SlideShare une entreprise Scribd logo
1  sur  8
Data Protection Act ICT GCSE
Data Protection Act ,[object Object],[object Object],[object Object],[object Object]
Concerns ,[object Object],[object Object],[object Object],[object Object]
Terminology Data Subject This is the person that the data is being collected from Personal data Covers facts and opinions regarding a living individual Data User Any person who needs to access the data as part of their job Data Controller This is often the person in charge of the organisation This is the person who must apply for permission to collect and store data Data Commissioner This is the person that enforces the data protection act
The Eight Principles ,[object Object],[object Object],[object Object],[object Object]
The Eight Principles ,[object Object],[object Object],[object Object],[object Object]
Exemptions ,[object Object],[object Object],[object Object]
Exemptions ,[object Object],[object Object]

Contenu connexe

Tendances

Privacy Ordinance in Hong Kong
Privacy Ordinance in Hong KongPrivacy Ordinance in Hong Kong
Privacy Ordinance in Hong Kong若水 鲁
 
Legislation protecting data and data systems
Legislation protecting data and data systemsLegislation protecting data and data systems
Legislation protecting data and data systemsannbrooks22
 
Intro to information governance booklet
Intro to information governance bookletIntro to information governance booklet
Intro to information governance bookletGerardo Medina
 
Webinar privacyawarenesswestviewpcn preview
Webinar privacyawarenesswestviewpcn previewWebinar privacyawarenesswestviewpcn preview
Webinar privacyawarenesswestviewpcn preview4WEB
 
HIPPA Security Presentation
HIPPA Security PresentationHIPPA Security Presentation
HIPPA Security PresentationRebecca Norman
 
Computer Legislation2 T2
Computer Legislation2  T2Computer Legislation2  T2
Computer Legislation2 T2lees_ush
 
TaylorWk1d2assignment
TaylorWk1d2assignmentTaylorWk1d2assignment
TaylorWk1d2assignmentmya1743
 
Self-Sovereign Identity in Healthcare by Manny Nijjar from truu.id
Self-Sovereign Identity in Healthcare by Manny Nijjar from truu.idSelf-Sovereign Identity in Healthcare by Manny Nijjar from truu.id
Self-Sovereign Identity in Healthcare by Manny Nijjar from truu.idSSIMeetup
 
Webinar Mastery Series: Email Retention Regulations in India and How Business...
Webinar Mastery Series: Email Retention Regulations in India and How Business...Webinar Mastery Series: Email Retention Regulations in India and How Business...
Webinar Mastery Series: Email Retention Regulations in India and How Business...Vaultastic
 
Introduction hippaa
Introduction hippaaIntroduction hippaa
Introduction hippaaTina Peña
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality12ort
 
Patient data privacy and E-Health Policy – Sri Lanka
Patient data privacy and E-Health Policy – Sri LankaPatient data privacy and E-Health Policy – Sri Lanka
Patient data privacy and E-Health Policy – Sri LankaDilshan Ranasinghe
 
Individual Health Identifier (Ireland) - Privacy Impact Assessment
Individual Health Identifier (Ireland) - Privacy Impact AssessmentIndividual Health Identifier (Ireland) - Privacy Impact Assessment
Individual Health Identifier (Ireland) - Privacy Impact Assessmentipposi
 
Hipaa training
Hipaa trainingHipaa training
Hipaa trainingjjgreen001
 

Tendances (20)

Privacy Ordinance in Hong Kong
Privacy Ordinance in Hong KongPrivacy Ordinance in Hong Kong
Privacy Ordinance in Hong Kong
 
Legislation protecting data and data systems
Legislation protecting data and data systemsLegislation protecting data and data systems
Legislation protecting data and data systems
 
What is HIPAA
What is HIPAAWhat is HIPAA
What is HIPAA
 
What is HIPAA
What is HIPAAWhat is HIPAA
What is HIPAA
 
Intro to information governance booklet
Intro to information governance bookletIntro to information governance booklet
Intro to information governance booklet
 
Webinar privacyawarenesswestviewpcn preview
Webinar privacyawarenesswestviewpcn previewWebinar privacyawarenesswestviewpcn preview
Webinar privacyawarenesswestviewpcn preview
 
HIPPA Security Presentation
HIPPA Security PresentationHIPPA Security Presentation
HIPPA Security Presentation
 
Computer Legislation2 T2
Computer Legislation2  T2Computer Legislation2  T2
Computer Legislation2 T2
 
TaylorWk1d2assignment
TaylorWk1d2assignmentTaylorWk1d2assignment
TaylorWk1d2assignment
 
Self-Sovereign Identity in Healthcare by Manny Nijjar from truu.id
Self-Sovereign Identity in Healthcare by Manny Nijjar from truu.idSelf-Sovereign Identity in Healthcare by Manny Nijjar from truu.id
Self-Sovereign Identity in Healthcare by Manny Nijjar from truu.id
 
Hipaa and You
Hipaa and YouHipaa and You
Hipaa and You
 
HiPAA info
HiPAA infoHiPAA info
HiPAA info
 
Webinar Mastery Series: Email Retention Regulations in India and How Business...
Webinar Mastery Series: Email Retention Regulations in India and How Business...Webinar Mastery Series: Email Retention Regulations in India and How Business...
Webinar Mastery Series: Email Retention Regulations in India and How Business...
 
Introduction hippaa
Introduction hippaaIntroduction hippaa
Introduction hippaa
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Patient data privacy and E-Health Policy – Sri Lanka
Patient data privacy and E-Health Policy – Sri LankaPatient data privacy and E-Health Policy – Sri Lanka
Patient data privacy and E-Health Policy – Sri Lanka
 
Individual Health Identifier (Ireland) - Privacy Impact Assessment
Individual Health Identifier (Ireland) - Privacy Impact AssessmentIndividual Health Identifier (Ireland) - Privacy Impact Assessment
Individual Health Identifier (Ireland) - Privacy Impact Assessment
 
Hipaa training
Hipaa trainingHipaa training
Hipaa training
 
Hippa presentation
Hippa presentationHippa presentation
Hippa presentation
 
HIPAA
HIPAAHIPAA
HIPAA
 

En vedette

Income Tax Refund Fraud
Income Tax Refund FraudIncome Tax Refund Fraud
Income Tax Refund FraudSkoda Minotti
 
Starting with PHP and Web devepolment
Starting with PHP and Web devepolmentStarting with PHP and Web devepolment
Starting with PHP and Web devepolmentRajib Ahmed
 
Fundamentals of taxation
Fundamentals of taxationFundamentals of taxation
Fundamentals of taxationSarah Surnil
 
General principles/Fundamentals of Taxation
General principles/Fundamentals of TaxationGeneral principles/Fundamentals of Taxation
General principles/Fundamentals of TaxationPhil Taxation
 

En vedette (8)

Income Tax Refund Fraud
Income Tax Refund FraudIncome Tax Refund Fraud
Income Tax Refund Fraud
 
Starting with PHP and Web devepolment
Starting with PHP and Web devepolmentStarting with PHP and Web devepolment
Starting with PHP and Web devepolment
 
10 things to know about tax refunds
10 things to know about tax refunds10 things to know about tax refunds
10 things to know about tax refunds
 
Taxation by vivienne cemine
Taxation by vivienne cemineTaxation by vivienne cemine
Taxation by vivienne cemine
 
Fundamentals of taxation
Fundamentals of taxationFundamentals of taxation
Fundamentals of taxation
 
General principles/Fundamentals of Taxation
General principles/Fundamentals of TaxationGeneral principles/Fundamentals of Taxation
General principles/Fundamentals of Taxation
 
Tax Planning in india
Tax Planning in indiaTax Planning in india
Tax Planning in india
 
Marketing project topics
Marketing project topicsMarketing project topics
Marketing project topics
 

Similaire à Data Protection Act principles summary

Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11mrmwood
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Actmrmwood
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Actmrmwood
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsHarrison Clark Rickerbys
 
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...Harrison Clark Rickerbys
 
New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsUlf Mattsson
 
Training innovations information governance slideshare 2015
Training innovations information governance slideshare 2015Training innovations information governance slideshare 2015
Training innovations information governance slideshare 2015Patrick Doyle
 
Australia Privacy Act of 1988
Australia Privacy Act of 1988Australia Privacy Act of 1988
Australia Privacy Act of 1988termsfeed
 
Auditing your EU entities for data protection compliance 5661651 1
Auditing your EU entities for data protection compliance 5661651 1Auditing your EU entities for data protection compliance 5661651 1
Auditing your EU entities for data protection compliance 5661651 1rtjbond
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsHarrison Clark Rickerbys
 
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...Harrison Clark Rickerbys
 
Safety And Security Of Data 4
Safety And Security Of Data 4Safety And Security Of Data 4
Safety And Security Of Data 4Wynthorpe
 
Did you implement GDPR already?
Did you implement GDPR already?Did you implement GDPR already?
Did you implement GDPR already?ECCRT
 
GDPR webinar presentation | LawBite
GDPR webinar presentation | LawBiteGDPR webinar presentation | LawBite
GDPR webinar presentation | LawBiteClive Rich
 
Dataprotectionactnew13 12-11-111213033116-phpapp02
Dataprotectionactnew13 12-11-111213033116-phpapp02Dataprotectionactnew13 12-11-111213033116-phpapp02
Dataprotectionactnew13 12-11-111213033116-phpapp02tinkusing
 
Annual environment and health conference 2018 fionnuala donohue hse epa data ...
Annual environment and health conference 2018 fionnuala donohue hse epa data ...Annual environment and health conference 2018 fionnuala donohue hse epa data ...
Annual environment and health conference 2018 fionnuala donohue hse epa data ...Environmental Protection Agency, Ireland
 
An introduction to data protection - 26 March 2014
An introduction to data protection - 26 March 2014An introduction to data protection - 26 March 2014
An introduction to data protection - 26 March 2014Rachel Aldighieri
 
Data Privacy and consent management .. .
Data Privacy and consent management  ..  .Data Privacy and consent management  ..  .
Data Privacy and consent management .. .ClinosolIndia
 

Similaire à Data Protection Act principles summary (20)

Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
Gdpr presentation
Gdpr presentationGdpr presentation
Gdpr presentation
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business Advisors
 
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
 
New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulations
 
Training innovations information governance slideshare 2015
Training innovations information governance slideshare 2015Training innovations information governance slideshare 2015
Training innovations information governance slideshare 2015
 
GDPR Presentation
GDPR PresentationGDPR Presentation
GDPR Presentation
 
Australia Privacy Act of 1988
Australia Privacy Act of 1988Australia Privacy Act of 1988
Australia Privacy Act of 1988
 
Auditing your EU entities for data protection compliance 5661651 1
Auditing your EU entities for data protection compliance 5661651 1Auditing your EU entities for data protection compliance 5661651 1
Auditing your EU entities for data protection compliance 5661651 1
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business Advisors
 
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
 
Safety And Security Of Data 4
Safety And Security Of Data 4Safety And Security Of Data 4
Safety And Security Of Data 4
 
Did you implement GDPR already?
Did you implement GDPR already?Did you implement GDPR already?
Did you implement GDPR already?
 
GDPR webinar presentation | LawBite
GDPR webinar presentation | LawBiteGDPR webinar presentation | LawBite
GDPR webinar presentation | LawBite
 
Dataprotectionactnew13 12-11-111213033116-phpapp02
Dataprotectionactnew13 12-11-111213033116-phpapp02Dataprotectionactnew13 12-11-111213033116-phpapp02
Dataprotectionactnew13 12-11-111213033116-phpapp02
 
Annual environment and health conference 2018 fionnuala donohue hse epa data ...
Annual environment and health conference 2018 fionnuala donohue hse epa data ...Annual environment and health conference 2018 fionnuala donohue hse epa data ...
Annual environment and health conference 2018 fionnuala donohue hse epa data ...
 
An introduction to data protection - 26 March 2014
An introduction to data protection - 26 March 2014An introduction to data protection - 26 March 2014
An introduction to data protection - 26 March 2014
 
Data Privacy and consent management .. .
Data Privacy and consent management  ..  .Data Privacy and consent management  ..  .
Data Privacy and consent management .. .
 

Plus de mrbennett2009 (19)

Creating A Website Using Dreamweaver
Creating A Website Using DreamweaverCreating A Website Using Dreamweaver
Creating A Website Using Dreamweaver
 
Web Intro
Web IntroWeb Intro
Web Intro
 
The Internet
The InternetThe Internet
The Internet
 
Systems Life Cycle
Systems Life CycleSystems Life Cycle
Systems Life Cycle
 
Storage
StorageStorage
Storage
 
Software
SoftwareSoftware
Software
 
Security
SecuritySecurity
Security
 
Public Information Systems
Public Information SystemsPublic Information Systems
Public Information Systems
 
Operating Systems
Operating SystemsOperating Systems
Operating Systems
 
Networking
NetworkingNetworking
Networking
 
Ict And Society
Ict And SocietyIct And Society
Ict And Society
 
Databases
DatabasesDatabases
Databases
 
Input And Output Devices
Input And Output DevicesInput And Output Devices
Input And Output Devices
 
Backup And File Management
Backup And File ManagementBackup And File Management
Backup And File Management
 
Computer Systems
Computer SystemsComputer Systems
Computer Systems
 
Control Intro
Control IntroControl Intro
Control Intro
 
Data Logging And Control
Data Logging And ControlData Logging And Control
Data Logging And Control
 
Computer Misuse Act
Computer Misuse ActComputer Misuse Act
Computer Misuse Act
 
Application Types
Application TypesApplication Types
Application Types
 

Dernier

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Dernier (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Data Protection Act principles summary

  • 2.
  • 3.
  • 4. Terminology Data Subject This is the person that the data is being collected from Personal data Covers facts and opinions regarding a living individual Data User Any person who needs to access the data as part of their job Data Controller This is often the person in charge of the organisation This is the person who must apply for permission to collect and store data Data Commissioner This is the person that enforces the data protection act
  • 5.
  • 6.
  • 7.
  • 8.