Mark scheme answers

Cards (37)

  • Cost impacts of keeping data secure
    Software for logical protect must be bought
    hardware for physical protection must be bought
    training staff to handle data securely and use software correctly
    security increase to comply with legislation
  • advantages of graphic information style
    More effective than text
    Makes website more appealing
    Can be uploaded or downloaded
    Stored in a high resolution
    Gives customers idea of what product is
  • Tiered levels of access
    Only accessible to staff who need access as part of their role.
    Limited the number of staff who have access
  • Passwords
    Strong passwords made so it can slow down unauthorised access to data and devices
  • Encryption
    scramble data such as financial account data and cant be read without the key to decrypt
  • Anti-Virus
    detect a virus trying to enter the system and quarantines/removes the virus
  • Customers input their payment details.
    Identify the information classification in which these payment details would be included. (3 options)
    Private/sensitive/confidential
  • Explain reasons why companies would use a trend and pattern identification data analysis tool to analyse its sales.
    identify most popular/unpopular product
    chart the sales over a given time scale
  • Explain some actions that should be taken by a company, to comply with the PECR regulation
    Only contact customers if box has been ticked, don't contact customers if box hasn't
    Use only the methods that have been selected by that customer
    Display company telephone number if contacting customer by phone
    Cookies are set on website explaining what they will do and why
  • Describe two benefits to an organisation of using Green IT.
    • Better brand image --> more customers due to people being more environmentally aware
    • Reduce energy costs by turning computer equipment off when not in use
  • Advantages to an organisation of using social media for promotion
    Increased online presence.
    Increased contact with customer.
    Updates to products can be shared on the page.
    Good comments left by customers can be seen by a wide audience.
    Customers can post pictures of products that have been delivered.
    People can like and share posts increasing number of people who can see them
  • Disadvantages to organisations of using social media for promotion
    Hiring social media manager costs money.
    Page needs to be monitored and maintained.
    Trolling/ cyber bullying victim.
    Negative comments/posts will be seen very quickly.
    Posts may be altered to become negative.
  • Identify the stages of data analysis
    1. identify the need
    2. identify the scope
    3. Identify potential sources
    4. Source and select information
    5. Process and analyse data
    6. Record and store information
    7. Share results
  • Describe the benefits to a company of using a contact management system.
    Customers details are stored and can be edited
    Searches can be carried out on a specific criteria
  • Describe the limitations to a company of using a contact management system.
    Customer data can be lost if theres no back-up
    Data must be correctly inputted
    DPA must be considered as holding personal details
  • Explain why a company should have a disaster recovery policy relating to its contact management system.
    A principle of the DPA: Personal details must be kept secure, having a recovery plan will ensure the details are safe in case of any theft/unauthorised access.
  • Keypads/locks
    Put on rooms so only people with correct codes can access hardware inside
  • Biometrics
    Scans are taken of a characteristic example which are matched to the records of authorised users, a match enables access.
  • Off-site backups
    Provides a copy of the data at the point of back-up so data can be restored
  • Equipment stored above ground level
    So equipment is out of reach of water and not damaged so businesses can keep operating
  • Types of physical protection methods to reduce risk of a disaster occurring to the contact management system
    Keypads/locks
    Biometrics
    Off-site backups
    Equipment stored above ground level
  • Advantages of animated graphics
    Show processes
    Easier to understand than reading text
    All ages can watch it
    Foreign people can understand
  • Compare the rights of individuals relating to the access to information under the Data Protection Act and the Freedom of Information Act.
    Information about a data subject relates to the DPA but Freedom of information relates to information about a public authority.
    Only the data subject can request information about themselves anyone can apply for information about a public body
  • Discuss the consequences to the teams and the people who live in the disaster area if the information about the natural disaster is of poor quality
    • Incorrect equipment and disaster aid supplies taken
    • Incorrect details about number of people affected may mean that not enough supplies will have been taken to disaster area
    • The location of the disaster may have been reported incorrectly
    • Incorrect specialisms may have been included in the team
    • Extra teams / equipment / supplies may have to be sent to area, so relief may be delayed
  • Advantage of handheld devices
    Light, portable and pocketable
    No attached to power source as it runs off battery power
    Videos filmed with little disruption
    Connects to internet quick so videos can be sent fast
    Satellite phones are more robust for disaster recovery issues as no need for tower signal
  • Disadvantages of handheld devices
    Short battery life and limited opportunity to recharge
    Can be lost so videos can be lost
    easily damaged/broken so cant record
    Low resolution images so unclear to see
    low storage/memory capacity
    Unable to get a signal in area
    Weather conditions affect use of device
  • Explain what is meant when classifying information as private.
    Information that should not be available to anyone without permission from data subject which is covered by DPA/GDPR
  • Discuss how the Equality Act should be considered
    Protects staff from discrimination when going for promotion
    Staff cant be treated differently because of a protected characteristic
    IF a staff member is the best candidate they must be given promotion regardless of protected characteristics.
  • Protected characteristics relating to the equality act:
    Age
    Disability
    gender
    marriage/ civil partnership
    pregnancy/maternity
    race
    religion/belief
    Sex/sexual orientation
  • Explain one impact to a client/customer if their data is not transmitted securely
    Identity theft which results in financial loss so future financial decisions may be affected
  • Explain what is meant by the term quantitative data.
    Data that can be measured
  • Identify and describe some features that should be included on the booking website to ensure compliance with the UN Convention on the Rights of Persons with Disabilities (UNCRPD).

    Screen reader that reads text on page for people with sight problems.
    Alt Tags on images that describe the image
    Fonts able to change to be easier to read for the user
  • Explain what is meant by the term ‘reducing carbon footprint
    Reducing greenhouse gases by turning lights off
  • Limitations of Open source information systems
    More susceptible to hackers so its not secure, data may be stolen
    Security software will have to be used if payment is used
  • Advantage of using a shared area for test results
    Tests can be uploaded and downloaded very quickly
    Can be accessed from anywhere in the world at anytime
    Kept secure and only accessed by those with authorisation
    Multiple people can gain access at once
  • Disadvantages of Shared areas
    Requires internet access or else no access
    more susceptible to unauthorised access compared to physical devices
  • Identify the global information protection scheme which would be applied to data sent from the UK to the USA.
    Safe Harbour Scheme / Privacy Shield