Important: Use custom search function to get better results from our thousands of pages

Use " " for compulsory search eg:"electronics seminar" , use -" " for filter something eg: "electronics seminar" -"/tag/" (used for exclude results from tag pages)
Ask More Info Of  A Seminar Ask More Info Of A Project Post Reply  Follow us on Twitter
14-08-2012, 04:58 PM
Post: #1
13.6 Legal Aspects ppt
13.6 Legal Aspects


.ppt  13.6LegalAspects(2).ppt (Size: 230 KB / Downloads: 14)

Objectives

Corporate IT Security Policy:

Understand the need for a corporate information system security policy and the rĂ´le it would fill within an organisation.
Factors could include prevention of misuse, detection, investigation, procedures, staff responsibilities, disciplinary procedures.
Describe the content of a corporate information system security policy.
Describe methods of improving awareness of security policy within an organisation, cross-referencing to training and standards.

Disaster recovery management:

Describe the various potential threats to information systems, e.g. physical security; document security; personnel security; hardware security; communications security; software security. Understand the concept of risk analysis.
Understand the commercial need to ensure that an information system is protected from threat. Describe a range of contingency plans to recover from disasters and relate these to identified threats.
Describe the criteria used to select a contingency plan appropriate to the scale of an organisation and installation.

Corporate IT Security

Dependency on IT means the integrity and the safety of information kept is highly important.
Two possible threats to security are accidental and deliberate loss and damage.
Accidental: human error and natural disasters.
Deliberate: fraud, sabotage, arson and spying.
Threats to security come from within and from outside the organisation.
A Corporate IT Security Policy should be wide ranging enough to cover all eventualities.

IT Policy Statement

Covering the use of computers.
Users are to read and sign agreement to.
Organisations may run training courses for new employees who use computers.
Courses cover the main Acts regarding the use of computers in organisations.
It security implemented as a cornerstone of the organisation’s management.

Prevention of Misuse

Not allowing users access to the Operating System and settings.
Not allowing key files to be deleted.
Allowing restricted use of the Internet including Filtering and Firewalls.
Not allowing everyone access to the Internet and e-mail use.
Users need a user name and a password.
Users have access only to files they normally use in the course of their work.

Detection

Audit trails to discover where misuse has taken place and to identify the employee.
Specialist software that will identify an unusual request or unusual use and will flag a message to the security manager.
Software that allows the security manager to see who is working and who is playing.
A log of access can be saved to build a record of use about employees.

Investigation

Use of software to investigate and gather evidence against a mis-user of the system.
Important to have proper evidence against someone accused to ensure fair treatment and keep good industrial relations.
In serious cases of misuse the employee could be disciplined, dismissed, or the police involved in very serious cases.
17-12-2012, 01:14 PM
Post: #2
RE: 13.6 Legal Aspects ppt
to get information about the topic " LEGAL ASPECTS PPT" full report ppt and related topic refer the link bellow


http://seminarprojects.com/Thread-13-6-l...spects-ppt

http://seminarprojects.com/Thread-legal-...-questions
Rating 13.6 Legal Aspects ppt Options
Share 13.6 Legal Aspects ppt To Your Friends :- Seminar Topics Bookmark
Post Reply 

Marked Categories : legal dimension of computerization in ppt, legal aspects, legal aspects of security ppt,

[-]
Quick Reply
Message
Type your reply to this message here.


Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  THE IMPACT OF COMPUTERS ON THE LEGAL PROFESSION: EVOLUTION OR REVOLUTION project girl 0 1,246 08-11-2012 12:02 PM
Last Post: project girl
  Time Synchronization Aspects in Mobile Backhaul Networks project girl 0 292 06-11-2012 05:34 PM
Last Post: project girl
  A Framework for Recognizing the Simultaneous Aspects of American Sign Language seminar flower 0 232 29-09-2012 11:40 AM
Last Post: seminar flower
  Some Aspects of Interleave Division Multiple Access in Ad Hoc Networks ppt seminar flower 0 339 22-09-2012 12:41 PM
Last Post: seminar flower
  Legal issues for the Entrepreneur seminar flower 0 281 31-07-2012 11:57 AM
Last Post: seminar flower
  A Gift of Fire: Social, Legal, and Ethical Issues for Computers and the Internet seminar flower 0 499 28-07-2012 02:59 PM
Last Post: seminar flower
  Aspects of RFID Security and Privacy nit_cal 0 1,395 30-10-2009 03:14 PM
Last Post: nit_cal
This Page May Contain What is 13.6 Legal Aspects ppt And Latest Information/News About 13.6 Legal Aspects ppt,If Not ...Use Search to get more info about 13.6 Legal Aspects ppt Or Ask Here

Options: