Monday, January 27, 2020

Data Security Policy Analysis

Data Security Policy Analysis Dylan Mc Grath   The reason for having a policy: The reason for having the policy is so that the workers at ACME LEARNING Ltd know what to do when they are assessing the personal data of the customers and how they will use the data. A Brief explanation of the companys obligations under the law: There is one main legislation which the company has to obligate by it is called the Data Protection Act 1998 which was also amended in 2003. It was created for when personal details are given to a company they have to keep the details and they cannot be given to anyone outside of the company. Every person who has given their details to the company can request a copy of their information that the company has. The company must send the person their details within 40 days. They can also have their name removed from any marketing list. They could also make a complaint to the data commissioner if the company is not adhering to the Protection Acts rules. A person can claim compensation if they suffer when the company uses their data in a wrong way. Who is effected by how the company uses and stores data? The people that are effected by this are: Teachers and Staff who work for ACME LEARNING Ltd Management Students The Data that is stored about them is: Credit Card/ Bank Details Birth Dates Contact details Name Address Email Gender PPS Numbers Suppliers information Why the data is used by ACME LEARNING Ltd: For advertising and marketing purposes. To have a database of a persons information. For payroll and pension administration To make the names and addresses of people are correct. To stop fraud and money laundering For record keeping What Specific Threats does AMCEs data have? Malware: Malware is software that can harm a computer and can slow down performance. Hacking: Getting into a computer authorized or unauthorized without wanting to cause any damage. Weather Conditons and Fires: data can lost by storms, earthquakes and floods.   Fires can also be started by accident when the server room is too hot. When these weather conditions and fires happen the server rooms can be completely destroyed. Adware: Software that can monitor the users online activities so that the person can be targeted by advertisements. Disgruntled employees Spyware Accidents Theft Human Error Copying data onto storage devices. Trojans Roles and Responsibilities: Data Controller ACME LEARNING Ltd must appoint a Data Controller who is there to deal with the data which is about their customers on a computer and also in a filing cabinet. The Data Controller must: 1: Obtain and process the information fairly. 2: Keep it only for what is it was needed for. 3: Use it for and it should only be given out for a specified purpose. 4: It must be kept safe and secured. 5: The information must be kept up to date and correct. 6: Make sure the data is adequate, relevant and not excessive. 7: It must not be kept for any longer than it is needed for. 8: Give a copy of his/her personal data on their request. Every Employee that works for ACME LEARNING LTD has to be given training on how to use and handle the data. Rules for:1. Data storage: Data on hard drives cannot be deleted. The data has to be stored on the network drive where the I.T department can back it up when they need to. Data that is on paper has to be kept in a safe place. Data has to be protected by strong passwords. All data has to be stored on the server and data has to in a safe location. The Data Controller and only the people who need to access the data are allowed to look at it. Servers and computers that have data have to be protected by a firewall and security software. Data on CDs or DVDs has to be locked away. The servers have to have different sites in case one site goes offline. Data should not be saved on laptops or other mobile devices. There will be two different databases for both staff and students information. The data cannot be stored locally have it in a place where it can be backed up every night. Data has to be backed up every night. The usb ports on all the machines have to be disabled. Every computer in the building has to be rebooted every night at a certain time. There are two databases one for staff and the other for students information. Users have to logout of their computer to make the data stays safe. The person that looks at the data should be able to see the quantity of the data and the duplication. 2. Data use When looking at data on a computer all employees must have their computer locked when they are away from their desk. Employees cannot make a duplicate of any data on a file. When data is being transferred electronically it has to be encrypted. 3. Data accuracy: ACME Learning LTD must keep the data up to date and accurate. Data that is inaccurate should be updated to the correct data by someone that is allowed to edit the data. There are staff that are allowed to edit the data and other staff who are only allowed to read the data. 4. Data access requests: The Data Protection Act lets a person find out if ACME LEARNING Ltd has any information that relates to them. The person has to either fill out a form or write a letter to the company asking for their information. The person has to include identification so that the company knows that they are giving the data to the right person. The person is entitled to: A copy of the data. A description of the use for which it is held. A description of those to whom the data may be shown to. The source of the data. The person may have to pay a fee to access their information which cannot exceed â‚ ¬6.35. The person has to be contacted within 40 days with their data or be told that the company does not have any data about them. 5. Data Disposal: ACME LEARENING LTD will keep the data it has for employees for seven years only if it is financial. ACME LEARENING will keep the students data for three years. If a student has ticked a box to say that they want ACME LEARENING LTD to keep their exam results then ACME LEARENING LTD has to keep the students exam results for a certain number of years. If data is on paper it has to be thrown into a waste bin. It must also be recycled. The paper can also be shredded so that the data on the paper will be destroyed. An incinerator can be used to burn the paper to destroy it so no one can recover any of the data on the sheets. Hard Drive Disposal: At the time the hard drives need replacing an employee must carry out the procedures that need to be done. The procedures are to overwrite a hard drive, get the hard drive destroyed by paying a company that deals with destroying hard drives the right way so that the data is safe from being seen by a person that wants to use it for gaining money. The hard drive can also be degaussed. This removes all the data from the hard drive. Degaussing destroys the magnetic fields on the hard drive. It completely makes the hard drive in tiny pieces so that it cannot ever be used again. Overwriting the data using a program puts binary numbers onto the hard drive. It should be done at least three times to be successful. Tape Media Disposal: The data on the tapes can be overwritten. They can also be incinerated this method will completely destroy the tape. This method will pollute the air.   The data on the tapes can be degaussed. The company can get someone to come in and do it to witness that the tape has been degaussed properly.

Sunday, January 19, 2020

Type :: essays research papers

We are well accustomed to the written word as a primary method of communication in our culture. Its primary elements, the characters of the modern alphabet, were once quite literal symbols of everyday objects which were gradually abstracted to the letters of the alphabet. While cave paintings, dating as far back as 20,000 B.C. are the first evidence of recorded pictures, true written communication is thought to have been developed some 17,000 years later by the Summerians, around 3500 B.C. They are known to have recorded stories and preserved records using simple drawings of everyday objects, called pictograms. As civilizations become more advanced, they experienced the need to communicate more complex concepts. Around 3100 B.C., Egyptian hieroglyphics incorporated symbols representing thoughts or ideas, called ideograms, allowing for the expression of more abstract concepts than the more literal pictograms. A symbol for an ox could mean food, for example, or the symbol of a setting sun combined with the symbol for a man could communicate old age or death. By 1600 B.C., the Phoenicians had developed symbols for spoken sounds, called phonograms. For example, their symbol for ox, which they called aleph, was used to represent the spoken sound â€Å"A† and beth, their symbol for house, represented the sound â€Å"B†. In addition to sounds, phonograms could also represent words. Today, our own alphabet contains many such phonograms: % for percent, ? for question, and $ for dollars. It is the Phoenicians who are generally credited with developing the first true alphabet— a set of symbols representing spoken sounds, that could be combined to represent spoken language. They traded with many cultures, spreading their alphabet throughout the Western world. Around 1,000 B.C., the Phoenician alphabet was adapted by the Greeks, who developed the art of handwriting in several styles. The word â€Å"alphabet† comes from the first two Greek letters alpha and beta. Several hundred years later, the Romans used the Greek alphabet as the basis for the uppercase alphabet that we know today. They refined the art of handwriting, fashioning several distinctive styles of lettering which they used for different purposes. They scribed a rigid, formal script for important manuscripts and official documents and a quicker, more informal style for letters and routine types of writing. By A.D. 100, the Romans had developed a fast growing book industry and, as Roman handwriting continued to evolve, lower case letters and rough forms of punctuation were gradually added.

Saturday, January 11, 2020

My task is to create a music video that hasn’t been released on the general market

My task is to create a music video that hasn't been released on the general market. This will be done in a group of four consisting of Courtney, Lisa, Tamica and myself. We need to all decide on what song we are going to produce which is no longer than five minutes long. We need to write a narrative synopsis, this will show how the song relates to the images. Also we will need a detailed storyboard because it will help us out on how to shoot the scenes. We all need to decide on locations, props, costumes, castings and soundtracks that we are going to use in our music video. We must do all arrangements in good time management. The song is called ‘separated' and is singed by an artist called Usher Raymond. It's a song sang by usher to his girl. The academic bit, this is done by analyzing our video and see if the genre and conventions plus how media language fits the music video. In this video I will need to contribute in my role as a lead singer Usher, and also help out in planning plus research with the group, give ideas on locations and to be on time on deadlines. In our group everyone needs to know what they're doing and help out on props, costumes and be on time and know their part. My group and I have chosen the solo artist Usher Raymond because we like the lyrics he uses in the song; it's very different from other songs. Also his lyrics can be formed in to images for our music video â€Å"separated†. Usher Raymond was born on the 14th October 1978 in Chattanooga. He is a young R&B singer. Usher is one of the few who can boast of real star quality. He performed at the American Music Awards as part of the all-star recording collaboration Black Men United. The first single to be taken from the album, â€Å"You Make Me Wanna†, was typical of the smooth ballads on offer. Usher was more successful in the UK, where the single debuted at number 2 in February 2001. He returned to the top of the US charts in July with â€Å"U Remind Me†, which premiered the transatlantic hit album 8701. The single â€Å"U Got It Bad† also reached the number 1 position in 2002. We will be using varies of techniques to make this video so that it fits it conventions and also genre. Using similar filming techniques like camera angles will do this and lighting effects also the location of shots need to be accurate would help a lot. In order to make this music video a success we must use certain skills of marketing techniques. The music video needs to be marketed well. This means we need know what customers to target. We need to brand our music video so it could become popular and known form it. There are many genres of music and for us to do well we need to know our genre of music inside out. We need to know what's going to be in and what props we need also how we could do stuff so that our video fits its genre. To match audience's expectation we would need the video to have conventions that follows other pop music videos. These could be fancy cars, big mansions, the high life, boy meets girl, relationship breaking up or clips of them having fun back in the days. Some of pop artists examples are puff daddy, Nelly, Sean Paul. Our music video is going to be targeted at young teenagers. We believe they are our audience for these kinds of songs, also they would find them as pop idols. We would advertise the new single on TV, radio, newspapers and Internet. The TV is because many teenagers plus adults watch it. The radio is a main advertiser for songs because many people have radios in their cars, personal stereos, work place, homes and phones. People will here the single on the radio and if they liked it they would purchase it. Also playing music on the radio would give us a wider range of audiences and may boost our sales up. My group and I have chosen the solo artist Usher Raymond because we like the lyrics he uses in the song; also his lyrics can be formed in to images for our music video â€Å"separated†. Usher Raymond was born on the 14th October 1978 in Chattanooga. He is a young R&B singer. Usher is one of the few who can boast of real star quality. He performed at the American Music Awards as part of the all-star recording collaboration Black Men United. The first single to be taken from the album, â€Å"You Make Me Wanna†, was typical of the smooth ballads on offer. Usher was more successful in the UK, where the single debuted at number 2 in February 2001. He returned to the top of the US charts in July with â€Å"U Remind Me†, which premiered the transatlantic hit album 8701. The single â€Å"U Got It Bad† also reached the number 1 position in 2002. We have previous marketing techniques that we have discussed and analysed so we can use these techniques to make the video a success. Some of our previous marketing techniques discussed were on how where and how to advertise our music videos and also how to target our main audiences. The channels that we have chosen to broadcast the video on We have chosen to broadcast our video on certain channels like: THE BOX – we chose this channel is because this channel is a national wide all music video channel reaching over 20 million homes in the United States giving us a wide audience. It is also available in the United Kingdom. Specializing in rock, pop, R&B, hip-hop, Latin, and country. Over 170 individual boxes are located throughout the country, which allows each area to have its own custom local play list of videos to choose from. This will be mainly targeted at the seven years old to thirty year old age groups. Also we chose the MTV main channel. The reason we chose this channels is because it is a music channel, which is on a 24-hour video music network. MTV is an advertiser-supported, basic cable service of MTV networks. We would use this channel for promoting our music. By linking the video to a wider audience we would have more sales in records. A good example is to feature another famous artist in to the song from a different genre. ‘U R L' (Usher Record Label) is going to the record label. The label is going to have a picture of usher on it this will make the video sexually attractive to female customers. This will increase the sales. In the video the artist is showing he wants to break up with his girlfriend. Tamica plays the girl featured in the video. Usher sings he wants to be separate from her. Initial ideas that we have come up with are on how to structure each scene of the video, we are going to film each sentence in the song and for the chorus we are going to play the same scene each time. In the video each scene would go along with the music. This should look good and professional. In the video every scene is going to illustrate song lyrics. This is going to be done by having each sentence of the song being represented by an object, scenery, person/s and facial expressions. Our storyboards are going to help us a lot in making the video look realistic. This is because the storyboard will help us by illustrating to us how to achieve the right look and feel of the music videos, also what camera angles we want and lighting. When editing the video we must make sure the words of the song are in the right time of the videoing. If not done correctly then the video wouldn't look very effective. In our group we have decided that I am going to be the solo artist Usher, Courtney is going to the camera woman, Lisa is going to be casting in our video and Tamica is going to be the women in the video (Usher's Girl). My role is going to be difficult but I can achieve it by rehearsing the scenes and working together as a team. I need to make my music video look as real as possible so I can feel I have achieved making my video successfully.