logo

Ethical and Legal Compliance Requirements for Computer Usage

This assessment is a final exam for the Business Computing course, where students are required to demonstrate their competency in using Microsoft Office suite by completing tasks related to MS Word, MS Excel, MS Access, and MS Power Point.

8 Pages1368 Words70 Views
   

Added on  2022-11-03

About This Document

This document discusses the ethical and legal compliance requirements for computer usage. It also covers security risks, tools, and health issues related to computer usage.

Ethical and Legal Compliance Requirements for Computer Usage

This assessment is a final exam for the Business Computing course, where students are required to demonstrate their competency in using Microsoft Office suite by completing tasks related to MS Word, MS Excel, MS Access, and MS Power Point.

   Added on 2022-11-03

ShareRelated Documents
Running head: CX555001: BUSINESS COMPUTING
CX555001: BUSINESS COMPUTING
Name of the Student
Name of the University
Authors note
Ethical and Legal Compliance Requirements for Computer Usage_1
CX555001: BUSINESS COMPUTING
1
Table of Contents
Introduction................................................................................................................................2
Ethical and legal compliance requirements for computer usage................................................2
Security......................................................................................................................................3
Risks...........................................................................................................................3
Tools...........................................................................................................................4
Health issues...............................................................................................................................5
Conclusion..................................................................................................................................6
References..................................................................................................................................7
Ethical and Legal Compliance Requirements for Computer Usage_2
CX555001: BUSINESS COMPUTING
2
Introduction
In the present digital age most of the people stores their personal data in computers
which are spread all over the digital world. Data which are thought to be secure behind the
firewalls and other security mechanisms, authentication process such as private accounts or
email can be accessed by unintended users and can be exposed publically. In the
organizations employers vigorously tracks their employee’s computer usage.
Ethical and legal compliance requirements for computer usage
While using the computers and different applications and resources that have
copyrights by their owners, the users have to comply with the different regulations.
Therefore the users of the computers should not distribute copies of the work in public
exposure or sale, transfer without the consent of the owner in any from lease, rental and free
lending platform. This right ownership also applicable to individual images or any kind of
audio visual work. For software applications, there are exceptions in this rule that permits
evasion. In this case development of technological under such circumvention means that any
user who has lawfully obtained some copy of an application with the main purpose of
identifying and analyzing elements of the program (Bernstein, 2015). This analysis can be
necessary in order to find out the interoperability with other relevant applications and
integration with those applications. For this extent these acts are permitted under copyright
law of the Digital Milennium Copyright Act.
Another issues is with the software piracy or the Industrial copyright protection.
Software applications can be defined as numerous set of instructions which instructs the
computer to generate and produce the desired result from a specific set of instructions.
Presently the common methods that is used for software piracy can be listed as the
Ethical and Legal Compliance Requirements for Computer Usage_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Digital Piracy: Meaning, Impacts, and Feasibility of Traditional Approaches
|12
|3697
|74

Abolition of Legal Restrictions on Downloading Media from the Internet
|9
|2870
|261

Computer Crime and Digital Forensic : Report
|15
|3299
|123

Assignment on IT Ethics Doc
|6
|1346
|96

Network Management Methodology
|6
|1550
|84

Copyright Amendment Act 2006 - LAWS5206 - Assignment
|5
|960
|57