0% found this document useful (0 votes)
48 views1 page

Security Issues To Consider

This document discusses security issues consumers should consider regarding personal information held by organizations. It outlines what information is collected, how it is protected, its accuracy, and who has access. It also covers potential threats like identity theft. Several pieces of legislation protecting consumer rights and security methods used by organizations are described, including evaluating their effectiveness. The document instructs the reader to write a report in Word format covering these topics using headings, subheadings and bullet points.

Uploaded by

tendoshingan
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views1 page

Security Issues To Consider

This document discusses security issues consumers should consider regarding personal information held by organizations. It outlines what information is collected, how it is protected, its accuracy, and who has access. It also covers potential threats like identity theft. Several pieces of legislation protecting consumer rights and security methods used by organizations are described, including evaluating their effectiveness. The document instructs the reader to write a report in Word format covering these topics using headings, subheadings and bullet points.

Uploaded by

tendoshingan
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 1

A level Unit 2

Coursework: Section C Security issues to consider


What the consumer should be concerned about What information is held about you by organizations How it is protected How accurate it is What it is being used for Who has access to it Potential threats such as identity theft and fraud

For the topics below you need to describe what they are an d what they protect against and evaluate how well they work. Legislation Data Protection Act Civil rights Distance selling (Consumer Protection Act) Computer misuse

Range of methods by which an organi ation can protect itself from security threats is! assessment Physical security "ser #D and access rights $ncryption %ecure electronic transactions (%$&) 'irewalls (irus protection

&his should be written in the form of a report on a Word document) *ou can use headings+ sub headings and bullet points where applicable but you need to write descriptions and evaluations)

You might also like