TESCO
11/28/2013
The Legal and Ethical Issues of Tesco Business Communication
Submitted by: Keith Louise Javier Sison Barnet and Southgate College
Submitted to: Ms. Maria Glenister
Table of Contents: The Computer Misuse Act (1990)… ……………………………………… 2
Freedom of Information Act ……………………………………... 3, 4
Data Protection Act ……………………………………………..4
Ethical Issue (Use of E-mail, Use of Internet, Whistleblowing) ………5, 6
Sponsor ……………………………………………………………. 7
Terms and Condition…………………………………………………… 8
Operational Issues ………………………………………………….. 9
Bibliography……………………………………………………………10
End ……………………………………………………………………11 1
In this coursework I will be describing the legal and ethical issues in relation to the use of business information for Tesco. Philip. Prestel became aware of this access, trapped the two men, and charged them with fraud and forgery. The men were convicted and fined, but they appealed their case.
Computer Misuse Act (1990) The Computer Misuse Act of 1990 is a law in the United Kingdom that makes certain activities illegal, such as hacking into other people’s systems, misusing software, or helping a person to gain access to protected files of someone else's computer. The act was created after the 1984-1985 R v. Gold case, which was appealed in 1988. The appeal was successful, inspiring parliament to create a law that would make punishable the behaviour committed by Robert Schifreen and Stephen Gold. It obviously could not be applied retroactively, but its goal was to discourage behaviour like theirs in the future.
The act is split into three sections and makes the following acts illegal:
Unauthorised access to computer material Unauthorised access to computer systems with intent to commit another offense Unauthorised modification of computer material
The first section in the act forbids a person to use someone else’s identification to access a computer, run a program, or obtain any data, even if no personal gain is involved in such access. Individuals also cannot change, copy, delete, or move a program. The Computer Misuse Act also outlaws any attempts to obtain someone else’s password. Obviously, if someone gives another person his identification and he may legally use the computer, these laws under unauthorized access do not apply. The second provision in the law is gaining access to a computer system in order to commit or facilitate a crime. An individual can’t use someone else’s system to send material that might be offensive or to start worms or viruses. He also can’t give someone his identification so that he can use a system for this purpose. This second part means that the individual would be facilitating someone else’s intent or crime.
What occurred to prompt the case and ultimately lead to the law was the following: Gold watched an employee of Prestel at a tradeshow enter his username and password into a computer. Gold and Schifreen then used this information from a home computer to access the system of British Telecom Prestel, and specifically to enter the private message box of Prince
2
Unauthorized modification in the Computer Misuse Act means that a person can’t delete, change, or corrupt data. Again, if someone puts a virus into someone else’s system, he would be violating the act. Usually, committing unauthorized access only is thought a crime punishable by fine. Access with intent and unauthorized modification are considered more severe and may be punished by heavy fines and/or jail time.
Freedom Information Act. (2000)
Computer Misuse Act. (1990) This act covers any public information in England, Wales and northern Island.
However, it doesn’t not necessarily cover the public information of Scotland, despite it being part of the United Kingdom, their information is help By Scottish public authorities and is covered by the Scotland’s own Freedom of Information Act (2002). The public authorities include government departments, local authorities, the NHS, state schools and police forces.
The government first published proposals for freedom of information in 1997. In the white paper Your Right to Know, the
more open government based on mutual
The Freedom of Information Act 2000 (FOIA) was introduced to foster a culture of openness in government.
trust.
It does this in two ways:
government explained that the aim was a
Public authorities spend money collected
proactively make information available
from taxpayers, and make decisions that
through publication schemes,
can significantly affect many people’s lives. Access to information helps the public
FOIA obliges public authorities to
FOIA gives the public a general right of
make public authorities accountable for
access to information held by public
their actions and allows public debate to
authorities
be better informed and more productive.
3
The Data Protection Act. (1998)
Kept for no longer than is absolutely necessary handled according to people’s data protection rights kept safe and secure not transferred outside the UK without adequate protection. There is stronger legal protection for more sensitive information, such as:
Ethnic background
Political opinions
Religious beliefs
Health
Sexual health
Criminal records
The Data Protection Act controls how your
Find out what data an organisation has
personal information is used by
about you:
organisations, businesses or the
The Data Protection Act gives you the right to find out what information the government and other organisations stores about you.
government.
Write to the organisation and ask for a copy of the information they hold about you. If you do not know whom in the organisation to write to, address your letter to the company secretary. The organisation is legally required to provide you with a copy of the information they hold about you if you request it.
Everyone who is responsible for using data has to follow strict rules called ‘data protection principles’. They must make sure the information is:
used fairly and lawfully
used for limited, specifically stated purposes
Used in a way that is adequate, relevant and not excessive accurate.
4
Ethical Issues: Use of Email
Internet:
Use of Internet Whistle Blowing
Email: The use of email in Tesco’s can be really private especially if employees might want to hack important information about the company. Email is a form of business communication, as business employees, employers and customers use it to communicate for different purposes. Emails can easily be hacked by someone who has knowledge with hacking but to prevent the person from hacking
Businesses use Internet as they
Tesco’s emails is to make sure they log
communicate to customers or they
out their accounts after using them
might be researching different
and when typing their passwords make
information for the company.
sure that no one is looking, add capital,
The reason of the use of Internet can
small letters and numbers into the
also be for the companies’ website like
password. This will keep their emails
Tesco they use Internet to update
safe and secured at all times.
their website and for also different business purposes but it can’t be used for other sites that are prohibited in the company like: Pornography, Games and other different site that are not related to the company. This could lead to some serious matters, even if you delete the history or closed the file it can always be checked, also always be kept somewhere and police will be able to track everything you have done in the past.
5
Whistle Blowing: Whistle blowing is when someone from within the company reports something bad
This happened to Tesco when they started
about their company to another person
talking about the Horse Meat scandal.
from outside the company. The concern may relate to fraud, crime, danger or any other serious risk that could impact on customers, colleagues or any other stakeholder or the organisation is reputation. Whistle-blowers may receive legal protection through the Public Interest Disclosure Act, but the offence being reported must constitute a deliberate attempt to break the law.
Horse Meat Scandal (News)
Whistle Blowing
Horse Meat Scandal
6
How does Tesco sponsor for Charities:
Help Feed People in Need. Help build a stronger neighbourhood. Generous customers helped to donate an incredible 3.5 million meals during Tesco’s National Food Collection appeal on the 5 and 6 July, the equivalent of 26,000 trolley-loads of food. This was the second National Food Collection we have held in partnership with food redistribution charity FareShare and foodbank charity The Trussell Trust.
Donations Each Tesco UK store holds a community donation budget to help local organisations with their fundraising events. Our prime focus of activity is to provide donations and sponsorship direct to charities and organisations working with children’s education and welfare, elderly people and people with disabilities. Unfortunately we are unable to sponsor events or individuals.
Cancer Research UK and F&F donated stock appeal In September F&F collaborated with Cancer Research UK to run a donated stock appeal in stores nationwide. Over 300 Extra and Superstores got involved and delivered the appeal with the support of 800 volunteers. Customers brought in their unwanted, high quality items to donate to Cancer Research UK shops and to say thank you we gave customers a £5 off voucher to be redeemed when spending £25 or more on clothing in store.
7
Why would your organisation require this following procedure? Back-up Back up the company most importantly needs back up documents for their copies or data the computer as it helps the company make transactions and makes it easier to access data rather than trying to find it because it is misplaced. Important documents if you accidentally deleted them you will never get them back that’s why you need to have copies at all times. E.g. saving it in different computer, USB,
Security Information
CD or hard drive etc.
The information held at Tesco needs to be kept safe and secure like passwords or padlocks to make sure other work colleagues do not access personal information’s or personal data. In relate to Tesco’s emails is to make sure they log out their accounts after using them and when typing their passwords make sure that no one is looking, add capital, small letters and numbers into the password. This will keep their emails safe and secured at all times.
Health and Safety Tesco want to make sure customers and work employees are working in a safe and secure environment with no hazards to slipping, E.g. Wet floors sign or not putting any items on the floor spillage which can put other people’s lives at risk, especially customers can be really sensitive when it comes to health and safety because this is important. Putting cameras, fire extinguishers, fire alarms and fire exits are important in case of emergency.
8
How does a change in technology affect a business? Tesco’s Business Plans
A change in technology helps increase sophistication because it makes it look
If the company wants to expand their
younger and helps attract people at Tesco
business or improve how it looks or hire
when they bring in new types of software
extra staff they will have to have a
suitable for all ages for example self-
business continuance plan to plan for the
check outs is an increase in technology
future and if they also want to introduce
because customers will find it easier to
new brands or products.
buy products for themselves if they are in a rush and cannot waste time being in a queue.
Improves in Technology? And more staff? Tesco needs improving in technology or operation resources they may need additional resources like updated computer systems if the old computers break down or are too slow to work with and extra staff if some employees are inexperienced.
9
Bibliography: Computer Misuse (1990) http://en.wikipedia.org/wiki/Computer_Misuse_Act_1990 Data Protection Act (1989) http://www.legislation.gov.uk/ukpga/1998/29/contents http://www.wisegeek.org/what-is-the-computer-misuse-act-of-1990.htm Freedom of Information Act (2000) http://www.legislation.gov.uk/ukpga/2000/36/contents Ethical Issues http://www.wisegeek.com/what-is-the-data-protection-act.htm#didyouknowout http://teachingwithcrump.weebly.com/p5---legal-and-ethical-issues-relating-tobusiness-information.html http://www.tescoplc.com/media/126222/code_of_business_conduct.pdf http://www.tescocorp.com/data/1/rec_docs/562_TESCO%20Code%20of%20Conduct. Final.08.05.19.pdf http://www.tescocorp.com/data/1/rec_docs/562_TESCO%20Code%20of%20Conduct. Final.08.05.19.pdf Sponsor of Tesco http://www.tescoplc.com/index.asp?pageid=120
10