SlideShare une entreprise Scribd logo
1  sur  27
Data Protection Act
Mohammad Iqbal Dilmahomed Bocus ID: 1102196
Gulshan Gunputh ID: 1102191
Legallant Dony ID:1102193
Bsc(Hons) IT Upgrade PT
Data Protection Act
Privacy of data in the age
of TECHNOLOGY
Information privacy, or data privacy is the relationship between collection
and dissemination of data, technology, the public expectation of privacy,
and the legal and political issues surrounding them
Reference from Wikipedia
What is Personal Data?
This can be defined as information that can identify a
living person and allow an opinion to be expressed
about that person.
Examples of sensitive personal data:
 Political and religious belief
 Racial and ethnic origin
 Membership of trade unions
 Details of sexual life
 Physical and mental health
Data Protection Act
Is a Law designed to protect
personal data
It applies to all data storage
media
Definition of Data Protection Act as a Law
Create RIGHTS:
for those who have their data stored
Make RESPONSIBLE:
for those who store and process the
data
Why we need Data Protection Act?
In this era of technology, the importance of having
our personal data at hand is fundamental.
At any time or anywhere, we need our personal data
to do transactions.
These sensitive data are stored on servers where
anybody can have access to it.
In order to protect ourselves and our data, the DPA
was passed to protect our privacy.
Purpose of the Data Protection Act
To control the way information
is handled and to give legal rights
to people who have information
stored about them.
Data Protection Principles
1. Personal data shall be processed fairly and
lawfully
• identity of the data controller must be known
• purpose for which the information is to be
processed should be clear
• Other information relevant in the circumstances
whereby the information pertaining to an individual
might be disclosed
Principles of Data Protection Act
2. Personal information shall be obtained only for one or
more specified purposes.
 What is meant by that is that the processing must not be
unsuited with the purpose it was originally intended for.
Principles of Data Protection Act (cont)
3. Personal data shall be Adequate, relevant and not excessive
The data controller should capture only the minimum amount
of personal information that is needed to fulfill the purpose of
the processing properly.
Principles of Data Protection Act (cont)
4. Personal Data shall be accurate and kept up-to-date
 This principle of the data protection act states that data which are out-
of-date are most likely to be regarded as excessive and irrelevant for
their purpose
 There are certain exceptions for this particular principle which include
the following:
 The data controller has taken reasonable steps to ensure privacy
 The information while inaccurate constitutes an accurate recorded
obtained from the person concerned
Principles of Data Protection Act (cont)
5. Personal Information shall not to be retained for more time than it
is required for processing
 In order for this principle to be successfully implemented, there is a
need for continuous appraisal of the information, as well as the
purpose of its collection. In some special circumstances, the data can
be retained after its processing based on the requirement of the
business needs.
Principles of Data Protection Act (cont)
6. Processing should be carried out in accordance to the right of
the data subjects
Here is a list of the rights of the data subjects:
 Right to access personal information
 Right to object to automated decision making
 Right to object to direct marketing
 Right to object to certain processing likely to cause damage
Principles of Data Protection Act (cont)
7. Personal data shall be kept secured
 The data controller takes the necessary precautions to safeguard data
against unauthorized access, processing, disclosure, damage or loss. The
data protection act takes into consideration two important factors:
1. Cost of the security measure with regards to the nature of the information
and the perceived harm that a security breach could cause
2. The state of the technological development at this time
Principles of Data Protection Act (cont)
8. Transfer of data to another country
The data protection act prevents private information to be
transferred to another country unless that country ensures an
adequate level of protection for the rights and freedom of data of
the subjects in relation to the processing of information of
personal data.
Definition of key words
 Data Subject
Data subjects, are the people who have data held about
them. Nowadays this includes you, me, everyone.
 Data Controller
A Data controller is the person, business or organization controlling the
collection, contents and use of personal data.
Definition of key words (cont)
 Data User
This is an authorized user within the organization or business
who is given an ID and password that enables them to access
data.
 Data processor
The data processor is a person, other than an employee of the
data controller, who has a written contract with the data
controller and who processes personal data on behalf of the data
controller.
Definition of key words (cont)
Commissioner
Mrs. Madhub is presently the commissioner in Mauritius. Her job is to:
 register all data controllers in Mauritius
 exercise control over all data processing activities in Mauritius
 investigate complaints
 undertake research in data processing and computer technology,
amongst others.
More information at http://dataprotection.gov.mu/
Data Protection Office [PMO]
The Data Protection Office runs under the aegis of the
Prime Minister's Office
The Data Protection Office is to safeguard the privacy
rights of all individuals with regard to the processing of
their personal data, in Mauritius.
During 2009 and 2010, the office has concentrated on the
registration of about 10000-15000 data controllers in
Mauritius
Statistics
With the growing awareness of the
existence of data protection laws, the
Investigation Unit has received 11
complaints as at end of December
2011.The Investigators have successfully
investigated 4 suspected cases of data
breach.
Case where the DPA has been breached in Mauritius
cont
 On 26th June 2010, Dr Richard L Munisamy made a statement to the
police at Point aux Canonniers station accusing Mr Sahrat Dutt Lallh, CEO
of Mauritius Telecom of contravening Section 29 of the Data Protection
Act
 According to a Mauritius Telecom employee, the private database of
Orange customers’ phone numbers had been released to the alliance de
l’avenir who had requested that Mauritius Telecom send a message to
subscribers soliciting their support in the general elections of may 2010.
Apparently, Mauritius telecom made no charge for this service. It is
understood that the case, OB732/10, has recently been transferred to
regional headquarters at Piton where the decision to prosecute will be
taken.
Data Protection Act in Mauritius
Data Protection Act 2004 came
into operation in February 2009.
Enforcement is through the
Data Protection Office.
Our Rights
 DPA gives everyone the right to see data that is held about them on a
computer system and to have it changed if it is wrong!
Offences and Penalties
Any person who contravenes the DPA shall commit
an offence.
Where no specific penalty is provided for an offence,
the person shall, on conviction, be liable to a fine not
exceeding 200,000 rupees and to imprisonment for a
term not exceeding 5 years.
Exceptions to the Law
There is some data you can't see.
If the data is held by the
police,
the security forces or the
Inland Revenue then access is denied.
Data protection act

Contenu connexe

Tendances

Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykData Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykEryk Budi Pratama
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacyhimanshu jain
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protectionsp_krishna
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation tomasztopa
 
PDPA Compliance Preparation
PDPA Compliance PreparationPDPA Compliance Preparation
PDPA Compliance PreparationLawPlus Ltd.
 
Information classification
Information classificationInformation classification
Information classificationJyothsna Sridhar
 
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104 Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104 Upekha Vandebona
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Actmrmwood
 
Digital personal data protection act, 2023.pptx
Digital personal data protection act, 2023.pptxDigital personal data protection act, 2023.pptx
Digital personal data protection act, 2023.pptxDineshPrasad64
 
Applying the Personal Data Protection Act (Singapore)
Applying the Personal Data Protection Act (Singapore)Applying the Personal Data Protection Act (Singapore)
Applying the Personal Data Protection Act (Singapore)Benjamin Ang
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and PrivacyVertex Holdings
 
Handling information Standard by Skills for Care
Handling information Standard by Skills for CareHandling information Standard by Skills for Care
Handling information Standard by Skills for CareAtlantic Training, LLC.
 

Tendances (20)

GDPR
GDPRGDPR
GDPR
 
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykData Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacy
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
PDPA Compliance Preparation
PDPA Compliance PreparationPDPA Compliance Preparation
PDPA Compliance Preparation
 
Information classification
Information classificationInformation classification
Information classification
 
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104 Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104
 
Data protection
Data protectionData protection
Data protection
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
Digital personal data protection act, 2023.pptx
Digital personal data protection act, 2023.pptxDigital personal data protection act, 2023.pptx
Digital personal data protection act, 2023.pptx
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
 
Data protection
Data protectionData protection
Data protection
 
Applying the Personal Data Protection Act (Singapore)
Applying the Personal Data Protection Act (Singapore)Applying the Personal Data Protection Act (Singapore)
Applying the Personal Data Protection Act (Singapore)
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
 
Data security
Data securityData security
Data security
 
Handling information Standard by Skills for Care
Handling information Standard by Skills for CareHandling information Standard by Skills for Care
Handling information Standard by Skills for Care
 

En vedette

Industrial design [compatibility mode]
Industrial design [compatibility mode]Industrial design [compatibility mode]
Industrial design [compatibility mode]Delwin Arikatt
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issuesSagar Rahurkar
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theftAmber Gupta
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rightsharshhanu
 

En vedette (7)

Industrial design [compatibility mode]
Industrial design [compatibility mode]Industrial design [compatibility mode]
Industrial design [compatibility mode]
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issues
 
IPR AND SOFTWARE PROTECTION
IPR AND SOFTWARE PROTECTIONIPR AND SOFTWARE PROTECTION
IPR AND SOFTWARE PROTECTION
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theft
 
Design act 2000
Design act 2000Design act 2000
Design act 2000
 
Intellectual Property Rights (IPR)
Intellectual Property Rights (IPR)Intellectual Property Rights (IPR)
Intellectual Property Rights (IPR)
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
 

Similaire à Data protection act

Managing Data Protection guide powerpoint presentation
Managing Data Protection guide powerpoint presentationManaging Data Protection guide powerpoint presentation
Managing Data Protection guide powerpoint presentationsilvereyez11
 
Data privacy Legislation in India
Data privacy Legislation in IndiaData privacy Legislation in India
Data privacy Legislation in IndiaLATHA H C
 
My presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPRMy presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPRzayadeen2003
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11mrmwood
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_indiaAltacit Global
 
Bahrain-Personal-Data-Protection-Law.pdf
Bahrain-Personal-Data-Protection-Law.pdfBahrain-Personal-Data-Protection-Law.pdf
Bahrain-Personal-Data-Protection-Law.pdfDaviesParker
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologiessidra batool
 
Safety And Security Of Data 4
Safety And Security Of Data 4Safety And Security Of Data 4
Safety And Security Of Data 4Wynthorpe
 
Data protection Act - Key Terms
Data protection Act -  Key TermsData protection Act -  Key Terms
Data protection Act - Key TermsDouglas Nderitu
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law Owako Rodah
 
How does GDPR Regulation help in Data Protection and Data Privacy?
How does GDPR Regulation help in Data Protection and Data Privacy?How does GDPR Regulation help in Data Protection and Data Privacy?
How does GDPR Regulation help in Data Protection and Data Privacy?TobyRobinson13
 
Uchi data local presentation 2020
Uchi data local presentation 2020Uchi data local presentation 2020
Uchi data local presentation 2020Christo W. Meyer
 
General data protection regulation - European union
General data protection regulation  - European unionGeneral data protection regulation  - European union
General data protection regulation - European unionRohana K Amarakoon
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)BenjaminShalevSalovi
 
iSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for IndiaiSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for IndiaProductNation/iSPIRT
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...Symantec
 

Similaire à Data protection act (20)

Managing Data Protection guide powerpoint presentation
Managing Data Protection guide powerpoint presentationManaging Data Protection guide powerpoint presentation
Managing Data Protection guide powerpoint presentation
 
Data privacy Legislation in India
Data privacy Legislation in IndiaData privacy Legislation in India
Data privacy Legislation in India
 
My presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPRMy presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPR
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_india
 
Bahrain-Personal-Data-Protection-Law.pdf
Bahrain-Personal-Data-Protection-Law.pdfBahrain-Personal-Data-Protection-Law.pdf
Bahrain-Personal-Data-Protection-Law.pdf
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
Safety And Security Of Data 4
Safety And Security Of Data 4Safety And Security Of Data 4
Safety And Security Of Data 4
 
Data protection Act - Key Terms
Data protection Act -  Key TermsData protection Act -  Key Terms
Data protection Act - Key Terms
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law
 
1307 Privacy Act
1307 Privacy Act1307 Privacy Act
1307 Privacy Act
 
How does GDPR Regulation help in Data Protection and Data Privacy?
How does GDPR Regulation help in Data Protection and Data Privacy?How does GDPR Regulation help in Data Protection and Data Privacy?
How does GDPR Regulation help in Data Protection and Data Privacy?
 
Uchi data local presentation 2020
Uchi data local presentation 2020Uchi data local presentation 2020
Uchi data local presentation 2020
 
General data protection regulation - European union
General data protection regulation  - European unionGeneral data protection regulation  - European union
General data protection regulation - European union
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Personal Data Protection in Malaysia
Personal Data Protection in MalaysiaPersonal Data Protection in Malaysia
Personal Data Protection in Malaysia
 
iSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for IndiaiSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for India
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
 
GDPR infographic
GDPR infographicGDPR infographic
GDPR infographic
 
POPI Seminar FINAL
POPI Seminar FINALPOPI Seminar FINAL
POPI Seminar FINAL
 

Dernier

Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 

Dernier (20)

Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 

Data protection act

  • 1. Data Protection Act Mohammad Iqbal Dilmahomed Bocus ID: 1102196 Gulshan Gunputh ID: 1102191 Legallant Dony ID:1102193 Bsc(Hons) IT Upgrade PT
  • 2. Data Protection Act Privacy of data in the age of TECHNOLOGY Information privacy, or data privacy is the relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them Reference from Wikipedia
  • 3. What is Personal Data? This can be defined as information that can identify a living person and allow an opinion to be expressed about that person. Examples of sensitive personal data:  Political and religious belief  Racial and ethnic origin  Membership of trade unions  Details of sexual life  Physical and mental health
  • 4. Data Protection Act Is a Law designed to protect personal data It applies to all data storage media
  • 5. Definition of Data Protection Act as a Law Create RIGHTS: for those who have their data stored Make RESPONSIBLE: for those who store and process the data
  • 6. Why we need Data Protection Act? In this era of technology, the importance of having our personal data at hand is fundamental. At any time or anywhere, we need our personal data to do transactions. These sensitive data are stored on servers where anybody can have access to it. In order to protect ourselves and our data, the DPA was passed to protect our privacy.
  • 7. Purpose of the Data Protection Act To control the way information is handled and to give legal rights to people who have information stored about them.
  • 8. Data Protection Principles 1. Personal data shall be processed fairly and lawfully • identity of the data controller must be known • purpose for which the information is to be processed should be clear • Other information relevant in the circumstances whereby the information pertaining to an individual might be disclosed
  • 9. Principles of Data Protection Act 2. Personal information shall be obtained only for one or more specified purposes.  What is meant by that is that the processing must not be unsuited with the purpose it was originally intended for.
  • 10. Principles of Data Protection Act (cont) 3. Personal data shall be Adequate, relevant and not excessive The data controller should capture only the minimum amount of personal information that is needed to fulfill the purpose of the processing properly.
  • 11. Principles of Data Protection Act (cont) 4. Personal Data shall be accurate and kept up-to-date  This principle of the data protection act states that data which are out- of-date are most likely to be regarded as excessive and irrelevant for their purpose  There are certain exceptions for this particular principle which include the following:  The data controller has taken reasonable steps to ensure privacy  The information while inaccurate constitutes an accurate recorded obtained from the person concerned
  • 12. Principles of Data Protection Act (cont) 5. Personal Information shall not to be retained for more time than it is required for processing  In order for this principle to be successfully implemented, there is a need for continuous appraisal of the information, as well as the purpose of its collection. In some special circumstances, the data can be retained after its processing based on the requirement of the business needs.
  • 13. Principles of Data Protection Act (cont) 6. Processing should be carried out in accordance to the right of the data subjects Here is a list of the rights of the data subjects:  Right to access personal information  Right to object to automated decision making  Right to object to direct marketing  Right to object to certain processing likely to cause damage
  • 14. Principles of Data Protection Act (cont) 7. Personal data shall be kept secured  The data controller takes the necessary precautions to safeguard data against unauthorized access, processing, disclosure, damage or loss. The data protection act takes into consideration two important factors: 1. Cost of the security measure with regards to the nature of the information and the perceived harm that a security breach could cause 2. The state of the technological development at this time
  • 15. Principles of Data Protection Act (cont) 8. Transfer of data to another country The data protection act prevents private information to be transferred to another country unless that country ensures an adequate level of protection for the rights and freedom of data of the subjects in relation to the processing of information of personal data.
  • 16. Definition of key words  Data Subject Data subjects, are the people who have data held about them. Nowadays this includes you, me, everyone.  Data Controller A Data controller is the person, business or organization controlling the collection, contents and use of personal data.
  • 17. Definition of key words (cont)  Data User This is an authorized user within the organization or business who is given an ID and password that enables them to access data.  Data processor The data processor is a person, other than an employee of the data controller, who has a written contract with the data controller and who processes personal data on behalf of the data controller.
  • 18. Definition of key words (cont) Commissioner Mrs. Madhub is presently the commissioner in Mauritius. Her job is to:  register all data controllers in Mauritius  exercise control over all data processing activities in Mauritius  investigate complaints  undertake research in data processing and computer technology, amongst others. More information at http://dataprotection.gov.mu/
  • 19. Data Protection Office [PMO] The Data Protection Office runs under the aegis of the Prime Minister's Office The Data Protection Office is to safeguard the privacy rights of all individuals with regard to the processing of their personal data, in Mauritius. During 2009 and 2010, the office has concentrated on the registration of about 10000-15000 data controllers in Mauritius
  • 20. Statistics With the growing awareness of the existence of data protection laws, the Investigation Unit has received 11 complaints as at end of December 2011.The Investigators have successfully investigated 4 suspected cases of data breach.
  • 21. Case where the DPA has been breached in Mauritius
  • 22. cont  On 26th June 2010, Dr Richard L Munisamy made a statement to the police at Point aux Canonniers station accusing Mr Sahrat Dutt Lallh, CEO of Mauritius Telecom of contravening Section 29 of the Data Protection Act  According to a Mauritius Telecom employee, the private database of Orange customers’ phone numbers had been released to the alliance de l’avenir who had requested that Mauritius Telecom send a message to subscribers soliciting their support in the general elections of may 2010. Apparently, Mauritius telecom made no charge for this service. It is understood that the case, OB732/10, has recently been transferred to regional headquarters at Piton where the decision to prosecute will be taken.
  • 23. Data Protection Act in Mauritius Data Protection Act 2004 came into operation in February 2009. Enforcement is through the Data Protection Office.
  • 24. Our Rights  DPA gives everyone the right to see data that is held about them on a computer system and to have it changed if it is wrong!
  • 25. Offences and Penalties Any person who contravenes the DPA shall commit an offence. Where no specific penalty is provided for an offence, the person shall, on conviction, be liable to a fine not exceeding 200,000 rupees and to imprisonment for a term not exceeding 5 years.
  • 26. Exceptions to the Law There is some data you can't see. If the data is held by the police, the security forces or the Inland Revenue then access is denied.