Preview

Btec Business Level 3 Unit 4 C3 M3

Good Essays
Open Document
Open Document
755 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Btec Business Level 3 Unit 4 C3 M3
BUSINESS COMMUNICATION C3 M2
In this task, I will be producing a report on analysing the legal, ethical and operational issues in relation to the use of business information, using appropriate examples. I will also be explaining the advantages and disadvantages of each issue in relation to the use of business information.
INFORMATION SECURITY:
The protection of information and information systems against unauthorized access or modification of information, whether in storage, processing, or transit, and against denial of service to authorized users. Information security includes those measures necessary to detect, document, and counter such threats. Information security is composed of computer security and communications security. Also called
…show more content…
Since technology is always changing nothing will be completely secure
If a user misses one single area that should be protected the whole system could be compromised
It can be extremely complicated and some users won’t understand what they are dealing with.
It can slow down productivity if the user is constantly having to enter passwords.

HEALTH & SAFETY

Regulations and procedures intended to prevent accident or injury in workplaces or public environments. Health and safety in occupation is a cross-disciplinary area dealing with protection mainly in safety, health and indeed the welfare of people engaged in employment or work. The aim of health and safety programs is to foster a safe working environment.
Advantages of Health & Safety:

healthy, happy and motivated teams increased performance and profitability can help you to obtain liability insurance on preferential terms or rates reduction in sick leave lower staff turnover peace of mind demonstrates to your clients, HSE, staff and insurer that you are effectively managing your risks a good reputation directors not in prison

Disadvantages of Health &

You May Also Find These Documents Helpful

  • Satisfactory Essays

    I am hoping you can help me and provide me with the guidance to a challenge I am coming up against.…

    • 114 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Describe the main employability, personal and communication skills required when applying for a specific job role.…

    • 598 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Spotted hyenas are nocturnal, so reduced visual abilities during nighttime have led to their flourished range of vocalisations. They have around 20 different calls which are vital to communicating within their social structure. For example, the whooping sound that travels over several kilometers can be used as an effective assembly call in cases were food or territory need defending. It can also be used to locate individuals or to recruit team members for hunting.…

    • 74 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Btec Business Unit 23 M3

    • 711 Words
    • 3 Pages

    Financial- The top reason why businesses go out of business is bad financial planning. All the cash flows in the wrong direction. Having worked through the dotcom boom and bust I have seen first hand what too big a budget in the wrong hands can do. Someone needs a firm grip on the numbers and it had better be you otherwise someone might just take a trip to a tropical island at your expense. I will be devoloping this skill by finding some volantry jobs for one or two week to gain some skills so then I should be able to run my own business.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. In computing, e-Business, and information security, it is necessary to ensure that the data, transactions, communications or documents (electronic or physical) are genuine. It is also important for authenticity to validate that both parties involved are who they claim they…

    • 4827 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    Operating in a boom means the demand for product/services will be high, this means Marks and Spencer will need to ensure they have enough stock for each week to ensure that their competitors don’t have a chance to out sell them in a certain areas e.g. clothing department. Operating in a recession means the demand for products/services will be low, this means Marks and Spencer should prepare to lose out on stores but also have the prices for certain products to decrease to a suitable price that still ensures the quality of the product is good and also affordable for customers. The only downfall of a boom is doesn’t last long before another recession…

    • 1295 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Functional areas are used in many businesses and are very effective as different areas work together to do or produce one thing. Tesco is a multinational company and also have functional areas such as:…

    • 728 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Information security includes the protection of information assets in storage, processing, or transmission. To assure the security of things such as schools, prisons, toads, and power plants, the confidentiality and integrity of information must be protected.…

    • 982 Words
    • 4 Pages
    Good Essays
  • Good Essays

    This is important as it allows people to have organisation on their device. It also helps people to see where each file is and they can locate it without any problems. It’s also important as files can be lost if they are all mixed up and can stop people from getting their work and any other files which they may need. By being able to organise the files that you need allows you access them a lot easier for example you can make folders for each subject or year, and that way you know where all your documents are. This can be done for media such as music as well, so it’s not just documents. This task is carried out by choosing the file you want to change and then right clicking and finding the ‘rename’ tab. Once…

    • 2179 Words
    • 9 Pages
    Good Essays
  • Better Essays

    M2 Unit 4

    • 1206 Words
    • 3 Pages

    M2: Analyse the legal, ethical and operational issues in relation to the use of business information and by including appropriate examples.…

    • 1206 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    P2- Describe the main employability and personal and communication skills required when applying for a specific job role.…

    • 582 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Information security is the way of ensuring information is only read, heard, changed, broadcast and otherwise used by people who have the authority to do so. It requires a range of skills and knowledge and increases in significance as our use of and reliance upon information grows.…

    • 112 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Convenience : e-commerce is very convenient for customer ,because it accepts different type of credit and debit cards and as many other forms of payment as possible . customer don’t need to go anywhere for payment ,customer can carry as many items in stock as possible to avoid backorder ,it is often convenience because the order goes hand –in –hand with in timelines to customer.…

    • 1223 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Information Security

    • 813 Words
    • 4 Pages

    Information security:is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction it has also be define as the protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users or the provision of service to unauthorized users, including those measures necessary to detect, document, and counter such threats.…

    • 813 Words
    • 4 Pages
    Good Essays
  • Good Essays

    1. It can have negative effects on your social life and interactions with other people if you do not maintain the balance between time online and offline.…

    • 1011 Words
    • 5 Pages
    Good Essays