Assignment 1 TrangLTH BC00149

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

ASSIGNMENT 1 FRONT SHEET

Qualification BTEC Level 5 HND Diploma in Computing

Unit number and title Unit 17: Business Process Support

Submission date 29/06/2024 Date Received 1st submission 29/06/2024

Re-submission Date Date Received 2nd submission

Student Name Le Thi Huyen Trang Student ID BC00149

Class SE06201 Assessor name Le Nhat Quang

Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand
that making a false declaration is a form of malpractice.

Student’s signature

Grading grid

P1 P2 P3 P4 M1 M2 D1

1
❒ Summative Feedback: ❒ Resubmission Feedback:

Grade: Assessor Signature: Date:


Internal Verifier’s Comments:

Signature & Date:

2
Table of Contents
INTRODUCTION ............................................................................................................................................................. 4
I. Discuss how data and information support business processes and the value they have for organisations. (P1) 5
II. Discuss how data is generated and the tools used to manipulate it to form meaningful data to support
business operations.(P2)............................................................................................. Error! Bookmark not defined.
III. Discuss the social legal and ethical implications of using data and information to support business
processes.(P3) ........................................................................................................................................................... 6
1. Social Implications ............................................................................................................................................ 6
2. Legal Implications ............................................................................................................................................. 6
3. Ethical Implications ........................................................................................................................................... 7
IV. Describe common threats to data and how they can be mitigated at on a personal and organisational
level.(P4) ................................................................................................................................................................... 8
1.Common Threats to Data................................................................................................................................... 8
2. Mitigation Strategies......................................................................................................................................... 8
CONCLUSION............................................................................................................................................................... 11

3
INTRODUCTION

In the modern digital era, data and information play a key role in supporting an organization's business
processes. ABC Manufacturing, a multinational company that manufactures and distributes consumer electronics,
leverages data to improve supply chain management, forecast demand, and optimize business operations.
However, using data also poses many challenges and requires facing issues of security, privacy, and legal
compliance.

This presentation will discuss how data and information support business processes and the value they bring to
the organization. We'll look at the ways organizations create and use data to support business processes, including
tools and techniques for generating meaningful data. Additionally, we will evaluate the impact and value of data
and information from previous client projects, as well as the data mechanisms and tools that can be used to
manipulate and create data.

The summary sheet accompanying the presentation details common threats to data and how to mitigate them at
the individual and organizational levels. We will discuss the social, legal and ethical implications of using data and
information to support business processes, recognizing the legal issues involved. Finally, analyzing the impacts of
using data from previous customer projects will provide insight into the broader implications of using data to
support business processes, including including the risk of not adequately protecting data.

4
CONTENS

I. PRESENT

Figure 1: SILE

5
II. DISCUSS THE SOCIAL LEGAL AND ETHICAL IMPLICATIONS OF USING DATA AND INFORMATION TO
SUPPORT BUSINESS PROCESSES.(P3)

1. Social Implications

1.1. Privacy Concerns:

Issue: As businesses collect and analyze large volumes of data, concerns about individual privacy arise.
Customers expect their personal information to be handled securely and responsibly.

Impact: Failure to protect privacy can lead to loss of customer trust, reputational damage, and
potential legal consequences. Customers may feel violated if their data is misused or exposed without
consent.

1.2. Trust and Transparency:

Issue: Maintaining trust with customers and stakeholders requires transparency in data practices. This
includes how data is collected, used, and protected.

Impact: Lack of transparency can lead to suspicion and reluctance from customers to share their data.
Transparent practices build trust and foster positive relationships with stakeholders.

1.3. Digital Divide:

Issue: Unequal access to data and technology can exacerbate existing social inequalities. Some
segments of society may lack access to the benefits of data-driven insights.

Impact: Organizations should consider inclusivity and accessibility in their data strategies to ensure
that all stakeholders can benefit equitably.

2. Legal Implications

2.1. Data Protection Laws:

Issue: Governments worldwide have enacted stringent data protection laws like GDPR (General Data
Protection Regulation) in Europe and CCPA (California Consumer Privacy Act) in California.

Impact: Businesses must comply with these laws when collecting, storing, and processing personal
data. Non-compliance can result in significant fines and legal actions, damaging the organization's
reputation and finances.

6
2.2. Intellectual Property Rights:

Issue: Data ownership and intellectual property rights can be complex, especially with data generated
or derived through innovative processes.

Impact: Organizations need clear policies and agreements to protect their data assets and intellectual
property. They must navigate ownership rights and licensing agreements carefully to avoid legal
disputes.

2.3. Consumer Rights:

Issue: Consumers have rights regarding their data, including access, correction, and deletion under
various data protection regulations.

Impact: Businesses must respect these rights and provide mechanisms for consumers to exercise
them. Failure to do so can lead to regulatory penalties and loss of consumer trust.

3. Ethical Implications

3.1. Fairness and Bias:

Issue: Data-driven decisions may unintentionally perpetuate biases present in historical data (e.g.,
demographic biases, algorithmic biases).

Impact: Biased decisions can lead to unfair outcomes for individuals or groups. Organizations must
implement measures to identify and mitigate biases in their data analysis processes to ensure fairness.

3.2. Transparency:

Issue: Transparency involves being open and honest about how data is collected, used, and shared.

Impact: Transparent practices build trust with stakeholders and enable informed decision-making by
consumers. Organizations should disclose their data practices clearly to maintain ethical standards.

3.3. Accountability:

Issue: Organizations are accountable for the consequences of their data practices, both ethically and
socially.

Impact: This includes addressing harms caused by data breaches, misuse of data, or unethical data
practices. Accountability promotes responsible behavior and trustworthiness in data handling.

7
III. DESCRIBE COMMON THREATS TO DATA AND HOW THEY CAN BE MITIGATED AT ON A PERSONAL
AND ORGANISATIONAL LEVEL.(P4)

1.Common Threats to Data

1.1. Cyber Attacks:

Description: Cyber attacks such as malware, ransomware, and phishing attempts are significant
threats. These attacks aim to exploit vulnerabilities in systems to gain unauthorized access to sensitive
data.

Impact: Data breaches can result in financial loss, reputational damage, and legal consequences for
organizations. Personal data may be stolen or held for ransom.

1.2. Data Breaches:

Description: Data breaches involve the unauthorized access, disclosure, or destruction of sensitive or
confidential information. They can occur due to hacking, social engineering, or insider threats.

Impact: Breaches can lead to identity theft, fraud, and compromised customer trust. Organizations
may face regulatory penalties and lawsuits for failing to protect data adequately.

1.3. Human Errors:

Description: Human errors such as accidental data loss, improper data disposal, or misconfigured
security settings can compromise data security.

Impact: These errors can lead to unintentional exposure of sensitive information, affecting both
individuals and organizations. Recovery and mitigation efforts can be costly and time-consuming.

1.4. Physical Loss or Theft:

Description: Physical loss or theft of devices storing sensitive data (e.g., laptops, smartphones) poses a
significant risk, especially if the devices are not encrypted or adequately secured.

Impact: Loss or theft can result in unauthorized access to data, potentially leading to data breaches
and compliance violations. It can also result in loss of intellectual property and customer trust.

2. Mitigation Strategies

2.1 Cybersecurity Awareness:

Description: Stay informed about common cyber threats and phishing tactics. Be cautious when
clicking on links or downloading attachments from unknown sources.

8
Action: Regularly update antivirus software, use strong, unique passwords, and enable two-factor
authentication (2FA) for added security.

2.2 Data Backup:

Description: Regularly back up important data to secure locations (e.g., cloud storage, external
drives).

Action: Ensure backups are encrypted and stored securely. Test data restoration processes
periodically to verify integrity.

2.3 Privacy Settings:

Description: Review and adjust privacy settings on social media platforms and online accounts to
control what information is shared publicly.

Action: Limit the amount of personal information shared online. Be cautious about sharing sensitive
details that could be used for identity theft.

2.4 Organizational Level:

Comprehensive Security Policies:

Description: Establish and enforce robust security policies and procedures covering data handling,
access control, and incident response.

Action: Conduct regular security audits and risk assessments to identify vulnerabilities and mitigate
risks proactively.

2.5 Employee Training:

Description: Educate employees about cybersecurity best practices, data protection policies, and the
importance of safeguarding sensitive information.

Action: Provide ongoing training and awareness programs to ensure all staff understand their role in
maintaining data security.

2.6 Encryption and Access Control:

Description: Implement encryption technologies to protect data both in transit and at rest. Utilize
strong access controls to limit who can access sensitive information.

Action: Regularly review and update access permissions. Use encryption protocols (e.g., TLS for data
in transit, AES for data at rest) to secure data effectively.

9
2.7. Incident Response Plan:

Description: Develop and maintain an incident response plan outlining steps to be taken in the event
of a data breach or security incident.

Action: Conduct regular drills and simulations to test the effectiveness of the plan. Ensure clear
communication channels and designated roles during a security incident.

10
CONCLUSION

Mitigating threats to data security requires a comprehensive approach at both personal and organizational
levels. Common threats such as cyber attacks, data breaches, human errors, and physical theft can have severe
consequences if not addressed properly.

At a personal level, staying informed about cybersecurity risks, regularly backing up data, and adjusting
privacy settings are essential practices. At an organizational level, implementing robust security policies, providing
employee training, using encryption and access control measures, and maintaining an incident response plan are
critical steps.

By understanding these threats and adopting effective mitigation strategies, individuals and organizations can
significantly reduce the risks associated with data security.

Prioritizing data protection and adhering to best practices ensures the integrity, confidentiality, and
availability of sensitive information, thereby safeguarding against potential threats and fostering trust with
customers and stakeholders.

11
REFERENCES

1. Data Manipulation: Definition, Importance and Tips [Online] Available at: https://www.indeed.com/career-
advice/career-development/data-manipulation [Accessed June 27, 2024].
2. The Importance of Data and Information in Business - Blog - DCODE GROUP - DCODE GROUP [Online]
Available at: https://dcodegroup.com/blog/the-importance-of-data-and-information-in-business [Accessed
June 20, 2024].

12

You might also like