2 Private versus public. 2 Lesson objectives By the end of the session, you will: understand how you might unintentionally disclose personal data; define.

Slides:



Advertisements
Similar presentations
I. Positive IT has had a massive impact in the last 40 years. People rely on using technology to stay in touch with people. Technology has had a positive.
Advertisements

Legal & Regulatory Compliance. Overview What types of information should be included? What issues or problems might there be? What benefits could be obtained?
Administrative Systems and the Law What you need to know to produce an oral presentation for Unit 7 When the presentations will take place Resources you.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
Legislation in ICT.
1 Pertemuan 7 Points of Exposure Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
3 Is there something I should know? Exercising our rights.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Data Protection Act.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Personal Data (Privacy) Ordinance Hong Kong Personal Data (Privacy) Ordinance Hong Kong by Stephen Lau Privacy Commissioner for Personal Data Hong Kong.
An overview of the Data Protection Act Legal framework The Data Protection Act 1998 came into force in March 2001, replacing the Data Protection.
The Data Protection Act
Data Protection Act. Lesson Objectives To understand the data protection act.
 The Data Protection Act 1998 is an Act of Parliament which defines UK law on the processing of data on identifiable living people and it is the main.
The Legal Framework Can you work out which slide each bullet point should go on?!
The Information Commissioner’s Office David Evans.
1 AQA ICT AS Level © Nelson Thornes Data Protection Act.
Handling information 14 Standard.
Health & Social Care Apprenticeships & Diploma
Professional Values and Basic Business Legislation.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
The Data Protection Act (1998). The Data Protection Act allows you to Check if any organisation keeps information about you on computer or in paper form.
Data Protection: What You Need to Know Shauna Dunlop 1 July 2015.
What is personal data? Personal data is data about an individual which they consider to be private.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Data Protection Act (1984, 1998). 2 Data Protection Act There are many organisations which hold personal information about individuals Examples: Loyalty.
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
The Data Protection Act What the Act covers The misuse of personal data by organisations and businesses.
12/12/2015 Data Protection Act /12/2015 The DP Act A law that protects personal privacy and upholds individual’s rights Anyone who handles personal.
THE DATA PROTECTION ACT Data Protection Act 1998 DPA 1. Reasons2. People3. Principles 4. Exemptions 4 key points you need to learn/understand/revise.
LEGISLATION. DATA PROTECTION ACT (1998) The aim of this act give people the right to know what information is held about them. It also sets out rules.
Data Protection Act The Data Protection Act (DPA) is a balance between rights of the DATA SUBJECT and obligations of the DATA CONTROLLER DATA CONTROLLER.
Information Systems Unit 3.
Data Protection Act (1998).
Impacts of I.T. Ethical, Social, legal and economic impacts on I.T.
DATA PROTECTION ACT (DPA). WHAT IS THE DATA PROTECTION ACT?  The Data Protection Act The Data Protection Act (DPA) gives individuals the right.
Data Protection Philip Reed. Introduction What is data? What is data protection? Who needs your data? Who wants your data? Who does not need your data?
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
DATA PROTECTION ACT DATA PROTECTION ACT  Gives rights to data subjects (i.e. people who have data stored about them on a computer)  Information.
Computing and Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
Data protection act. During the second half of the 20th century, businesses, organisations and the government began using computers to store information.
The Data Protection Act 1998
The Data Protection Act 1998
Data protection and data sharing
Data Protection GCSE ICT Mrs N Steventon-2005.
Data Protection : A Practical Guide
Legislation in ICT.
Data Protection Act.
The Data Protection Act 1998
The Data Protection Act & ICT Law
Data Protection Act.
Data Protection and You
Unit 1 Effective Communication in Health and Social Care
Identify the laws and guidelines that affect day-to-day use of IT.
Data protection and data sharing
General Data Protection Regulations 2018
Legislation in ICT.
Personal Privacy and Security
Identify the laws and guidelines that affect day-to-day use of IT.
Presentation transcript:

2 Private versus public

2 Lesson objectives By the end of the session, you will: understand how you might unintentionally disclose personal data; define the kinds of personal data that should be kept secure; list some of the personal data likely to be held about you and the organisations likely to hold it; and describe your rights in relation to how organisations should store and use your data.

Lesson 2 Private versus public First consumer computer 1974 Today text messages are the most-used method for daily communication with family and friends 2013 Facebook registers 1bn users worldwide First mobile web access First text message from a phone First text message sent from computer. Facebook launched Text volume passes 1bn a month in the UK First mobile phone (weighs 1kg) World wide web born 1980 YouTube launched Amazon launches online shopping

Lesson 2 Private versus public Facebook registers 1bn users worldwide 2012 First mobile web access 1996 First text message from a phone 1993 First text message sent from computer Facebook launched 2004 Text volume passes 1bn a month in the UK 2001 First mobile phone (weighs 1kg) 1993 World wide web born 1990 YouTube launched 2005 Amazon launches online shopping 1995 First consumer computer 1974 Today text messages are the most-used method for daily communication with family and friends

Lesson 2 Private versus public The Information Commissioner’s Office (ICO) is the UK’s independent public authority set up to uphold information rights. We do this by promoting good practice, ruling on complaints, providing information to individuals and organisations and taking appropriate action when the law is broken.

Lesson 2 Private versus public The eight principles of the Data Protection Act Anyone who processes personal information must comply with these eight rules. They must make sure that personal information is: fairly and lawfully processed; processed for limited purposes; adequate, relevant and not excessive; accurate and up to date; not kept for longer than is necessary; processed in line with your rights; secure; and not transferred to other countries without adequate protection.

Lesson 2 Private versus public Something useful about data protection Something about the Data Protection Act Something worrying about data protection