Tuesday, May 19, 2020

Data Protection Act 1998 The Eight Principles Of The...

Data Protection Act 1998 This legislation protects people’s data and information stored on databases. Data subjects are people whose personal data is stored, the rights given to data subjects are: right of subject access, right of correction, right to prevent distress, right to prevent direct marketing, right to prevent automatic decisions, right of compliant to the information commissioner and right to compensation. The eight principles of the data protection act that companies need to adhere to are: 1. used lawfully and fairly 2. used for specified purposes 3. used inadequately or excessively 4. used accurately 5. not kept longer than necessary 6. handled according to data subject’s data protection rights 7. ensure safety and security of data 8. ensure adequate protection if transferred outside the European Economic Area when companies want to use personal data and share data with third parties they have to ask permission from the person whose data they wish to use. On e-commerce sites they can do this by presenting tick boxes when a user enters their details. Computer Misuse Act 1990 This act was introduced to deal with problems caused by hacking. It helps organisations deal with hacking by making the following offences: unauthorised access to computer material, unauthorised access with the intent of facilitating or committing a crime, unauthorised modification of computer material, and supplying, making or obtaining anything that can be used computer misuse crimes.Show MoreRelatedRecording, Analysing and Using Hr Information Essay848 Words   |  4 PagesRecording, analysing and using HR information Activity 1 Further to your request for the review of the organisation’s approach to collecting, storing and using HR data please see the briefing note below. There are a variety of reasons why an organisation needs to collect HR data, these could be to satisfy legal requirements, provide relevant information in decision making and for consultation requirement, recording contractual arrangements and agreements, keep contact details of employeesRead More The Data Protection Act 1998 and the Freedom of Information Act 20006383 Words   |  26 PagesThe Data Protection Act 1998 and the Freedom of Information Act 2000 Introduction ============ For my module computing I have to find research and produce detailed report on freedom of information and the need for security. The information commissioner’s office enforces and oversees the Data Protection Act 1998 and the Freedom of Information Act 2000. I need to read and understand knowledge respecting private lives of individuals and encourage the openness and accountability of public authoritiesRead MoreProtecting Private Individual Sensitive Data594 Words   |  2 PagesThe Data Protection Act 1998 was specifically designed to protect sensitive data of many individuals that was held in organizations’ databases. The act originally was passed in 1984 with a further update in 1998 which it then was brought out in action in 2000. Any organization holding personal data electronically, must register with the Data Protection registrar (who monitors whether the act has been enforced or not), and state what data they wish to hold as well as their intent in which they wantRead MoreDubious And Liability Under Data Protection Act 19982213 Words   |  9 PagesLiability under Data Protection Act 1998 Dubious, as a company’s new Trainee, inadvertently posted huge amount of customers’ personal information on a public website. His unauthorized access to company document, particularly the confidential information, absolutely went against the regulations in the Data Protection Act 1998 (DPA 1998). As an organization that is responsible for data controlling and processing, the company should be involved in this information breach issue. The DPA 1998 provides a wholeRead MoreUnit Three: Principles of Managing Information and Producing Documents2600 Words   |  11 PagesUnit three: Principles of managing information and producing documents Assessment You should use this file to complete your Assessment. †¢ The first thing you need to do is save a copy of this document, either onto your computer or a disk †¢ Then work through your Assessment, remembering to save your work regularly †¢ When you’ve finished, print out a copy to keep for reference †¢ Then, go to www.vision2learn.com and send your completed Assessment to your tutor via your My Study area – makeRead MoreEthical and Social Issues in Information Systems20165 Words   |  81 PagesEthical and Social Issues in Information Systems LEARNING OBJECTIVES After reading this chapter, you will be able to: 1. Analyze the relationships among ethical, social, and political issues that are raised by information systems. 2. Identify the main moral dimensions of an information society and specific principles for conduct that can be used to guide ethical decisions. 3. Evaluate the impact of contemporary information systems and the Internet on the protection of individual privacy and intellectualRead MoreUnit 3 P1 P2 P33507 Words   |  15 Pagesin company-operated restaurants. McDonalds revenues grew 27% over the three years ending in 2007 to $22.8 billion, and 9% growth in operating income to $3.9 billion. Marketing defines the social process by which groups and individuals obtain information so they can produce products/ services which are demanded by consumers to satisfy them by meeting their needs and requirement. MARKETING TECHNIQUES There are three types of marketing techniques which are growth strategy, survival strategy andRead MoreStrategic Information Management2916 Words   |  12 Pages7004: Strategic Information Management Table of Content What is Information Management | Page 3 | Importance of Information Sharing and Legal obligations for sourcing, storing and sharing information | Page 7 | Using Information for Strategic Decision Making | Page 14 | Monitoring and Reviewing Management Information | Page 17 | References | Page 19 | What is Information Management Information Management is the collection and management of information from one or moreRead MoreThe Internet Its Effects and Its Future6120 Words   |  25 Pagesnuclear attack, there was no central computer holding vast amounts of data, rather the information was dispersed across thousands of machines. A set of rules, of protocols, known as TCP/IP was developed to allow disparate devices to work together. The original network has long since been upgraded and expanded and TCP/IP is now a  ¡Ã‚ §de facto ¡Ã‚ ¨ standard. Millions of people worldwide are using the Internet to share information, make new associations and communicate. Individuals and businesses, fromRead More The Impact of the Internet on Society Essay5976 Words   |  24 Pagesof nuclear attack, there was no central computer holding vast amounts of data, rather the information was dispersed across thousands of machines. A set of rules, of protocols, known as TCP/IP was developed to allow disparate devices to work together. The original network has long since been upgraded and expanded and TCP/IP is now a de facto standard. Millions of people worldwide are using the Internet to share information, make new associations and communicate. Individuals and businesses, from

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.