2 Understand what is meant by professional practice
1. Understand what is meant by professional practice
Data protection act
The Data Protection Act 1998 (DPA) isan Act of Parliamentof the United
Kingdom of GreatBritain and Northern Ireland which definesUK law on the
processing of data on identifiable living people. It is the main piece of
legislation that governsthe protection of personaldata in the UK.
The data protection act controls how personalinformation about you or an
individual is used by –
Businesses
Organisations
The government
Every one using data has strict guidelines to follow and has to ensurethat the
information is used –
Fairly
Lawfully
For specific stated purposes in a limited capacity
Kept safe and secure
Only for as long as necessary
Accurate
Within the persons data protection rights
Not transferred out side of the uk without necessary protection
Computer misuse act
The Computer Misuse Act 1990 isa law passed by the British government. It
wasintroduced to try to fightthe growing threatof hackersand hacking. The
law has three parts. In the U.K., it is now a crime to. Access a computer without
permission
2. Offence 1
A person is guilty of an offence if:
1. They cause a computer to perform functions with intentions to secure
or access to any programor data held in a computer
2. The access they intend to secureis unauthorized
3. They know at the time when they causethe computer to perform the
function that is the case.
The intent a person has to commit any offenceunder this section does
not need to be directed
1. Any particular programor data
2. A programor data of any particular kind
3. A programor data held in any particular computer
Any person(s) guilty of an offenceunder this section shallbe liable to a
summary conviction to imprisonmentfor a term of six months or a fine
or both.
Offence 2
2. An unauthorised access with intent to commit or bring about of
further offences.
A person is guilty of an offence under this section if he/she commits an
offence under section 1 above("the unauthorized access offence") with
intent
1. To commit an offence to which this section applies
2. To facilitate the commission of such an offence (whether by them self
or by any other person) and the offence they intend to commit or
facilitate is referred to below in as a further offence.
This section applies to offences
1. For which the sentence is fixed by law
2. For which a person of twenty one years of age or over (not previously
convicted) may be sentenced to imprisonmentfor a term of five years.
3. Itis immaterial for the purposes of this section whether or not a further
offence is going to be committed on the same occasion as the
unauthorised access offenceor on any future occasion.
A person guilty of an offenceunder this section shall be liable to
1. A summary conviction, to imprisonmentfor a term not exceeding six
months
2. on conviction to imprisonmentfor a term not exceeding five years, or
to a fine, or both.
Offence 3
3. Unauthorised modification of computer material.
A person is guilty of an offence if
1. he/she does any act which causes the unauthorized modification of
the contents of any computer
2. At the time when he does the act he has the requisite intent and the
requisite knowledge.
For the purposes of above, the intent to cause a modification of the
contents of any computer and by so doing:
1. impairs the operation of any computer
2. prevents or hinders access to programs or data held in any computer
3. To impair the operations of any such program or the reliability of any
such data
The intent need doesn’tneed to be directed at
1. Any particular computer
2. Any programor data or a program of any particular kind
3. Any particular modification
The computer misuseact was designed to protect users from wilfully made
attacks and theft of personalinformation (if you think, today what type of
information you haveavailable on mostcomputers/smartphones, so for an
example imagine identity theft)
4. Personnelinformation such as –
Email addresses
Home addresses
Family members
Bank accountinformation including financial access
Pin numbers and passwords
Photographs
Any of this information gained illegally through a computer would constitute as
computer misuseand outsideof defined guidelines of the data protection act.
Those annoy calls you get aboutPPI claims from various companies have
probably gained your information through another party without your consent
which may well be outside of the guide lines stated for your data protection.
Quality management and systems
Description - Quality control(QC) is a procedureor set of procedures
intended to ensurethat a productor serviceadheres to a defined set of
quality criteria or meets the requirements of the client or customer
A quality management system (QMS) is a collection of business
processes focused on achieving quality policy and quality objectives to
meet customer requirements. Itis expressed as the organised structure,
policies, procedures, processes and resourcesneeded to implement
quality management.
Think of a new apple iPhone, the process it takes to make it and test it, this
would include whatthey want it to do such as -
Battery life
Storagecapacity
Compatibility with other apple devices such as speakers (etc.)
Blue tooth pairing
Sending and receiving messages/phonecalls
Camera definitions and pixels
Accessibility
User friendly capability
Languagemodes
5. These could be listed off as quality controlmeasures but hey would have to be
managed and havestandardised testing in order for them to be effective with
in the systems thatthey operate on.
Now that is one productand would have to come with guidelines for use (how
it operates what you can and can`tdo with it) and a manufactures warranty
(like a car) so if in the event it does stop working or functioning they way It
should it can be replaced or fixed after find out the underlying problem as to
easily useby the products target.
Management systemstandards provide models to follow when setting up and
operating a management system. Like all standards, they are the resultof trial
and error and is therefore able to offer and benefit management experience
and good practice. These standards can be applied to any organisation, largeor
small, whatever the productor serviceand regardless of the sector.
The benefits of an effective management system include:
•more efficient useof resources
•improved risk management
•increased customer satisfaction as services and products consistently deliver
what they promise.
Think of buying a car, you want it to turn over when you turn the ignition and
drive away, seats steering wheel and all that was promised in the car when you
bought it you wantto work this would be wherequality management makes
sureit does what it needs to. This is also applied in systems development trial
and error making it work better than it previously did before being put to use.
Identifying professional bodiesfor IT UK
British Computer Society (BCS)
Institution of Engineering and Technology (IET)
UK ITAssociation (UKITA)
UKITA represents ITSMEs throughoutthe UK and is part of the wider
network in Europe.
6. Association of Computer Professionals - the Association of Computer
Professionals (ACP) is an independent, professionalexamining body, set
up in 1984, its Council Members working in both the education and
commercial sectors of the computer industry.
British Computer Society/Chartered Institutefor IT - The British
Computer Society, formed in 1957, is a registered charity which was
incorporated by RoyalCharter in 1984. Itaims to promote the study of
communication and computing technology, and to advance
understanding and education of the ICTin modern society.
ISACA - As an independent, non-profit, globalassociation, ISACA
engages in the development, adoption and use of globally accepted,
industry-leading knowledgeand practices for information systems.
Members and benefits
ITP is an example of a company that offers benefits to the below listed
members, benefits are offered to corporateand individual members such a
students and apprentices.
Benefits for corporatemembership include-
Providing leadership and guidance
All PR and media related opportunities
Invitations to apprentice schemes
Easier access to telecoms markets in Europe
Help with professionalregistration for employees
Promotion of products through advertising
Event management at strategic and important locations allowing
opportunities to invite key people
Invitations to senior level meetings allowing you to network with like-
minded people in a social environment
The opportunity to attend key seminars and address key topics
7. ITP members work for over 200 differentorganisation across the
industry and across the UK, Europe and worldwide. The ITP has
members from the following organisations.
3 IExpE PTC
3M
Informa Telecoms &
Media
Radiant Networks
Accenture
Institution of Civil
Engineering Surveyors
Red Bee Media
ADC Krone Intellect Red.es
Adva Optical Networking Interface Components SAS UK
Alcatel-Lucent
Interoute
Communications Ltd
Saudi Data
Alternative Networks Limited Investec Schmid Telecom
Amino Communication Invomo Scottish Enterprise
Amobee Iona
Securities & Investment
Institute
AOL UK ITV plc Share Witness
Apprenticeship Ambassadors
Network
JDSU UK Ltd
Siemens Enterprise
Communications
AT&T JMW Worldwide UK ltd Siemens Networks Ltd
ATL Telecom Ltd Jones Lang LaSalle
Singapore
Telecommunications Ltd
Avaya Communications Juniper Networks SIRE Technology
Azzurri Technology Ltd King's College London Sky
BAE Systems
Kingston
Communications
Sony
Bangla Trac Communications
Ltd
KPMG
Spanish Association of
Telecommunication
Engineers
BBC Lattelecom Ltd Stuffed Animals Media
BDO International Lavoisier SAS Success Networks
Broadband Stakeholder
Group
Lehman Sun Micro
Broadband Wireless
Association
Logica T-Mobile
BSkyB
London School of
Economics
TalkTalk Group
BT Group - Design, Global
Seervices, Retail, Wholesale
Lucent Technologies Tandberg
Cable & Wireless
Mainzer Singakademie
e.V.
Tata Consultancy Services
Capgemini Manchester University tdl advies
8. Carphone Warehouse
Services Ltd.
MCI Tech Mahindra
Cegos
Medical Research
Council
Telcordia International
CES Telecom Ltd Medlock Group Telecoms Markets
Ciena Mentor Europe Telefonica 02 Europe Plc
Cisco Systems
Mentoring and
Befriending Foundation
Telekom Austria
Cochrane Associates Merrill Lynch Telenor Nordic
Colt Telecom Group plc Ministry of Defense Telent
Comms Business MLL Telecom TeliaSonera
Compuware Mobile Express Limited Tellabs
Comtec
Modular Networks
Solutions
Telstra
Detica Motorola
The Network Operations
Centre
Deutsche Telekom AG NEC The Royal School of Signals
Disney News International Thomson
e-skills UK NHS Thus
ECI Telecom
Nokia Siemens
Networks UK Limited
Timico
EDS Nomura International Plc Tiscali UK Ltd
Eircom Nortel Toshiba
Engineering Council Nova Incepta Total Telecom
Enterprise and Regulatory
Reform
NTL:Telewest TP/S
Enterprise plc O2 UK Trackdale
Ericsson Ofcom TS Technology Services
Ernst & Young Opal Telecom University College London
ETC Open University University of Antwerp
FDF Openwave Systems University of Bath
Fibernet Oracle University of Patras
FirstCapital Orange
University of Southern
California
Flag Telecom OTE SA University of Valladolid
France Telecom
Otto Harrassowitz
GmbH & Co. KG
Valuestream Consulting Ltd
Fujitsu Telecommunications
Europe
Ovum Vanco Direct
Gamma Telecom P&T Luxembourg Verizon
Ghent University - IBBT Parsons Viatel
Global Crossing (UK)
Telecommunications Ltd
Patni Virgin Media
Global Telecoms Business PFJ Vocel
9. Google
Pirelli Telecom Cables &
Systems UK
Vodafone Group
Grant Thornton International Plantronics Vonage
Greenwoods
Communications
pod3.tv Ltd VQ Centre
Grosvenor Group
Polish
Telecommunication
Engineers
VTL UK Ltd
Hellenic Telecommunications Porta Systems Ltd Warid Telecommunication
Hewlett Packard Prenax Ltd Warwickshire College
Hongkong Telecom Presswire
Welsh Assembly
Government
Hutchinson Europe Procera Networks Westell
Hutchison 3 Provide Consulting Wrekin
IBA International Proxim
IET PS Wines