The evidence for this strand is given in context of transactional websites which is good practice. Cookies, spyware and hacking are identified as threats and explained. Various methods of prevention are also described and these include encryption, SET, firewalls and virus protection. The Data Protection Act is covered. However, there is no mention of the Computer Misuse Act. There is sufficient evidence to reach mark band 2 but there is an insufficient number of preventative measures and legislation described to access all the marks in this mark band.
4 marks out of 6