Business Level 3

Business Level 3

  • Submitted By: Kelly97
  • Date Submitted: 05/04/2015 3:02 AM
  • Category: Business
  • Words: 903
  • Page: 4

M2: Analyse the legal, ethical and operational issues in relation to the use of business information using appropriate examples



This task consists of analysing legal, ethical and operational issues related to the use of business information using various examples. This report also requires me to consider the advantages and disadvantages of legal, ethical and operational issues that SFX may need to consider in their use of business information.



The relevant acts were designed to control the use business information through various provisions. These provisions ensure that personal information held by the organisation is protected. SFX has information on students which are obtained fairly and legally in accordance with the Data Protection Act 1998. This act also states that information obtained should be up to date and accurate. If information is inaccurate, it should be corrected as soon as possible. If SFX do not amend this error, it can become liable to prosecution. It is unethical and unlawful to create, save and share incorrect information that violates the provisions of the Data Protection Act 1998.



Businesses must ensure that all business information is protected from being misused by anyone who has/can gain access to the information. The Data Protection Act states that businesses must have a secure storage area for information obtained by the business such as transactions, personal details of staff, bank account details and any other information that is relevant to the business. In the same way, businesses must ensure as part of operational issues the information generated through business transactions are secured from being hacked into. Using SFX as an example, the bank details of staff or college accounts should be protected from fraudsters. All these types of information relating to transactions of activity should be secured in a backup facility that ensures the information is safe so that any unauthorised intrusion can be...

Similar Essays