英国商科课程作业代写:Legal and Ethical Issues in Business Communication

发布时间:2023-07-27 11:00:49 论文编辑:cinq888



Businesses store information about people inside their organisation. The Data Protection Act protects the information held about people from being misused. The information stored must be:企业存储组织内部人员的信息。《数据保护法》保护人们所掌握的信息不被滥用。存储的信息必须是:

Obtained fairly and lawfully 公平合法取得

Used only for the purposes stated during collection 仅用于收集过程中规定的目的

Adequate, relevant and not excessive in relation to the intended use 与预期用途相关且不过度

Accurate and up to date 准确且最新

Not kept for longer than necessary 未保存超过必要时间

Processed in line with your rights 根据您的权利进行处理

Subject to procedures to prevent unlawful processing, accidental loss, destruction and damage to personal data 遵守防止非法处理、意外丢失、销毁和损坏个人数据的程序

Protected from transfer to an area outside the European Economy Area unless adequate protection exists for that data in the area受保护,不得转移到欧洲经济区以外的区域,除非该区域内的数据有足够的保护

This act means that Trinity Communications can’t use anyone’s personal details without consent from the actual person. For example, they can’t give out someone’s address or date of birth unless they have permission from that person. If they do keep information on customers or members, they have to make sure that the information is secure in a protected database so that strangers can’t randomly access it. Trinity Communications has to ensure that they have a back up of all personal information just in case the original data gets corrupted or deleted. If Trinity Communications don’t adhere to the Data Protection Act, they could face nine fines totaling £1,120,000.


Computer Misuse Act 计算机滥用法

This is a law in the UK that legislates against certain activities using computers, such as hacking into other people’s systems, misusing software or helping a person to gain access to protected files on someone else’s computer. The Computer Misuse Act is split into three sections:这是英国的一项法律,规定禁止使用计算机的某些活动,例如侵入他人的系统、滥用软件或帮助他人访问他人计算机上的受保护文件。《计算机滥用法》分为三部分:

Unauthorised access to computer material 未经授权访问计算机材料

Unauthorised access to computer systems with intent to commit another offence 意图再次犯罪而未经授权访问计算机系统

Unauthorised modification of computer material 未经授权修改计算机材料

This act means that Trinity Communications can’t use illegal pirates of software or any form of program. They’re not allowed to access other people’s computer data without permission. They’re not allowed to use unauthorised data as a form of blackmail. It is illegal for Trinity Communications to gain access to a computers data with the intention of altering or deleting it. In addition Trinity Communications cannot plant viruses. If Trinity Communications fail to adhere to this Act, they could face two types of penalties, summary and indictment. Summary penalty can land trinity Communications into prison for 12 months or a fine of up to the statutory maximum. Indictment penalty can land Trinity Communications into prison for 2 years and/or a fine.


Freedom of Information Act 信息自由法

This Act provides individuals and organisations with the right to request information held by a public authority. The public authority must tell the applicant whether it holds the information, which it must supply within 20 working days. There are some exemptions to this Act. E.g. If the cost of a request for information exceeds an appropriate limit, the public authority may decide to decline the request because they might opt to serve a greater public interest. If there is a dispute, Commissioner’s Office may investigate and deem whether the information should be released or not.


Trinity Communications must treat all requests for information equally, they must consider any information they release as if it was being released to the world at large. Trinity Communications cannot, fail to respond adequately to a request for information, fail to adopt the model publication scheme, fail to publish the correct information, deliberately destroy, hide or alter requested information to prevent it being released. If Trinity Communications fail to adhere with this Act, they would be committing a criminal offence which could land them in prison.


Copyright Act 版权法

Copyright gives the creators of some types of media rights to control how they’re used and distributed. For example, when you buy software, Copyright Act forbids you from: giving a copy to a friend, making a copy and then selling it, using the software on a network (unless the license allows it) and renting the software without permission of the copyright holder.


This Act means that Trinity Communications must have a valid copy of any software they decide to buy. They cannot sell original copies of purchased software to another party; if Trinity Communications fail to do this, fines from £200 – £150,000 for each work infringed and jail time.


Discrimination Act 歧视法

The Act simplifies, strengthens and harmonises the current legislation to provide Britain with a new discrimination law which protects individuals from unfair treatment and promotes a fair and more equal society.


The nine main pieces of legislation that have merged are:合并后的九项主要立法是

The Equal Pay Act 1970 《同工同酬法》

The Sex Discrimination Act 1975 《性别歧视法》

The Race Relations Act 1976 《种族关系法》

The Disability Discrimination Act 1995 《残疾歧视法》

The Employment Equality (Religion or Belief) Regulations 2003 《就业平等(宗教或信仰)条例》

The Employment Equality (Sexual Orientation) Regulations 2003 《就业平等(性取向)条例》

The Employment Equality (Age) Regulations 2006 《就业平等(年龄)条例》

The Equality Act 2006, Part 2 《平等法》第2部分

The Equality Act (Sexual Orientation) Regulations 2007 《平等法(性取向)条例》

This Act means that Trinity Communications cannot discriminate to anyone in any form or way; this can range from pictures to words and even verbal abuse. They’re not allowed to harass and victimise anyone in the basis of age, disability, gender, race, religion or belief. They must treat everyone equally regardless. If Trinity Communications fail to suffice to this law, they could face time in prison and heavy fine.


Business Ethics 商业道德

These are moral principles concerning acceptable and unacceptable behaviour by businesses. There are codes of practice in an organisation to maintain business ethics on: the use of emails, internet, whistle-blowing, organisational policies and information ownership. Trinity Communications can’t use email to send large documents/attachments, especially to large numbers of people; this will stop information/personal data from being leaked into the wrong hands. Trinity Communications shouldn’t use emails as a substitute for face-face/telephone communication with colleagues because it is important to maintain a good interpersonal relationship with colleagues.


In regards to the internet, there are many codes of practice what Trinity Communications can and cannot use the internet for. There are lots of codes of practice in regards to selling on the internet that Trinity Communications has to follow.


Whistle-blowing is an employee who raises concern about a business’s practice, either inside or outside the organisation. The concern may relate to fraud, crime, danger, or any other serious risk that could impact on customers, colleagues, shareholders, the public, the environment or the organisations reputation. Whistle-blowers may receive legal protection through the Public Interest Disclosure Act.


Organisations may have many policies to ensure that their businesses practices with regard to information can be done more ethically. This could be anything from how they manage information to ensuring marketing and other business practices are fair and just.


Information Ownership is simple – if you create information in your day-to-day work, then you should be responsible for it. E.g. writing a report following a member of staff’s annual review. This report is confidential to some degree and should only be viewed by a select group of people. Trinity Communications can’t show this information to anyone outside the selected group. As the information owner, Trinity Communications would be responsible for protecting this document to an appropriate degree.

信息所有权很简单——如果你在日常工作中创建信息,那么你就应该对此负责。例如,在员工年度审查后写一份报告。本报告在一定程度上是保密的,只能由选定的一群人查看。Trinity Communications无法将此信息显示给所选组之外的任何人。作为信息所有者,Trinity通信公司将负责在适当程度上保护本文件。

Organisations have to store and manage countless pieces of information, some being far more important than others. At the heart of any information systems are two fundamental issues ensuring that: the organisation receives the information it requires and the appropriate member(s) of staff receive the information.


To make sure that information is managed appropriately, a number of procedures and policies have to be put in place, concerning: security of information, backups, health and safety, organisational policies and business continuance plans.


Security Information 安全信息

Much information security management focuses upon digital data; however, the subject also covers records and knowledge management. It is important for businesses like Trinity Communications to have the right information available as and when they need it, in order to make good business decisions. For this reason, many companies keep their information on IT systems, but as reliance on technology increases, so does the risk posed by system failure and malicious attacks e.g. viruses. The IT security policy should take into account the common risks to the information that their business relies upon. This policy might include secure login identification for using IT systems and controls that limit access to information.


Backups 备份

Large businesses have developed business continuity programmes to try and minimise the risk of losing vital business information stored on IT servers. For Trinity Communications this should involve producing backups of information stored on the servers – some companies will create a backup every hour, while others will do this less frequently. This means that if live information is destroyed or damaged, a copy of this will be available on the backup services enabling a company to continue with as little disruption as possible. Backups are normally stored on separate hardware from the live versions of the information to ensure they’re protected. This means that if the live version corrupts, the backup data won’t corrupt along with it.


Health and Safety 健康与安全

It is very unlikely that computer equipment will be dangerous in itself; it can be used in ways that can be hazardous to the health of staff. Many office workers spend a lot of their time working at their desk, on a computer. Bad posture, incorrect positioning of equipment and susceptibility to repetitive strain injury are health and safety risks that employers like Trinity Communications are required to take seriously. The health and safety, management of health and safety at work regulations, provision and use of work equipment regulations and the work place legislations act all legislate to the use of computer equipment and Trinity Communications will have to take these seriously or face penalties. Employers need to carry out regular workstation assessments to make sure that computer screens are at the right level etc. If an employer suffers from repetitive strain injury, they may be provided with ergonomic equipment.


Organisational Policies 组织政策

Organisational policies that relate to the use of business information can help make sure that decisions affecting staff: are understandable and consistent, meet the legal requirements, take full account of their impact and contribute to productive working relationships. These policies help Trinity Communications help make sure that staff has guidance to help them comply with legislation – e.g. usage of customer data should work with the requirements of the Data Protection Act. These policies also make sure that Trinity Communications make consistent decisions which are important in internal communications.

与业务信息使用相关的组织政策有助于确保影响员工的决策:可理解且一致,符合法律要求,充分考虑其影响,并有助于建立富有成效的工作关系。这些政策有助于Trinity Communications确保员工有指导,帮助他们遵守法律——例如,客户数据的使用应符合《数据保护法》的要求。这些政策还确保Trinity通信公司做出一致的决策,这在内部沟通中很重要。

Business Continuance Plans业务连续性计划

These are steps that a company like Trinity Communications puts in place to make sure it is capable of surviving a worst-case scenario. One step in this programme might include making regular backups of its information. The business might consider environmental factors like accidents or natural disasters like flooding or fire. As a result of this plan, employees may need to change the way they work – for example, storing information on a central server rather than on their personal hard drive.


Costs 成本

Most businesses would see the benefit of implementing some, if not all of the measures listed. However, many aspects of information management can cost money, for example, while it may be desirable to store backup copies of electronic information on a remote server, a small business might not be able to afford this. When deciding what policies to adopt and measures to take, Trinity Communications need to consider the implementation and maintenance costs versus the benefits to the organisation. Some key considerations are: additional resources needed (would the business need to purchase new equipment or employ additional staff) and cost of the development (is there a solution already available or will the company need to develop it themselves, e.g. as an off the shelf product or a service). There are many consequences of increasing reliance on technology and increasing the complexity of that technology is that employees need to be trained to use the equipment and software required to do their job; this will increase the costs of increasing sophistication.