week 7
Learning Aims and Objectives:
Aim: In this week's page, students will learn the.
Objectives:
1. By the end of this week's page students will be able to.
2. By the end of the week's page students will be able to.
3. By the end of the week's page students will be able to .
4. By the end of the week's page students will be able to
5. By the end of the week's page students will be able to.
B4 Considerations when designing an IT service delivery solution
Learners should be able to apply understanding of IT systems to evaluate the appropriateness of IT service delivery solutions in meeting the needs of an organisation in comparison to alternatives.
Understand the implications and considerations for organisations of the selection of, and dissemination of, information and data
Compatibility
When implementing or planning an IT service/improvement or upgrade it is essential to ensure that Compatability is reflected on. Systems that are incompatible can produce a number of potential issues other than the obvious of not working. Systems can ave the potential to have a knock-on effect to systems that are not directly linked to the implementation that is being installed. For example the installation of a new network firewall, this could be a simple installation of a piece of hardware, that was being implemented to reduce the potential from attacks outside of the network, however the system has now stopped a server that sends information to clients from being able to access the internet, and this server cannot communicate with the hardware because it is a specialist "Cisco" or "Huawei" device. The cost implication could be large as the company would now need to find a compatible version that works with both systems.
Case studies of this type of occurrences are available, for example, the NHS and its legacy systems only being able to work on windows internet explorer 5.
Using the link provided reflect on the issues that the NHS have had and explore the potential resolution to the problem ( Don't worry if it is not obvious at first as the NHS are still working on this)
https://www.buildingbetterhealthcare.co.uk/news/article_page/The_prevalence_of_obsolete_legacy_applications_in_the_NHS/124486
Corporate message
Cost, processing
Productivity
Privacy
Reliability
Security
Size/quantity
Quality
User and/or customer experience, to include ease of use, performance, availability, accessibility
User and/or customer needs
Working practices.
Understand the implications of selecting data and information sources and methods of dissemination that influence the design of IT service delivery solutions.
Understand the implications for organisations of the factors affecting the use and selection of software and hardware to meet IT service delivery requirements: availability, cost, connectivity, capacity, ease of use, features, privacy, scalability and usability.
Understand the implications for organisations of the factors affecting the use and selection of software and hardware to meet IT service delivery requirements.
Understand how the use and selection of software and hardware influence the design of IT service delivery solutions.
Understand the implications for organisations of the management of IT service delivery to meet IT service delivery requirements
Asset management
Identification of asset utilisation to analyse effectiveness and efficiency
Managing updates and upgrades
When a company installs any update or upgrade to a system it is important to assess the impact of these. I most cases updates and upgrades improve performance, security, and in a small number of situations presentation. However, these do come with potential pitfalls and drawbacks.
The installation of an update or upgrade to a system that is old could cause issues with compatibility for both hardware and software resulting in downtime and or corruption to data and/or operating systems. Therefore it is good practice for most companies to test these implementations prior to them being "rolled out". In small company situations, it may be that they are unable to test the installation of the updates/upgrades, so in this instance, a sufficient disaster recovery process would need to be followed, for example, back-ups of data to external sources. In larger corporations company may be able to use test environments to do this, or, create copies of virtualised servers and run test deployments to see the stability of them.
If implemented well companies can introduce these updates and upgrades in a phased timetable where they trickle them to users and then this would reduce potential downtime.
Installation and/or deployment
Security issues and procedures, including:
– physical security
when looking at the implementation of an IT service such as server hardware and equipment, consideration must be given to the access to these devices/services as they have the capability to hold company sensitive data on them let alone client data. The security measures that need to be put into place must ensure that the right people and only the right people have access. For example, within a doctors surgery you would not allow doctors and general staff access to the physical servers, you would only allow them a rights restricted access through software and applications, however the designated IT technical person would need access, so you would enable their key card to access the room in which the server was in. Again however this individual shouldn't be able to access the data so they could have a technical login to the server that only provides them with the ability to make administrative changes and updates, this would also mean that the USB, floppy and CD drives are all disabled or have physical locks to prevent removal of data.
– security issues relating to the use of traditional, mobile and cloud-based technologies
– security software
Current and relevant legislation
Computer Misuse Act 1990
The Computer Misuse Act was introduced partly in reaction to a specific legal case (R v Gold and Schifreen) and was intended to deter criminals from using a computer to assist in the commission of a criminal offence or from impairing or hindering access to data stored in a computer.
The Act contains three criminal offences for computer misuse: -
- Unauthorised access to computer material
- Unauthorised access with intent to commit or facilitate the commission of further offenses
- Unauthorised modification of computer material.
The Crown Prosecution Service offer further guidance in relation to the Computer Misuse Act.
Data Protection Act 1998
The Data Protection Act regulates the use of personal data by organisations. Personal data is defined as information relating to a living, identifiable individual.
The Act is underpinned by eight guiding principles:
1. Personal data shall be processed fairly and lawfully.
2. Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes.
3. Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed.
4. Personal data shall be accurate and, where necessary, kept up to date.
5. Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes.
6. Personal data shall be processed in accordance with the rights of data subjects under this Act.
7. Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.
8. Personal data shall not be transferred to a country or territory outside the European Economic Area unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data.
Watch the following video and answer the below questions.
GDPR
GDPR legislation came into Law on the 25th of May 2018, where it replaced the Data Protection Act of 1998. This Legislation was designed to reflect the inclusion of the way in which our data can be used and moved around the world using digital means. The below video demonstrates the changes that companies needed to consider prior to its implementation as the new legislation carried a severe fine if companies were found to be non-compliant. In the UK, the Information Commissioner's Office can now issue fines of up to 4% of a company's annual turnover, or 20 million (whichever is greater) for the worst data offences.
Ethical and moral issues
Staff training
Whenever and where ever new software or hardware systems are implemented it is best practice to provide clear and appropriate training and demonstrations to the staff team. It is vital to a company that the employees are able to continue to do their jobs and smoothly as possible and any new system is able to complement or improve the operators' jobs. User training is also beneficial to a company as is informs the users of what is expected and what most importantly is NOT. Users/operators will normally be able to provide good feedback to managers and developers of any potential flaws or issues that can/have occurred so that these bugs can be resolved and repaired.
Customer support processes and implications of user problems and IT equipment faults
Challenges faced by organisations when responding to changes in user needs:
additional or changes to services, network expansion, emerging technologies,changes in legislation and security and privacy issues.
Complete page 14 - Considerations when Choosing Software and Hardware, and 15 - Considerations when Designing Solutions of your Onenote class activities, it is essential that you complete this as this will provide revision notes towards your end of unit assessment
EXAM PREP - REFER TO PAST PAPERS AND STUDENT EXAMPLES
Last Updated
2024-09-04 14:07:51
English and Maths
English
Sentence Structure: Use a range of sentence structures for clarity, purpose and effect, with accurate punctuation and spelling.
Listening: Listen and respond to speakers ideas and perspectives, and how they construct and express meanings
Organising Information: Organise information and ideas into structured and sequenced sentences, paragraphs and whole texts, using a variety of linguistic and structural features to support cohesion and overall coherence.
Maths
Collect and record data: Questionnaires, Observation, Tally
Money: Budgeting, Estimating, Rounding to nearest pound, using correct symbols, calculating costs using a calculator
Stretch and Challenge
Stretch and Challenge
- Fast to implement
- Accessible by default
- No dependencies
Homework
Homework
Equality and Diversity Calendar
How to's
How 2's Coverage
Just a Minute - At the end of the lesson teachers ask learners to summarise their learning. The comparison of these summaries against learning objectives informs planning.
Question and Answer - Verbal discussion with learners to quantify understanding
Anonymous Assessment - Learners assess an anonymous piece of work containing deliberate mistakes against given success criteria.
Links to Learning Outcomes |
Links to Assessment criteria |
|
---|---|---|
Files that support this week
Week 6←
PrevWeek 7←
PrevWeek 8←
Prev→
Next