P5 p6 business communication

Page 1

TESCO

11/28/2013

The Legal and Ethical Issues of Tesco Business Communication

Submitted by: Keith Louise Javier Sison Barnet and Southgate College

Submitted to: Ms. Maria Glenister


Table of Contents: The Computer Misuse Act (1990)… ……………………………………… 2

Freedom of Information Act ……………………………………... 3, 4

Data Protection Act ……………………………………………..4

Ethical Issue (Use of E-mail, Use of Internet, Whistleblowing) ………5, 6

Sponsor ……………………………………………………………. 7

Terms and Condition…………………………………………………… 8

Operational Issues ………………………………………………….. 9

Bibliography……………………………………………………………10

End ……………………………………………………………………11 1


In this coursework I will be describing the legal and ethical issues in relation to the use of business information for Tesco. Philip. Prestel became aware of this access, trapped the two men, and charged them with fraud and forgery. The men were convicted and fined, but they appealed their case.

Computer Misuse Act (1990) The Computer Misuse Act of 1990 is a law in the United Kingdom that makes certain activities illegal, such as hacking into other people’s systems, misusing software, or helping a person to gain access to protected files of someone else's computer. The act was created after the 1984-1985 R v. Gold case, which was appealed in 1988. The appeal was successful, inspiring parliament to create a law that would make punishable the behaviour committed by Robert Schifreen and Stephen Gold. It obviously could not be applied retroactively, but its goal was to discourage behaviour like theirs in the future.

The act is split into three sections and makes the following acts illegal:  

Unauthorised access to computer material Unauthorised access to computer systems with intent to commit another offense Unauthorised modification of computer material

The first section in the act forbids a person to use someone else’s identification to access a computer, run a program, or obtain any data, even if no personal gain is involved in such access. Individuals also cannot change, copy, delete, or move a program. The Computer Misuse Act also outlaws any attempts to obtain someone else’s password. Obviously, if someone gives another person his identification and he may legally use the computer, these laws under unauthorized access do not apply. The second provision in the law is gaining access to a computer system in order to commit or facilitate a crime. An individual can’t use someone else’s system to send material that might be offensive or to start worms or viruses. He also can’t give someone his identification so that he can use a system for this purpose. This second part means that the individual would be facilitating someone else’s intent or crime.

What occurred to prompt the case and ultimately lead to the law was the following: Gold watched an employee of Prestel at a tradeshow enter his username and password into a computer. Gold and Schifreen then used this information from a home computer to access the system of British Telecom Prestel, and specifically to enter the private message box of Prince

2


Unauthorized modification in the Computer Misuse Act means that a person can’t delete, change, or corrupt data. Again, if someone puts a virus into someone else’s system, he would be violating the act. Usually, committing unauthorized access only is thought a crime punishable by fine. Access with intent and unauthorized modification are considered more severe and may be punished by heavy fines and/or jail time.

Freedom Information Act. (2000)

Computer Misuse Act. (1990) This act covers any public information in England, Wales and northern Island.

However, it doesn’t not necessarily cover the public information of Scotland, despite it being part of the United Kingdom, their information is help By Scottish public authorities and is covered by the Scotland’s own Freedom of Information Act (2002). The public authorities include government departments, local authorities, the NHS, state schools and police forces.

The government first published proposals for freedom of information in 1997. In the white paper Your Right to Know, the

more open government based on mutual

The Freedom of Information Act 2000 (FOIA) was introduced to foster a culture of openness in government.

trust.

It does this in two ways:

government explained that the aim was a

Public authorities spend money collected

proactively make information available

from taxpayers, and make decisions that

through publication schemes,

can significantly affect many people’s lives. Access to information helps the public

FOIA obliges public authorities to

FOIA gives the public a general right of

make public authorities accountable for

access to information held by public

their actions and allows public debate to

authorities

be better informed and more productive.

3


The Data Protection Act. (1998)

Kept for no longer than is absolutely necessary handled according to people’s data protection rights kept safe and secure not transferred outside the UK without adequate protection. There is stronger legal protection for more sensitive information, such as:

Ethnic background

Political opinions

Religious beliefs

Health

Sexual health

Criminal records

The Data Protection Act controls how your

Find out what data an organisation has

personal information is used by

about you:

organisations, businesses or the

The Data Protection Act gives you the right to find out what information the government and other organisations stores about you.

government.

Write to the organisation and ask for a copy of the information they hold about you. If you do not know whom in the organisation to write to, address your letter to the company secretary. The organisation is legally required to provide you with a copy of the information they hold about you if you request it.

Everyone who is responsible for using data has to follow strict rules called ‘data protection principles’. They must make sure the information is: 

used fairly and lawfully

used for limited, specifically stated purposes

Used in a way that is adequate, relevant and not excessive accurate.

4


Ethical Issues: Use of Email

Internet:

Use of Internet Whistle Blowing

Email: The use of email in Tesco’s can be really private especially if employees might want to hack important information about the company. Email is a form of business communication, as business employees, employers and customers use it to communicate for different purposes. Emails can easily be hacked by someone who has knowledge with hacking but to prevent the person from hacking

Businesses use Internet as they

Tesco’s emails is to make sure they log

communicate to customers or they

out their accounts after using them

might be researching different

and when typing their passwords make

information for the company.

sure that no one is looking, add capital,

The reason of the use of Internet can

small letters and numbers into the

also be for the companies’ website like

password. This will keep their emails

Tesco they use Internet to update

safe and secured at all times.

their website and for also different business purposes but it can’t be used for other sites that are prohibited in the company like: Pornography, Games and other different site that are not related to the company. This could lead to some serious matters, even if you delete the history or closed the file it can always be checked, also always be kept somewhere and police will be able to track everything you have done in the past.

5


Whistle Blowing: Whistle blowing is when someone from within the company reports something bad

This happened to Tesco when they started

about their company to another person

talking about the Horse Meat scandal.

from outside the company. The concern may relate to fraud, crime, danger or any other serious risk that could impact on customers, colleagues or any other stakeholder or the organisation is reputation. Whistle-blowers may receive legal protection through the Public Interest Disclosure Act, but the offence being reported must constitute a deliberate attempt to break the law.

Horse Meat Scandal (News)

Whistle Blowing

Horse Meat Scandal

6


How does Tesco sponsor for Charities:

 Help Feed People in Need. Help build a stronger neighbourhood. Generous customers helped to donate an incredible 3.5 million meals during Tesco’s National Food Collection appeal on the 5 and 6 July, the equivalent of 26,000 trolley-loads of food. This was the second National Food Collection we have held in partnership with food redistribution charity FareShare and foodbank charity The Trussell Trust.

 Donations Each Tesco UK store holds a community donation budget to help local organisations with their fundraising events. Our prime focus of activity is to provide donations and sponsorship direct to charities and organisations working with children’s education and welfare, elderly people and people with disabilities. Unfortunately we are unable to sponsor events or individuals.

 Cancer Research UK and F&F donated stock appeal In September F&F collaborated with Cancer Research UK to run a donated stock appeal in stores nationwide. Over 300 Extra and Superstores got involved and delivered the appeal with the support of 800 volunteers. Customers brought in their unwanted, high quality items to donate to Cancer Research UK shops and to say thank you we gave customers a £5 off voucher to be redeemed when spending £25 or more on clothing in store.

7


Why would your organisation require this following procedure? Back-up Back up the company most importantly needs back up documents for their copies or data the computer as it helps the company make transactions and makes it easier to access data rather than trying to find it because it is misplaced. Important documents if you accidentally deleted them you will never get them back that’s why you need to have copies at all times. E.g. saving it in different computer, USB,

Security Information

CD or hard drive etc.

The information held at Tesco needs to be kept safe and secure like passwords or padlocks to make sure other work colleagues do not access personal information’s or personal data. In relate to Tesco’s emails is to make sure they log out their accounts after using them and when typing their passwords make sure that no one is looking, add capital, small letters and numbers into the password. This will keep their emails safe and secured at all times.

Health and Safety Tesco want to make sure customers and work employees are working in a safe and secure environment with no hazards to slipping, E.g. Wet floors sign or not putting any items on the floor spillage which can put other people’s lives at risk, especially customers can be really sensitive when it comes to health and safety because this is important. Putting cameras, fire extinguishers, fire alarms and fire exits are important in case of emergency.

8


How does a change in technology affect a business? Tesco’s Business Plans

A change in technology helps increase sophistication because it makes it look

If the company wants to expand their

younger and helps attract people at Tesco

business or improve how it looks or hire

when they bring in new types of software

extra staff they will have to have a

suitable for all ages for example self-

business continuance plan to plan for the

check outs is an increase in technology

future and if they also want to introduce

because customers will find it easier to

new brands or products.

buy products for themselves if they are in a rush and cannot waste time being in a queue.

Improves in Technology? And more staff? Tesco needs improving in technology or operation resources they may need additional resources like updated computer systems if the old computers break down or are too slow to work with and extra staff if some employees are inexperienced.

9


Bibliography: Computer Misuse (1990) http://en.wikipedia.org/wiki/Computer_Misuse_Act_1990 Data Protection Act (1989) http://www.legislation.gov.uk/ukpga/1998/29/contents http://www.wisegeek.org/what-is-the-computer-misuse-act-of-1990.htm Freedom of Information Act (2000) http://www.legislation.gov.uk/ukpga/2000/36/contents Ethical Issues http://www.wisegeek.com/what-is-the-data-protection-act.htm#didyouknowout http://teachingwithcrump.weebly.com/p5---legal-and-ethical-issues-relating-tobusiness-information.html http://www.tescoplc.com/media/126222/code_of_business_conduct.pdf http://www.tescocorp.com/data/1/rec_docs/562_TESCO%20Code%20of%20Conduct. Final.08.05.19.pdf http://www.tescocorp.com/data/1/rec_docs/562_TESCO%20Code%20of%20Conduct. Final.08.05.19.pdf Sponsor of Tesco http://www.tescoplc.com/index.asp?pageid=120

10



Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.