Security of, privacy of and access to personal/confidential information/data.

Slides:



Advertisements
Similar presentations
Legal & Regulatory Compliance. Overview What types of information should be included? What issues or problems might there be? What benefits could be obtained?
Advertisements

Administrative Systems and the Law What you need to know to produce an oral presentation for Unit 7 When the presentations will take place Resources you.
BIOMETRICS, CCTV & DATA PROTECTION By Drudeisha Madhub Data Protection Commissioner Date:
The Data Protection (Jersey) Law 2005.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
University of Sunderland Professionalism and Personal Skills Unit 11 Professionalism and Personal Skills Computer Legislation.
Duncan Woodhouse – Assistant Registrar for Information Security, Risk Management and Business Continuity Helen Wollerton – Administrative Officer (Legal.
Data Protection Act Description The Data Protection Act controls how your personal information can be used and protects from the misuse of your.
DATA PROTECTION AND PATIENT CONFIDENTIALITY IN RESEARCH Nic Drew Data Protection Manager University Hospital of Wales   
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Data Protection Overview
The Data Protection Act
Data Protection Act. Lesson Objectives To understand the data protection act.
 The Data Protection Act 1998 is an Act of Parliament which defines UK law on the processing of data on identifiable living people and it is the main.
The Legal Framework Can you work out which slide each bullet point should go on?!
CENTRAL SCOTLAND POLICE Data Protection & Information Security Stuart Macfarlane Information Governance Unit Police Service of Scotland.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
General Purpose Packages
Health & Social Care Apprenticeships & Diploma
EHRs and the European Union – current legislation and future directions. Dr Richard Fitton.
Research Paper Presentation Software Engineering in agent systems.
The Data Protection Act 1998 The Eight Principles.
Professional Values and Basic Business Legislation.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
Data Protection Act AS Module Heathcote Ch. 12.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
The Data Protection Act (1998). The Data Protection Act allows you to Check if any organisation keeps information about you on computer or in paper form.
Data Protection Corporate training Data Protection Act 1998 Replaces DPA 1994 EC directive 94/46/EC The Information Commissioner The courts.
Processing personal health data: the regulator’s perspective Ken Macdonald Assistant Commissioner Information Commissioner’s Office.
What is personal data? Personal data is data about an individual which they consider to be private.
The Data Protection Act - Confidentiality and Associated Problems.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
Data Protection Act (1984, 1998). 2 Data Protection Act There are many organisations which hold personal information about individuals Examples: Loyalty.
Everyone has a duty to comply with the Act, including employers, employees, trainees, self-employed, manufacturers, suppliers, designers, importers of.
Local Government Reform and Compliance with the DPA Ken Macdonald Assistant Commissioner (Scotland & Northern Ireland) Information Commissioner’s Office.
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
Data Protection Property Management Conference. What’s it got to do with me ? As a member of a management committee responsible for Guiding property you.
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
The Data Protection Act What the Act covers The misuse of personal data by organisations and businesses.
Welcome Topic : Security.
Data Protection Act The Data Protection Act (DPA) is a balance between rights of the DATA SUBJECT and obligations of the DATA CONTROLLER DATA CONTROLLER.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
University of Sunderland MSc HIM Computer Legislation.
Personal data protection in research projects
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Computing, Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
Data Protection Philip Reed. Introduction What is data? What is data protection? Who needs your data? Who wants your data? Who does not need your data?
DATA PROTECTION ACT INTRODUCTION The Data Protection Act 1998 came into force on the 1 st March It is more far reaching than its predecessor,
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
DATA PROTECTION ACT DATA PROTECTION ACT  Gives rights to data subjects (i.e. people who have data stored about them on a computer)  Information.
Computing and Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
Sharing Personal Data ‘What you need to know’ Corporate Information Governance Team Strategic Intelligence.
Clark Holt Limited (Co. No ), Hardwick House, Prospect Place, Swindon, SN1 3LJ Authorised and regulated by the Solicitors Regulation.
Data protection act. During the second half of the 20th century, businesses, organisations and the government began using computers to store information.
8 – Protecting Data and Security
The Data Protection Act 1998
The Data Protection Act 1998
Making the Connection ISO Master Class An Overview.
Data Protection GCSE ICT Mrs N Steventon-2005.
Data Protection and Confidentiality
Trevor Ellis Trainee Programmer (1981 – 28 years ago)
General Data Protection Regulation
Data Protection Act.
The Data Protection Act 1998
Anonymised information
Data Protection Act.
Dr Elizabeth Lomas The General Data Protection Regulation (GDPR): Changing the data protection landscape Dr Elizabeth Lomas
Presentation transcript:

Security of, privacy of and access to personal/confidential information/data

Anonymised information Information about individuals without mentioning the person by name is called anonymised information. Where anonymised information would be sufficient for a particular purpose, organisations should always omit personal details wherever possible.

Aggregated information Aggregated information is where personal details of individuals are combined to provide information without naming those individuals. This could be in the form of medical information regarding a list of patients who are suffering from a certain illness.

Duty of confidence the duty of confidentiality obliges employees to respect the confidentiality of individuals. Information that employees obtain about individuals affairs must be kept confidential, and must not be used for the benefit of persons not authorised by the individual

Duty of fidelity An employee must be loyal to their employer for so long as they work for them. That means that they must not tell any rival companies about their work. Once an employee leaves a company they are free to use the skills and knowledge with their new employer.

Why was suspected child offender allowed to work in a school, which lead to him murdering these two girls?

Because he was only ‘suspected’ and never found guilty. The police wouldn’t realise this data to the school, due to data protection

What is the Data protection legislation? Data protection acts exist in most countries. These set down rules for keeping data private as well as confidential.

What are the eight principles of the DPA? Personal data shall be processed fairly and lawfully. Personal data shall be obtained only for the purpose and shall not be used for anything other than the purpose

Personal data shall be adequate, relevant and not excessive in relation to the purpose (or purposes) for which they are processed.

Personal data shall be accurate and, where necessary, kept up to date. Personal data processed for any purpose shall not be kept for longer than necessary

Personal data shall be processed in accordance with the rights of data subjects. Appropriate security measures shall be taken against unauthorised or unlawful processing data. Including loss / leaks.

Personal data shall not be transferred to a country outside the EU unless that country guarantees the same level of data protection.

Phishing My username My password

Pharming Instead of an being sent with a fake link. Imagine you goto HSBC.ae and the site has been ‘hacked’. It looks correct But you login and it doesn’t work. Pharming is when the site or DNS is hacked, this is down to banks to check this

Spyware Software that is accidently downloaded. Allows ‘creator of the software’ to be able to spy on you. Most anti-virus will detect spyware as well.

Anonymized vs Aggregated

Usefulness of aggregated information

Safe guarding privacy

Duty of Confidence

Anonymized vs aggregated

Problems with aggregated information

Security Measures In order to protect personal information from unauthorized access, a number of security measures need to be put in place: o Usernames – gives individuals access to various parts of the system o Password – prevents unauthorized access to the system o Biometrics - finger print/ eye recoginition as an alternative to passwords o Firewalls – software for preventing hackers to accessing the system o Encryption – scrambles the information so it cant be read by any unauthorized user. A decryption key is issued to authorized users to decrypt data.

Social and Ethical Issues Discuss the following in relation to the breach of data privacy : SOCIAL Issues: How will it impact society? Privacy Reliability and integrity Security ETHICAL Issue: Differentiating between the right and wrong/LAWs Breach of the Data Protection Act Duty of Confidence Duty of infidelity