Data Protection.

Slides:



Advertisements
Similar presentations
Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Advertisements

BT2103 Developing Small Systems for Business Lecture 2 Databases, Data Management, And The Legal Framework.
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
Legislation in ICT.
University of Sunderland Professionalism and Personal Skills Unit 11 Professionalism and Personal Skills Computer Legislation.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Data Protection Act.
Data Protection Act Description The Data Protection Act controls how your personal information can be used and protects from the misuse of your.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Data Protection Overview
The Data Protection Act
Data Protection Act. Lesson Objectives To understand the data protection act.
The Legal Framework Can you work out which slide each bullet point should go on?!
Limitations and Constraints on Marketing (1)
Regulation of Personal Information Daniel Pettitt, Leon Sewell and Matthew Pallot.
General Purpose Packages
3.4 Legal Implications. Overview Demonstrate knowledge and understanding of the Computer Misuse Act. Describe the roles of the BBFC (British Board of.
Elma Graham. To understand what data protection is To reflect on how data protection affects you To consider how you would safeguard the data of others.
The Data Protection Act 1998 The Eight Principles.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
The Data Protection Act (1998). The Data Protection Act allows you to Check if any organisation keeps information about you on computer or in paper form.
The Data Protection Act [1998]
What is personal data? Personal data is data about an individual which they consider to be private.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
Computing and Information Science 1 Databases START.
THE DATA PROTECTION ACT Data Protection Act 1998 DPA 1. Reasons2. People3. Principles 4. Exemptions 4 key points you need to learn/understand/revise.
Data Protection Act The Data Protection Act (DPA) is a balance between rights of the DATA SUBJECT and obligations of the DATA CONTROLLER DATA CONTROLLER.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
Data Protection Act (1998).
Legal Implications You need to know about the following:
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
Laws related to ICT   There are 4 laws that you might be asked about in the exams: Health & Safety at Work Act The Computer Misuse Act 1990 The Copyright,
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
DATA PROTECTION ACT (DPA). WHAT IS THE DATA PROTECTION ACT?  The Data Protection Act The Data Protection Act (DPA) gives individuals the right.
What is the Data Protection Act (DPA)? 1998 The Data Protection Act 1998 seeks to strike a balance between the rights of individuals and the sometimes.
Computing and Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
Presented by Ms. Teki Akuetteh LLM (IT and Telecom Law) 16/07/2013Data Protection Act, 2012: A call for Action1.
Data protection act. During the second half of the 20th century, businesses, organisations and the government began using computers to store information.
The Data Protection Act 1998
The Data Protection Act 1998
Learning Intention Legislations impact on security of information
PowerPoint presentation
Lesson 3 Protecting ICT systems Data Protection Act 1998.
Handout 2: Data Protection and Copyright
Legislation in ICT.
Data Protection Act.
Limitations and Constraints on Marketing (1)
TB2 Lesson 5 Data Protection
The Data Protection Act 1998
Data Protection Legislation
Understanding the issues related to the use of information
The Data Protection Act & ICT Law
Data Protection Act.
Unit 7 – Organisational Systems Security
Legal and Ethical Issues
What is the Data Protection Act (DPA)? 1998
Legislation in ICT.
#eaThinkData Get Ready for GDPR #eaThinkData.
Presentation transcript:

Data Protection

Who Knows What About Me Using “Who Knows What About Me.doc” make a list of all the organisations that hold personal data about you and how this data was gathered.

In this lesson students are learning about: data protection and computer misuse legislation threats to personal data methods of keeping data secure

At the end of this lesson students will be able to: outline the requirements of the Data Protection Act (DPA) and how this legislation is intended to prevent misuse of personal data by organisations give examples of non-compliance with the DPA describe threats to personal data and methods for keeping data secure

The Data Protection Act (DPA) The DPA sets rules for organisations that want to keep and process personal data. Task: use the information provided on the BBC Bitesize site to find out more about the DPA. http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/0dataprotectionactrev1.shtml

The Data Protection Act Specifies that personal data must be: fairly and lawfully obtained relevant for the stated purpose used only for the stated, lawful purpose(s) kept up-to-date and accurate kept for no longer than necessary kept secure

The data subject is entitled to: be supplied with a copy of the data held about them prevent processing likely to cause damage or distress prevent their data from being used for direct marketing compensation if they suffer damage as a result of any contravention of the Act have inaccurate data removed or corrected 'cooling off' period - you can cancel your purchase and get a full refund

Failing to comply Organisations are obliged to inform the ‘data subject’ of the purpose for which the data they are collecting will be used and to whom it will be disclosed. Revisit the privacy policies you found out about and summarised last lesson. Have these organisations complied with the law?

What happens if organisations don’t comply with the law? In pairs Look at “Failing To Comply.doc” Investigate one instance of failing to comply with the DPA and populate the relevant row of the table.

Threats to customer data and how to avoid them Work in pairs to identify possible threats to the customer data collected by an online retailer, using the table in Threats To Data.doc

The Computer Misuse Act Makes it illegal to gain unauthorised access to: a computer's software or data (hacking) - including the illegal copying of programs a computer's data with the intention of altering or deleting it – including planting viruses programs stored on a computer in order to copy them illegally (software piracy) 'cooling off' period - you can cancel your purchase and get a full refund

And finally… Homework task… Complete the “Exam practice.doc” worksheet