Category:Appropriate Information Use

Appropriate Information Use Information is used to fulfill some sort of purpose and even sometimes the same information can be used to achieve another different purpose. When this happens there is a high possibility for inappropriate use of information. The inappropriate use of data can happen with intent or simply by accident. Some ways of inappropriate use of information is: 1) a clients email address is collected by a business and then it is sold to a direct mail company. The direct mail company then sends out mass advertising or spam mail.

2)person adds up their HSC marks and they change it to a percentage so they can try and estimate their UAI

3)credit checks are made on all applicants for a job based solely on their name. The employer incorrectly cut off some applicants when in fact it is someone else, who has the same name.

4)a newspaper reporter uses the number of students who gained a band 6 in Ipt to rank the effectiveness of schools.

The appropriate use of information systems is often detailed as a policy statement. If you have inappropriate information use you will have consequences that will follow. These are some examples of activities that are inappropriate: - unauthorized access, alteration or destruction of another user's data. - attempts to obtain unauthorized access to either local or remote computer systems or networks. - attempts to modify computer systems or software in any authorized manner. - unauthorized use of computing resources for private purposes. - release of confidential information - unauthorized release of information