13.6.3 Implementing Legislation
| Specification Content/Learning Outcomes |
Legislation looks at how organisations enforce the legal requirements discussed in AS module 1 and the implications of legislation for the organisation.
|
Resources - Implementing Legislation
| Key to resources: |
|
PowerPoint presentation | Word file | Acrobat file | ||
| Internet resource | Video |
| Resource |
Type |
Size |
Notes |
| Business Software Alliance |
|
n/a | Very useful site concerned with software misuse in business. |
| FAST |
|
n/a | Federation Against Software Theft. Follow the Anti-Piracy link in the menu bar. |
| DPA Guidance |
|
n/a | Information Commissioner website. Lots of guidance for organisations on enforcing the DPA. |
| Health and Safety Case Study |
|
n/a | Good case study from the HSE outlining the implementation of a Health and Safety strategy in one area (ULDs). |
| Implementation of Legislation |
|
48Kb | PowerPoint presentation from Chris Brown. |
| Legal Aspects |
|
184Kb | Notes and activities from Clive E. Morley |
Add/suggest new resources - Click here to suggest new resources relevant to this topic. Do NOT add attachments e.g. Word documents to your suggestions as these will be discarded.
Reading -
Implementing Legislation
Texts other than Heathcote can be found in the ICT section of the Library
Resource Centre.
| Key to reading: | Heathcote - Core Text | Internet resource | Other book | |||
| Handout/worksheet |
| Reading |
Type |
Size |
Notes |
| Implementation of legislation |
|
n/a | Heathcote Ch.47 Pages 257 - 261 |
| Audit requirements |
|
n/a | Doyle Pages 221 -222 |
| Legislation |
|
35Kb | Notes from David Yates |
| Health and Safety |
|
21Kb | One page Word handout concentrating on Health and Safety requirements. |
Practice questions/homework - Implementing Legislation
| Key to questions: | Past exam question | Heathcote question |
|
Other question | ||
| FatMax assignment | Smokin' Dog assignment | |||||
| Reference |
Type |
Size |
Question |
| 1. June 2002 ICT4 Question 4 |
|
n/a |
A Medical
Practice has installed a new information system that links patient records
and prescriptions to the financial systems of the practice. The financial
records must be secure against fraud as they are used to claim money from
the Health Authority. (a). Describe four factors that should be included in an IT security policy for the practice. (8) (b). Describe one measure the practice could take to show that their records were accurate. (2) (c). Describe three criteria that could be used to select a disaster contingency plan to recover from a breakdown of this system. (6) (16 marks) |
| 2. May 2000 IT04 Question 10 |
|
n/a |
IT managers have to aware of certain
legislation that will impact on both their department and the rest of their
organisation. Discuss this statement. Particular attention should be given
to:
(20 marks) |
| 3. May 1999 IT04 Question 9 |
|
n/a | "Legislation will
have an impact on the procedures used within any organisation." Discuss this statement. Particular attention should be given to:
Illustrate your answer with specific
examples. |
| 4. NEAB Specimen Paper Question 3 |
|
n/a | A particular
college uses a computer network for storing details of its staff and
students and for managing its finances. Network stations are provided for
the Principal, Vice-Principal, Finance Officer, clerical staff and teaching
staff. Only certain designated staff have authority to change data or to
authorise payments. (a). What are the legal implications of storing personal data on the computer system? (4) (b). What measures should be taken to
ensure that the staff understand the legal implications? (3) |
| 5. NEAB 1997 IT04 Question 6 |
|
n/a | A company uses a
computer network for storing details of its staff and for managing its
finances. The network manager is concerned that some members of staff may
install unauthorised software onto the network. (a). Give reasons why it is necessary for some software to be designated as unauthorised (2) (b). What guidelines should the manager issue to prevent the installation of unauthorised software onto the network? (2) (c). What procedures might be available to the company to enforce the guidelines? (2) (6 marks) |
| A2 Modules | ICT4 | Links | Top | Home | FatMax1 |
Copyright/Disclaimer - I think everyone whose work appears on this site has been properly attributed and credited. If not, get in touch and I'll make the necessary amendments. FatMax 2002.