Professional Documents
Culture Documents
List 10 issues in above title, and each title need to have at least 5 support issue and
answer in paragraph.
IT security use - from security, they tend to break into systems and access
important personal information or gain system malicious network attacks
internal control system.
Data security - to ensure data integrity when critical issues arise, such as
natural disasters, general data, computer / server failure, physical theft of
offsite backup to save such a problem.
Maintain and ensure the accuracy and consistency throughout their life cycle
data.
Ensure computing system to protect it, and for access security control its
communication channels, work all the time, so that is available in all cases
information.
Ensure that once the transaction occurs, neither party can deny it, the
transaction is either received or transaction has been sent. This is called
"non-repudiation."
Accept decisions that are consistent with the safety, health and well-being of
the public and promptly disclose information that may endanger public or
environmental factors;
In order to avoid conflicts of interest as real or imagined as possible, and to
disclose them to the affected parties when they exist;
In order to maintain and improve our technical capabilities, and only when
the training or experience, qualified for others to bear the task, or fully
disclose the relevant restrictions;
Seek, accept and provide technical work honestly critical of, acknowledge
and correct errors, and properly credit the contributions of others;
Race, religion, sex, disability, age or nationality in order to treat all persons
equitably, irrespective of other factors;