Computer Misuse Act 1990Â This act was introduced to prevent users hacking. This also stops them entering a computer, programs or files without authorisation, this act is in place to prevent users to use the internet without permission to cause an act of crime and also prevents unauthorised modifications to a computer. This act does not allow any attacks on a server as this is illegal. Hacking into a computer is not allowed as it can disrupt the business as personal information can be stolen and also be used in crime, this can cause a problem in the businesses finance sector. Anyone who knowingly hacks into a computer with intent to steal information is going against this act. Anyone who misuses the computer in this way is going against the law as they are using it for criminal acts. This act also does not allow anyone to use a fraudulent credit card or any other card to make a purchase via the internet. Hackers who overload networks with data to intently disable them can face a prison sentence for up to 10 years. This act makes it illegal for users to upload pornography of someone and children as people will find the offensive, having possession or viewing these types of materials could get the user in to trouble by the law. Users must not use the computer to harass or stalk a particular person, it is also the same when making telephone conversations as the user can not use offensive or threatening language they can face a sixth month imprisonment. This allows the organisation to take action and take back whats rightfully there and also punish the hacker as they are covered by this law, this bring a sense of security as this law ould put the hackers from obtaining information wrongly. Copyright Designs and Patents Act 1988 This is the current UK copyright law which has been created since 1988, it gives artist and creators of, musical and dramatic or any other artist have the right to control their work, this allows them to have control over how their material is used, this right covers broadcast and public performance, copying, adapting, issuing, renting and lending copies to the public. It is not what has been created itâ€™s the details within what has been created to be protected, for example if you have a idea for a book that would not be protected however the information and content within the book that is written will be protected. So someone else can write a book around your idea but they cannot copy your book or adapt your book to do so. This helps to protect security and privacy of data as it protects the effort money and time someone has put in to create their content, if this content is being copied the organisation will lose potential customers as someone is using their content to sell another product. Privacy and compensation requirements of Data Protection Act 1984 1998 2000 This legislation first was written in 1984 there are updated version of this data protection act and the one that is used and most updated is the 2000 version, the 1998 version was a broadened and replaced the data protection act 1984, the main purpose for this law is that it gives rights and privacy of individuals, this ensure that their data is not processed without the creators knowledge and is only process with the consent of the artist. This act covers personal data relating to living individuals and protects sensitive personal data of that individual. This act covers data held in electronic formats. This has been changed as over time new technology and items are able to store data this is now updated so that it can cover these items as they will contain sensitive and personal data to an individual. The 2000 version of this act contains added laws and have been updated. This protects the security of the individual as no one should be allowed to take private and sensitive data without the individual being aware of this. Copyrights This exclusive legal right that is given to the original artist to print, perform film, publish or record literary and authorize others to do so for heir material. This protects a physical expression of ideas , for example someone has an idea to write a book the content that is written in that book is covered by the copyright act as it will be unique to the creator. You do not need to register or claim copyright, this protection is automatic as soon as it is created. If someone steals information or wrongly sells other work or creation for their own financial benefit then this copy right act will protect the original creator and he can claim back the money that has been gained by the person who has taken the material without permission. This protects security and the use of private data as it does not allow anyone to take data or material without the author permission, if this does happen the user who has taken this material can be fined and prosecuted as the products does not belong to them, the author can also decide how his material has been used and if someone breaks his restriction they can also be prosecuted. Open SourceÂ This is software or material that is available with the source, this allows users to copy the material and modify the material, the reason for this is because the creators would believe that if someone can edit the material for themselves it will be more useful to another persona and will also allow less problems to occur if the source is available, so organisation believe that it should not be given and source should not be shown, they usually give the compiled version this is so others cannot copy their material and modify this. Open source means that it is available to any one and they can modify it however they want, doing this will improve the security for a material such as software as this source code has been given to the users it will be less likely that someone would want to hack it and modify the code as it is already available. This does have some restrictions as it would like to preserve the name and authors of the material. FreewareÂ This is software that is offered free of charge and is downloadable off the internet, freeware is different to shareware as shareware would require payment. Even though freeware is available it does have a license this would have restriction as some freeware would not want the user to alter the program, repackage it or sell the freeware, redistribution is allowed of freeware but cannot be distributed for money purposes. The creators want to ive something to the community but want to retain control of any future development of the software, this allows users to have the material without making changes and is free to the users, this makes there coding private and cannot be used however as it is free hackers would not bother to steal or resell this type of material as anyone can get it online for free, this makes the software more secure as there is no risk as it does not hold any value. SharewareÂ This usually is software that is distributed, this allows users to use the product and then pay for the product after the trial version has finished, you can then only continue to use the full version if you feel like the product is good to use but will have to pay to get the full version, the user will then be covered for registration and then support for the software if they purchase, once purchased additional features are usually given as only who pay can have these. This is been protected under copyright, even though you are able to use this software without payment you are still restricted to what you are allowed to do with it which is selling this software or adding it to another. This allows users to use expensive and powerful software for free and a short period of time however will later need to pay as the trial reaches to its end. This relates to security and privacy as the creators do not mind users having a full version for a short period as they may see as an advantage to sell their product later, copyright protects shareware as users cannot manipulate or sell their product. Commercial Software This is a software that is designed for sale to meet a commercial need for a user, this type of software is only allowed to be used for commercial purposes, this is software that you would usually see in the retailers in a physical box and requires payment before it can be used, commercial software usually contain a registration key and when you purchase this you will acquire a licence to use it. You are still able to download commercial software and this can be often seen in sharewares. These are usually made available directly from the organisation website. This relates to security and privacy of data as the user has to purchase the software before they can use it as they will not receive a registration key not allowing them to use the software, this does make it a security risk as hackers will try to steal a registration key but the copyright act protects the organisation and can prosecute the hacker for stealing data from the organisation.
Attributes of entrepreneur Essay
Confidence positive thlnklng is a major step In the direction of success 5. Positive thinker entrepreneur are positive thinkers. Wealth does not always come to the most intelligent or the most ambitious individuals. Patience -when one owns who his business, there will be times when feels like the roof of craving-in. 7. Decisiveness one should go with his intuition and trust that he is doing the right thing 8. Experience component for growth as a key 9. Information seeking entrepreneur should seek information with client and competitors, seek advice.
10. Perseverance must be willing to persevere during rough times 11. Drive needs to be totally committed 12. Risk taking prefer tasks, which provide them some challenges 13.
Innovation creative, they do things in new and different ways 14. Opportunity-seeking readily identifies opportunities for going into or to improve his business 15. Demand for efficiency and quality entrepreneur always strives to find ways to do things better, faster and at a lower cost 16. Systematic planning and monitoring introduces some system in achlevlng his goals by breaking this goal Into short term and long term goals 11. Persuasion and networking easy establishes a network or personal and business contacts around them
Write something about yourself. No need to be fancy, just an overview.