You have new items in your feed. Click to view.
Question and answer
Describe requirements for security and confidentiality for/in an organisation?
Data Protection Act 1998: The Data Protection Act 1998 (DPA 1998) is an act of the United Kingdom (UK) Parliament defining the ways in which information about living people may be legally used and handled. [ The main intent is to protect individuals against misuse or abuse of information about them. The DPA was first composed in 1984 and was updated in 1998. · Copyright, Design and Patents Act
1988: The Copyright, Designs and Patents Act 1988, is the current UK copyright law. It gives the creators of literary, dramatic, musical and artistic works the right to control the ways in which their material may be used. The rights cover: Broadcast and public performance, copying, adapting, issuing, renting and lending copies to the public. In many cases, the creator will also have the right to be identified as the author and to object to distortions of his work. Read more: ]
Expert answered|lillianhoppe|Points 0|
Question
Asked 7/23/2012 5:35:13 AM
0 Answers/Comments
Get an answer
New answers
Rating

There are no new answers.

Comments

There are no comments.

Add an answer or comment
Log in or sign up first.
Questions asked by the same visitor
Decribe legal requirements for security and confidentiality, as required?
Weegy: There are many types of law that covers the security and confidentiality. [ Examples of these acts are: · Data Protection Act 1998: The Data Protection Act 1998 (DPA 1998) is an act of the United Kingdom (UK) Parliament defining the ways in which information about living people may be legally used and handled. The main intent is to protect individuals against misuse or abuse of information about them. The DPA was first composed in 1984 and was updated in 1998. · Copyright, Design and Patents Act 1988: The Copyright, Designs and Patents Act 1988, is the current UK copyright law. It gives the creators of literary, dramatic, musical and artistic works the right to control the ways in which their material may be used. The rights cover: Broadcast and public performance, copying, adapting, issuing, renting and lending copies to the public. In many cases, the creator will also have the right to be identified as the author and to object to distortions of his work. ] (More)
Question
Expert Answered
Asked 7/23/2012 6:14:08 AM
0 Answers/Comments
Describe different reasons for people visiting a business, their requirements and how their needs may be met? User: Explain the purpose of presenting a positive image of self and the organistion?
Weegy: Love it or hate it, we are living in the world of hypocrisy. The corporate and the politics world are the best example. So like it or not, wearing tuxedos and all are referred as someone smart, intelligent and poise. [ So dumb because I think what matter's is people's hearts, not how they look. Because in my experience, people with tuxedos were all hypocrites and work like stupid mice, while people with casual cloth or punksters were genuine and work well in a team. ] (More)
Question
Expert Answered
Asked 7/23/2012 6:20:48 AM
0 Answers/Comments
26,999,093 questions answered
Popular Conversations
In Crivelli's Madonna of the Swallow, aside from the Madonna and ...
Weegy: In Crivelli's Madonna of the Swallow, aside from the Madonna and the Christ Child, the major figures are Saint ...
2/19/2017 3:01:40 PM| 5 Answers
Reduce the following fraction to lowest terms: 3/8 User: Find the ...
Weegy: The greatest common factor of the numbers 28 and 42 is 4. User: Reduce the following fractions to lowest ...
2/20/2017 8:43:07 AM| 3 Answers
What is character motivation?
Weegy: Character is a pattern of behavior, thoughts and feelings based on universal principles, moral strength, and ...
2/19/2017 11:49:13 AM| 2 Answers
Which of these statements about Jean-Baptiste-Camille Corot is ...
Weegy: The American artist who used bold blocks of color, stark light, and lonely, somber settings was: Edward Hopper.. ...
2/19/2017 9:07:51 PM| 2 Answers
Solve for x: 3(x – 2) + 5(x + 4) = 5(x + 4)
2/19/2017 9:58:18 PM| 2 Answers
2 7/8 ÷ 1/4 = User: 4/3 ÷ 1/2 =
2/20/2017 9:09:55 AM| 2 Answers
Which of the following is an example of hypertext pattern ...
Weegy: "reading a webpage through the links on the page" is an example of hypertext pattern reading. User: Which ...
2/19/2017 12:05:02 AM| 1 Answers
Why are computers considered interactive? A. because communication ...
Weegy: Computers considered interactive - because they rely on the input of users. User: Which term refers to ...
2/19/2017 12:11:12 AM| 1 Answers
Weegy Stuff
S
P
P
L
Points 325 [Total 1094] Ratings 2 Comments 305 Invitations 0 Offline
S
P
P
L
P
P
Points 312 [Total 2286] Ratings 1 Comments 302 Invitations 0 Offline
S
P
P
L
P
Points 214 [Total 1428] Ratings 0 Comments 214 Invitations 0 Offline
S
Points 30 [Total 30] Ratings 3 Comments 0 Invitations 0 Offline
S
Points 12 [Total 112] Ratings 1 Comments 2 Invitations 0 Offline
S
Points 12 [Total 22] Ratings 1 Comments 2 Invitations 0 Offline
S
Points 5 [Total 5] Ratings 0 Comments 5 Invitations 0 Offline
S
Points 3 [Total 3] Ratings 0 Comments 3 Invitations 0 Offline
S
Points 2 [Total 2] Ratings 0 Comments 2 Invitations 0 Offline
S
Points 2 [Total 2] Ratings 0 Comments 2 Invitations 0 Offline
* Excludes moderators and previous
winners (Include)
Home | Contact | Blog | About | Terms | Privacy | © Purple Inc.