Copyright - The legal protection afforded an expression of an idea, such as a song, video game and some proprietary documents.
Fair-Use doctrine In certain situations, it is legal to use copyrighted material.
Pirated software- The unauthorised use, duplication, distribution or sale of copyrighted software.
Counterfeit software - Software that is manufactured to look like the real thing and sold as such.
Describe a situation involving technology that is ethical but illegal.
You make two copies of a software pacage your purchased and sell a copy to your friend. It is ethical that the software was purchased but illegal where it was copied and sold to a friend.
Describe and explain one of the computer use policies that a company might employee.
A company might employee the ethical computer policy which contains the general priciples to guide computer user behaviour .It follows by:
What are the 5 main technology security risks?
- Human error
- Natual disasters
- Technical failures
- Deliberate acts
- Management failure
Outline one way to reduce each risk.
- Human error : adequate training
- Natural disasters : regular back up procedures
- Technical failures :regular back up procedures
- Deliberate acts: passwords ,security & firewalls
- Management failure: system audits
What is a disaster recovery plan, what strategies might a firm employee?
A disaster recovery plan is the process of regaining access to computer systems and data after a disaster has taken place. The plan includes things like a communication plan, alternative sites, business continuity and location of back up data.
Click here to see Week 5 Slides:
No comments:
Post a Comment