arising from staff’s operation.
System fault handling system can be developed to determine the responsible persons to solve network problems, processes, and time to solve problems, costs and communication issues, detailed provisions should be made.
Advantages of these support policies include putting forward a comprehensive information system support policy, institutionalizing the information system management, so that the employees follow the policy in the operation and use of the information system to help to ensure the stable and efficient operation of the information system. The downside is that the comprehensive support policies may increase the difficulty and cost of managing the information system for the restaurant. In addition, the implementation of the support policies is mainly completed by the restaurant network management and technical staff.
2.4.3 Security policy
Firewall, digital signature and authentication, intrusion detection must be installed in the restaurant’s information operating system, isolation control, access control, information encryption and audit trail can be carried out to ensure the security of the information systems.
Critical data and files must be backed up and kept on a regular basis, by comprehensive use of firewalls, routers and other network equipments to strengthen network security, closely guarding against hackers and illegal intrusion from the Internet.
Timing anti-virus can be implemented towards computers, rigorous virus monitoring must be carried out towards unknown floppy disk.
Responsible personnel for the computer system login must set account password to strictly control the use of computers by non-use personnel. Computer operators are not free to install any software program that has nothing to do with work on the terminal and the local area network.
It should determine the responsible person, range, storage locations for system data regularly backing up. The original data and the backup should be stored in different locations to prevent adverse effects due to fire, flood, earthquake and other accidents.
Advantages of the security policies lie in that they provide comprehensive measures to deal with the risk of internal and external threats towards the stable operation of the information system. The disadvantage is that these policies focus on the prevention of threats to information security incidents, and for those information security incidents which are not prevented in future, it fail to put forward more detailed measures and steps. In addition, the implementation of security policy is responsible mainly by the restaurant network management and technical staff and each employee who have the need to use the information systems.
2.5 Legislation
There are mainly the following two laws relating to this plan. In Human Rights Act 1998 Article 8, “relating to privacy, it provides a right to respect for an individual’s “private and family life, his home and his correspondence”. According to the Act, in the use of the information systems for management, the restaurant management personnel can not disclose personal information of consumers, any violation will lead to be prosecuted by the information commission, and the restaurant will face the victims’ claims for huge fines, as well as apologize to the customers (Hewitt, 2002).
In the Digital Economy Act 2010, it regulates the use of digita
本论文由英语论文网提供整理,提供论文代写,英语论文代写,代写论文,代写英语论文,代写留学生论文,代写英文论文,留学生论文代写相关核心关键词搜索。