SlideShare une entreprise Scribd logo
1  sur  12
Data Protection Act 17 1
Computers and privacy
 There are problems as more computers are used
 More and more information is stored on computers.
 By linking the information gained by several computers together so it is
possible to build up complete picture of person's life.
 So in this way privacy of a person will become less
 A person goes to abroad then computer stored these kinds of information
 Example:
 Travel companies computers data
 Bank’s computers
 Travel insurance companies
 Library
Data Protection Act 17 2
Loyalty cards
 Large store chains now have what is called a loyalty card
scheme
 Each time customer uses the card, points are added
 When the no of points earned reaches a certain value
customers are given voucher
 Working of Loyalty cards
 Fills an application forms
 Customer is given a loyalty card that contain magnetic strip
 When making their purchases the loyalty card links the
customers to their purchases
 Card adds certain no of points based on their bill and the items
bought to the total
Data Protection Act 17 3
Store things added few information
 What newspaper and magazines you read
 What drink u like
 The method of purchase
 Whether u have petrol or gas car
 What pets you have
 Why electronic stored information is easier
 Cross referencing
 Danger of hacking
 Making alterations
 Faster access to data
Data Protection Act 17 4
Reason behind data protection
 As more and more information come to be
stored on computers much of its personal data
about individuals, there became the need for
some sort of control over the way that it was
collected and the way it could be used
Data Protection Act 17 5
1998 Data Protection Act
 This act replaces the earlier Data Protection Act 1984
 Covers manually held data not covered by the earlier
Act
 This act covers the processing of data either manually
or by the computer
 This act deal with some of the things that were not
around when the older act was introduced like
 Internet
 Loyalty card
 Use of huge database for marketing purposes
Data Protection Act 17 6
Eight Principles
The Eight Principles
Principle What it means
Personal data should be obtained and
processed fairly and lawfully
This means that you should be told that data is being collected about
you, and you should know what the data will be used for.
Personal data can be held only for specified
and lawful purposes
The Data Controller has to state why they want to collect and store
information when they apply for permission to be able to do so.
If they use the data they have collected for other purposes, they
are breaking the law.
Personal data should be adequate, relevant
and not excessive for the required
purpose
Organisations should only collect the data that they need and no
more. Your school needs to know your parent's phone number
in case they need to contact them in an emergency. However,
they do not need to know what your grandmother's name is, nor
do they need to know your eye co lour. They should not ask,
nor should they store such details since this would be excessive
and would not be required to help with your education.
Personal data should be accurate and kept
up-to-date
Companies should do their best to make sure that they do not record
the wrong facts about a data subject. Your school probably asks
your parents to check a form once a year to make sure that the
phone number and address on the school system is still
correct.If a person asks for the information to be changed, the
company should comply if it can be proved that the information
is indeed incorrect.
Data Protection Act 17 7
Personal data should not be kept
for longer than is necessary
Organisations should only keep personal data for a
reasonable length of time. Hospitals might need to keep
patient records for 25 years or more, that is acceptable
since they may need that information to treat an illness
later on. However, there is no need for a personnel
department to keep the application forms of unsuccessful
job applicants.
Data must be processed in
accordance with the rights of the data
subject
People have the right to inspect the information held on
them (except in certain circumstance - see later). If the
data being held on them is incorrect, they have the right to
have it changed.
Appropriate security measures must
be taken against unauthorised access
This means information has to be kept safe from hackers
and employees who don't have rights to see it. Data must
also be safeguarded against accidental loss.
Personal data cannot be transferred to
countries outside the E.U. unless the
country has similar legislation to the
D.P.A.
This means that if a company wishes to share data with an
organisation in a different country, that country must have
similar laws to our Data Protection Act in place.
Principles
Data Protection Act 17 8
Sensitive Personal Data
 The Act mentions data called sensitive personal data,
which may not be disclosed.
 This include the following information.
 Ethnic origin of the data subjects
 Their political opinions
 Their religious beliefs
 Whether or not they are member of a trade union.
 Their physical or mental health condition
 The commission or alleged commission by them of
any offence
Data Protection Act 17 9
Data Subject
 Every one whether we like it or not is a data subject, because organizations and
companies ,called data users holds personal details
 Your rights to see personal details about held on computer or manually
 Data Controller:
 Means a person who determine the purpose for which and the manner in which
any personal data is processed.
 The data controller is therefore the person who decides what to do with the data
once it has been entered onto the system.
 Example:
 If you rent a TV, then your details will be automatically passed the TV licence
centre. The driver and Vehicle licence authority is linked to the police National
computer
 Data Commissioner
 This is the person who enforces the Data Protection Act.
 This is the person that organisations need to apply to in order to gain permission
to collect and store personal data.
Data Protection Act 17 10
People Rights of data subjects
 A Right of Subject Access
 A data subject has a right to be supplied by a data controller
with the personal data held about him or her. The data
controller can charge for this: usually a few pounds.
 A Right of Correction
 A data subject may force a data controller to correct any
mistakes in the data held about them.
 A Right to Prevent Distress
 A data subject may prevent the use of information if it would
be likely to cause them distress.
 A Right to Prevent Direct Marketing
 A data subject may stop their data being used in attempts to
sell them things (eg by junk mail or cold telephone calls.)
Data Protection Act 17 11
 A Right to Prevent Automatic Decisions
 A data subject may specify that they do not want a data user
to make "automated" decisions about them where, through
points scoring, a computer decides on, for example, a loan
application.
 A Right of Complaint to the Information Commissioner
 A data subject can ask for the use of their personal data to be
reviewed by the Information Commissioner who can enforce a
ruling using the Act. The Commissioner may inspect a
controller's computers to help in the investigation.
 A Right to Compensation
 The data subject is entitled to use the law to get compensation
for damage caused ("damages") if personal data about them is
inaccurate, lost, or disclosed.
Data Protection Act 17 12
Your right as a data subject
 You have the right to see any personal details about you held on
computer or held manually.
 You also have the right to a description of the data being
processed.
 You do not however have the right to see all the information
held about you.
 There are following purposes
 The prevention or detection of crime.
 Catching or prosecuting offenders
 Collecting taxes or duty
 Medical or social worker's report in some instance.

Contenu connexe

Tendances

Intercity technology - GDPR your training toolkit
Intercity technology - GDPR your training toolkitIntercity technology - GDPR your training toolkit
Intercity technology - GDPR your training toolkitjoshquarrie
 
Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Russell_Kennedy
 
Data Protection & Privacy in Malaysian Total Hospital Information System
Data Protection & Privacy in Malaysian Total Hospital Information SystemData Protection & Privacy in Malaysian Total Hospital Information System
Data Protection & Privacy in Malaysian Total Hospital Information SystemQuotient Consulting
 
HIPAA Privacy, Security, Breach Overview
HIPAA Privacy, Security, Breach OverviewHIPAA Privacy, Security, Breach Overview
HIPAA Privacy, Security, Breach OverviewHealthCare Too, LLC
 
Personal Data Protection Act - Employee Data Privacy
Personal Data Protection Act - Employee Data PrivacyPersonal Data Protection Act - Employee Data Privacy
Personal Data Protection Act - Employee Data PrivacylegalPadmin
 
Biometric Personal Data, Legal and Technological Utilization Issues
Biometric Personal Data, Legal and Technological Utilization IssuesBiometric Personal Data, Legal and Technological Utilization Issues
Biometric Personal Data, Legal and Technological Utilization IssuesGiannisBasa
 
Privacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterPrivacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterJonathan Ezor
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data SecurityWilmerHale
 
An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill Komal Gadia
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theftAmber Gupta
 
Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Andrew Sharpe
 
Personal Data Protection in Malaysia
Personal Data Protection in MalaysiaPersonal Data Protection in Malaysia
Personal Data Protection in Malaysiakhenghoe
 

Tendances (20)

Intercity technology - GDPR your training toolkit
Intercity technology - GDPR your training toolkitIntercity technology - GDPR your training toolkit
Intercity technology - GDPR your training toolkit
 
Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)
 
Apple Report Privacy of its Users
Apple Report Privacy of its UsersApple Report Privacy of its Users
Apple Report Privacy of its Users
 
Data Protection & Privacy in Malaysian Total Hospital Information System
Data Protection & Privacy in Malaysian Total Hospital Information SystemData Protection & Privacy in Malaysian Total Hospital Information System
Data Protection & Privacy in Malaysian Total Hospital Information System
 
Star II sme hotline 21.01.20
Star II sme hotline 21.01.20Star II sme hotline 21.01.20
Star II sme hotline 21.01.20
 
HIPAA Privacy, Security, Breach Overview
HIPAA Privacy, Security, Breach OverviewHIPAA Privacy, Security, Breach Overview
HIPAA Privacy, Security, Breach Overview
 
GDPR FAQ'S
GDPR FAQ'SGDPR FAQ'S
GDPR FAQ'S
 
Personal Data Protection Act - Employee Data Privacy
Personal Data Protection Act - Employee Data PrivacyPersonal Data Protection Act - Employee Data Privacy
Personal Data Protection Act - Employee Data Privacy
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Personal Data Protection in Malaysia
Personal Data Protection in MalaysiaPersonal Data Protection in Malaysia
Personal Data Protection in Malaysia
 
Professional issues in IT
Professional issues in IT Professional issues in IT
Professional issues in IT
 
Biometric Personal Data, Legal and Technological Utilization Issues
Biometric Personal Data, Legal and Technological Utilization IssuesBiometric Personal Data, Legal and Technological Utilization Issues
Biometric Personal Data, Legal and Technological Utilization Issues
 
Privacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterPrivacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law Center
 
GDPR Whitepaper
GDPR WhitepaperGDPR Whitepaper
GDPR Whitepaper
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theft
 
EU GDPR (training)
EU GDPR (training)  EU GDPR (training)
EU GDPR (training)
 
Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Data Protection (Download for slideshow)
Data Protection (Download for slideshow)
 
Personal Data Protection in Malaysia
Personal Data Protection in MalaysiaPersonal Data Protection in Malaysia
Personal Data Protection in Malaysia
 

En vedette

Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityJisc Scotland
 
Medical informatics
Medical informaticsMedical informatics
Medical informaticsmigom doley
 
Eysenbach: Consumer health informatics
Eysenbach: Consumer health informaticsEysenbach: Consumer health informatics
Eysenbach: Consumer health informaticsGunther Eysenbach
 
Health Informatics & eHealth: Application of ICT for Health
Health Informatics & eHealth: Application of ICT for HealthHealth Informatics & eHealth: Application of ICT for Health
Health Informatics & eHealth: Application of ICT for HealthNawanan Theera-Ampornpunt
 
Clinical Decision Support Systems - Sunil Nair Health Informatics Dalhousie U...
Clinical Decision Support Systems - Sunil Nair Health Informatics Dalhousie U...Clinical Decision Support Systems - Sunil Nair Health Informatics Dalhousie U...
Clinical Decision Support Systems - Sunil Nair Health Informatics Dalhousie U...Sunil Nair
 
Oracle Health and Safety at work act 1974
Oracle Health and Safety at work act 1974Oracle Health and Safety at work act 1974
Oracle Health and Safety at work act 1974dannyparkinson
 

En vedette (7)

Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information Security
 
Health Informatics and Patient Safety
Health Informatics and Patient SafetyHealth Informatics and Patient Safety
Health Informatics and Patient Safety
 
Medical informatics
Medical informaticsMedical informatics
Medical informatics
 
Eysenbach: Consumer health informatics
Eysenbach: Consumer health informaticsEysenbach: Consumer health informatics
Eysenbach: Consumer health informatics
 
Health Informatics & eHealth: Application of ICT for Health
Health Informatics & eHealth: Application of ICT for HealthHealth Informatics & eHealth: Application of ICT for Health
Health Informatics & eHealth: Application of ICT for Health
 
Clinical Decision Support Systems - Sunil Nair Health Informatics Dalhousie U...
Clinical Decision Support Systems - Sunil Nair Health Informatics Dalhousie U...Clinical Decision Support Systems - Sunil Nair Health Informatics Dalhousie U...
Clinical Decision Support Systems - Sunil Nair Health Informatics Dalhousie U...
 
Oracle Health and Safety at work act 1974
Oracle Health and Safety at work act 1974Oracle Health and Safety at work act 1974
Oracle Health and Safety at work act 1974
 

Similaire à Ch 17 data protections act

Bahrain-Personal-Data-Protection-Law.pdf
Bahrain-Personal-Data-Protection-Law.pdfBahrain-Personal-Data-Protection-Law.pdf
Bahrain-Personal-Data-Protection-Law.pdfDaviesParker
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-finalDr. Donald Macfarlane
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalDr. Donald Macfarlane
 
Guide to-the-general-data-protection-regulation
Guide to-the-general-data-protection-regulationGuide to-the-general-data-protection-regulation
Guide to-the-general-data-protection-regulationN N
 
Safety And Security Of Data 4
Safety And Security Of Data 4Safety And Security Of Data 4
Safety And Security Of Data 4Wynthorpe
 
Privacy and Civil Liberties
Privacy and Civil LibertiesPrivacy and Civil Liberties
Privacy and Civil LibertiesUpekha Vandebona
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11mrmwood
 
The principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - ukThe principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - uk- Mark - Fullbright
 
Legislation
LegislationLegislation
Legislationmegabyte
 
GDPR Data Subject Rights - What You Need to Know
GDPR Data Subject Rights - What You Need to KnowGDPR Data Subject Rights - What You Need to Know
GDPR Data Subject Rights - What You Need to KnowPiwik PRO
 
Who owns your data ans why should you care
Who owns your data ans why should you careWho owns your data ans why should you care
Who owns your data ans why should you careDerek Keats
 
3e - Data Protection
3e - Data Protection3e - Data Protection
3e - Data ProtectionMISY
 
GDPR: data needs to be in safe hands
GDPR: data needs to be in safe hands GDPR: data needs to be in safe hands
GDPR: data needs to be in safe hands legalandgeneral
 
Tangible Data Protection White Paper
Tangible Data Protection White PaperTangible Data Protection White Paper
Tangible Data Protection White PaperNick Banbury
 
How to get your business GDPR ready
How to get your business GDPR readyHow to get your business GDPR ready
How to get your business GDPR readyPremier EPOS
 
Computer Legislation2 T2
Computer Legislation2  T2Computer Legislation2  T2
Computer Legislation2 T2lees_ush
 

Similaire à Ch 17 data protections act (20)

Gdpr in a nutshell
Gdpr in a nutshellGdpr in a nutshell
Gdpr in a nutshell
 
Bahrain-Personal-Data-Protection-Law.pdf
Bahrain-Personal-Data-Protection-Law.pdfBahrain-Personal-Data-Protection-Law.pdf
Bahrain-Personal-Data-Protection-Law.pdf
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
Guide to-the-general-data-protection-regulation
Guide to-the-general-data-protection-regulationGuide to-the-general-data-protection-regulation
Guide to-the-general-data-protection-regulation
 
Safety And Security Of Data 4
Safety And Security Of Data 4Safety And Security Of Data 4
Safety And Security Of Data 4
 
Privacy and Civil Liberties
Privacy and Civil LibertiesPrivacy and Civil Liberties
Privacy and Civil Liberties
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11
 
The principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - ukThe principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - uk
 
How to Protect Your Data
How to Protect Your DataHow to Protect Your Data
How to Protect Your Data
 
Legislation
LegislationLegislation
Legislation
 
Privacy - USC 2005
Privacy - USC 2005Privacy - USC 2005
Privacy - USC 2005
 
GDPR Data Subject Rights - What You Need to Know
GDPR Data Subject Rights - What You Need to KnowGDPR Data Subject Rights - What You Need to Know
GDPR Data Subject Rights - What You Need to Know
 
Who owns your data ans why should you care
Who owns your data ans why should you careWho owns your data ans why should you care
Who owns your data ans why should you care
 
3e - Data Protection
3e - Data Protection3e - Data Protection
3e - Data Protection
 
GDPR: data needs to be in safe hands
GDPR: data needs to be in safe hands GDPR: data needs to be in safe hands
GDPR: data needs to be in safe hands
 
Tangible Data Protection White Paper
Tangible Data Protection White PaperTangible Data Protection White Paper
Tangible Data Protection White Paper
 
How to get your business GDPR ready
How to get your business GDPR readyHow to get your business GDPR ready
How to get your business GDPR ready
 
Computer Legislation2 T2
Computer Legislation2  T2Computer Legislation2  T2
Computer Legislation2 T2
 
An Overview of GDPR
An Overview of GDPR An Overview of GDPR
An Overview of GDPR
 

Plus de Khan Yousafzai

09.1 types of computer operation
09.1   types of computer operation09.1   types of computer operation
09.1 types of computer operationKhan Yousafzai
 
8.2 system analysis and design
8.2 system analysis and design8.2 system analysis and design
8.2 system analysis and designKhan Yousafzai
 
8.1 alogorithm & prolem solving
8.1 alogorithm & prolem solving8.1 alogorithm & prolem solving
8.1 alogorithm & prolem solvingKhan Yousafzai
 
Ch 22 the electronic office
Ch 22 the electronic officeCh 22 the electronic office
Ch 22 the electronic officeKhan Yousafzai
 
Ch 21 computer and your health
Ch 21 computer and your healthCh 21 computer and your health
Ch 21 computer and your healthKhan Yousafzai
 
Ch 19. social and economic effects of it
Ch 19. social and economic effects of itCh 19. social and economic effects of it
Ch 19. social and economic effects of itKhan Yousafzai
 
Ch 15 .networks and communications
Ch 15 .networks and communicationsCh 15 .networks and communications
Ch 15 .networks and communicationsKhan Yousafzai
 
Ch 14. weather forecasting ( application of data logging)
Ch 14. weather forecasting ( application of data logging)Ch 14. weather forecasting ( application of data logging)
Ch 14. weather forecasting ( application of data logging)Khan Yousafzai
 
Ch 12 describing information system
Ch 12 describing information systemCh 12 describing information system
Ch 12 describing information systemKhan Yousafzai
 
Ch 11 ways of presenting data
Ch 11 ways of presenting dataCh 11 ways of presenting data
Ch 11 ways of presenting dataKhan Yousafzai
 
Ch 9 types of computer operations
Ch 9 types of computer operationsCh 9 types of computer operations
Ch 9 types of computer operationsKhan Yousafzai
 
Ch 6 collecting your data
Ch 6 collecting your dataCh 6 collecting your data
Ch 6 collecting your dataKhan Yousafzai
 
18 computers and the law
18   computers and the law18   computers and the law
18 computers and the lawKhan Yousafzai
 

Plus de Khan Yousafzai (20)

14 data logging
14   data logging14   data logging
14 data logging
 
09.1 types of computer operation
09.1   types of computer operation09.1   types of computer operation
09.1 types of computer operation
 
8.2 system analysis and design
8.2 system analysis and design8.2 system analysis and design
8.2 system analysis and design
 
8.1 alogorithm & prolem solving
8.1 alogorithm & prolem solving8.1 alogorithm & prolem solving
8.1 alogorithm & prolem solving
 
Ch 26 the internet
Ch 26 the internetCh 26 the internet
Ch 26 the internet
 
Ch 22 the electronic office
Ch 22 the electronic officeCh 22 the electronic office
Ch 22 the electronic office
 
Ch 21 computer and your health
Ch 21 computer and your healthCh 21 computer and your health
Ch 21 computer and your health
 
Ch 19. social and economic effects of it
Ch 19. social and economic effects of itCh 19. social and economic effects of it
Ch 19. social and economic effects of it
 
Ch 16 system security
Ch 16 system securityCh 16 system security
Ch 16 system security
 
Ch 15 .networks and communications
Ch 15 .networks and communicationsCh 15 .networks and communications
Ch 15 .networks and communications
 
Ch 14. weather forecasting ( application of data logging)
Ch 14. weather forecasting ( application of data logging)Ch 14. weather forecasting ( application of data logging)
Ch 14. weather forecasting ( application of data logging)
 
Ch 13 system analysis
Ch 13 system analysisCh 13 system analysis
Ch 13 system analysis
 
Ch 12 describing information system
Ch 12 describing information systemCh 12 describing information system
Ch 12 describing information system
 
Ch 11 ways of presenting data
Ch 11 ways of presenting dataCh 11 ways of presenting data
Ch 11 ways of presenting data
 
Ch 9 types of computer operations
Ch 9 types of computer operationsCh 9 types of computer operations
Ch 9 types of computer operations
 
Ch 8 data base
Ch 8 data baseCh 8 data base
Ch 8 data base
 
Ch 6 collecting your data
Ch 6 collecting your dataCh 6 collecting your data
Ch 6 collecting your data
 
Ch10 data transfer
Ch10 data transferCh10 data transfer
Ch10 data transfer
 
23 simulations
23   simulations23   simulations
23 simulations
 
18 computers and the law
18   computers and the law18   computers and the law
18 computers and the law
 

Dernier

Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Dernier (20)

Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 

Ch 17 data protections act

  • 1. Data Protection Act 17 1 Computers and privacy  There are problems as more computers are used  More and more information is stored on computers.  By linking the information gained by several computers together so it is possible to build up complete picture of person's life.  So in this way privacy of a person will become less  A person goes to abroad then computer stored these kinds of information  Example:  Travel companies computers data  Bank’s computers  Travel insurance companies  Library
  • 2. Data Protection Act 17 2 Loyalty cards  Large store chains now have what is called a loyalty card scheme  Each time customer uses the card, points are added  When the no of points earned reaches a certain value customers are given voucher  Working of Loyalty cards  Fills an application forms  Customer is given a loyalty card that contain magnetic strip  When making their purchases the loyalty card links the customers to their purchases  Card adds certain no of points based on their bill and the items bought to the total
  • 3. Data Protection Act 17 3 Store things added few information  What newspaper and magazines you read  What drink u like  The method of purchase  Whether u have petrol or gas car  What pets you have  Why electronic stored information is easier  Cross referencing  Danger of hacking  Making alterations  Faster access to data
  • 4. Data Protection Act 17 4 Reason behind data protection  As more and more information come to be stored on computers much of its personal data about individuals, there became the need for some sort of control over the way that it was collected and the way it could be used
  • 5. Data Protection Act 17 5 1998 Data Protection Act  This act replaces the earlier Data Protection Act 1984  Covers manually held data not covered by the earlier Act  This act covers the processing of data either manually or by the computer  This act deal with some of the things that were not around when the older act was introduced like  Internet  Loyalty card  Use of huge database for marketing purposes
  • 6. Data Protection Act 17 6 Eight Principles The Eight Principles Principle What it means Personal data should be obtained and processed fairly and lawfully This means that you should be told that data is being collected about you, and you should know what the data will be used for. Personal data can be held only for specified and lawful purposes The Data Controller has to state why they want to collect and store information when they apply for permission to be able to do so. If they use the data they have collected for other purposes, they are breaking the law. Personal data should be adequate, relevant and not excessive for the required purpose Organisations should only collect the data that they need and no more. Your school needs to know your parent's phone number in case they need to contact them in an emergency. However, they do not need to know what your grandmother's name is, nor do they need to know your eye co lour. They should not ask, nor should they store such details since this would be excessive and would not be required to help with your education. Personal data should be accurate and kept up-to-date Companies should do their best to make sure that they do not record the wrong facts about a data subject. Your school probably asks your parents to check a form once a year to make sure that the phone number and address on the school system is still correct.If a person asks for the information to be changed, the company should comply if it can be proved that the information is indeed incorrect.
  • 7. Data Protection Act 17 7 Personal data should not be kept for longer than is necessary Organisations should only keep personal data for a reasonable length of time. Hospitals might need to keep patient records for 25 years or more, that is acceptable since they may need that information to treat an illness later on. However, there is no need for a personnel department to keep the application forms of unsuccessful job applicants. Data must be processed in accordance with the rights of the data subject People have the right to inspect the information held on them (except in certain circumstance - see later). If the data being held on them is incorrect, they have the right to have it changed. Appropriate security measures must be taken against unauthorised access This means information has to be kept safe from hackers and employees who don't have rights to see it. Data must also be safeguarded against accidental loss. Personal data cannot be transferred to countries outside the E.U. unless the country has similar legislation to the D.P.A. This means that if a company wishes to share data with an organisation in a different country, that country must have similar laws to our Data Protection Act in place. Principles
  • 8. Data Protection Act 17 8 Sensitive Personal Data  The Act mentions data called sensitive personal data, which may not be disclosed.  This include the following information.  Ethnic origin of the data subjects  Their political opinions  Their religious beliefs  Whether or not they are member of a trade union.  Their physical or mental health condition  The commission or alleged commission by them of any offence
  • 9. Data Protection Act 17 9 Data Subject  Every one whether we like it or not is a data subject, because organizations and companies ,called data users holds personal details  Your rights to see personal details about held on computer or manually  Data Controller:  Means a person who determine the purpose for which and the manner in which any personal data is processed.  The data controller is therefore the person who decides what to do with the data once it has been entered onto the system.  Example:  If you rent a TV, then your details will be automatically passed the TV licence centre. The driver and Vehicle licence authority is linked to the police National computer  Data Commissioner  This is the person who enforces the Data Protection Act.  This is the person that organisations need to apply to in order to gain permission to collect and store personal data.
  • 10. Data Protection Act 17 10 People Rights of data subjects  A Right of Subject Access  A data subject has a right to be supplied by a data controller with the personal data held about him or her. The data controller can charge for this: usually a few pounds.  A Right of Correction  A data subject may force a data controller to correct any mistakes in the data held about them.  A Right to Prevent Distress  A data subject may prevent the use of information if it would be likely to cause them distress.  A Right to Prevent Direct Marketing  A data subject may stop their data being used in attempts to sell them things (eg by junk mail or cold telephone calls.)
  • 11. Data Protection Act 17 11  A Right to Prevent Automatic Decisions  A data subject may specify that they do not want a data user to make "automated" decisions about them where, through points scoring, a computer decides on, for example, a loan application.  A Right of Complaint to the Information Commissioner  A data subject can ask for the use of their personal data to be reviewed by the Information Commissioner who can enforce a ruling using the Act. The Commissioner may inspect a controller's computers to help in the investigation.  A Right to Compensation  The data subject is entitled to use the law to get compensation for damage caused ("damages") if personal data about them is inaccurate, lost, or disclosed.
  • 12. Data Protection Act 17 12 Your right as a data subject  You have the right to see any personal details about you held on computer or held manually.  You also have the right to a description of the data being processed.  You do not however have the right to see all the information held about you.  There are following purposes  The prevention or detection of crime.  Catching or prosecuting offenders  Collecting taxes or duty  Medical or social worker's report in some instance.