re: COMPARING TWO ENGINEERING CAREERS: ELECTRICAL AND COMPUTER. Dear Michael, Hi Michael, attached is the report you asked for on “COMPARING TWO ENGINEERING CAREERS: ELECTRICAL AND COMPUTER.” This report compares two career options for a fellow employee: Electrical Engineer and Computer Engineer. These two potential career choices are based on

vocation area report

1917 words - 8 pages INTRODUCTION I am required to write a report on an industry sector within my vocational area relating to my course of study. This report will be worth 20% towards my final result of my work experience. I will be choosing to write about Computer Network Security for my vocational report. In my report I will be giving a description of the industry sector (Computer Network Security) and will name the range of occupations associated with it. Also

A Study on Testing of Service Oriented Architecture

1133 words - 5 pages these services.  INTRODUCTION Web Services have formed an important part of the internet in the current I.T driven economy. The Web Service is an interface that describes a collection of operations that are remote accessible through standardized XML messaging [17]. These services provide functionality ranging from simple mathematical functions to more complex banking applications over the web. Different businesses have adopted the technology of

Similar Essays

The Impact That Information Technology Has On Society

1274 words - 5 pages Information technology has developed through the years. This has also had an impact had on modern society. The technological advancements have and are changing human kind forever. I.T. development has improved the life style of men and women all around the world. Efficiency and speed, of work and leisure is now at its highest level. Technology will keep on developing and at the same time life is going to be improved.In my opinion I.T really

Corporate Risk Management Essay

1372 words - 5 pages -that have our company's software and link with our main server.At the Emergency Response level, it is the most critical and the severest situation. We will hold a BCP committee emergency meeting what all department heads report detail about the manpower and working progress of them. After I.T. department will distribute the have prepared notebook computer for the all department heads and these staff, but except the Marketing staff and I.T staff

Businesss Study Recommendations For Network Upgrade

1658 words - 7 pages Businesss Study Recommendations for Network Upgrade Background Mr. D the Chief Information Officer of M Computing has put the brilliant Information Technology department in charge of setting up a computer network for the company. The I.T. department must research the different options to come up with the most efficient decision for the network. The team must keep each system within the budget of $2700 and $3400 per user platform. Some

High Performance Computing And Enterprise Resource Planning

1247 words - 5 pages will provide a report tool that makes creating new reports easier for the user and reduced training for creating and maintaining reposts. Another importance is information bottlenecks, where end uses can run reports when they need them, rather than the help desk in an I.T. department taking time to run these reports and prepare them. Allowing users to examine and authenticate the data without getting the I.T. department involved and valuable