Please enable JavaScript.
Coggle requires JavaScript to display documents.
LO1 knowledge organiser - Coggle Diagram
LO1 knowledge organiser
-
confidentiality protocol
confidentiality protocols are set procedures that are in place to maintain the confidential documents and data by limited who sees them and protecting it from people who don't need to access them
-
-
-
-
-
checking protocols
-
-
Businesses need to ensure they have processes in place to check documents before they are released to the public to protect the image of business/legislation/company brand. Documents need to be checked for:
-
-
-
IT security protocols
-
-
computer misuse act
The Computer Misuse Act 1990 is a piece of law that deals specifically with the crime of accessing or modifying data stored on a computer system without being authorised to do so.
-