Kamko 12

FRAUD

•The other area of ilegal information processing is a premeditated or conscious effort to defraud the system.
•Any ilegal entry into a computer system for the purpose of personal gain is considered fraud.
•Over 50% of all computer frauds are internal; that is, they are committed by employee.
The privacy of personal information
•Prinsip: 1) People should be made aware that data are being collected about them and made aware of how these data are to be used.
•Prinsip: 2) A person should be permitted to inspect his or her personal data and information.
•Prinsip: 3) A person should be permitted to supplement of clarify personal data and information.
•Prinsip: 4) data and information found erroneous or irrelevant must be removed.
•Prinsip: 5) disclosure of personal information should be limited to those with a need to know.
•Prinsip: 6) A log should be maintained of all people inspecting any individual’s personal information.
•Prinsip: 7) Adequate safeguards must be in place to ensure the security of personal data and information [contoh: locked doors, passwords].

Author: rasp

Saya adalah pejuang, pekerja informatics ipos, mujahid fi sabil lillaah, hamba Allah SWT.

Tinggalkan Balasan

Alamat email Anda tidak akan dipublikasikan. Ruas yang wajib ditandai *