Chapter 9- Security of Data

Descripción

Fichas sobre Chapter 9- Security of Data, creado por lovelylaw2 el 17/10/2013.
lovelylaw2
Fichas por lovelylaw2, actualizado hace más de 1 año
lovelylaw2
Creado por lovelylaw2 hace alrededor de 11 años
36
2

Resumen del Recurso

Pregunta Respuesta
What is the data protection act? When was it set up? The data protection act was set up in 1998 and is a set of rules for people or organisations that store data must follow.
What is the purpose of the data protection act? Its purpose is to protect the privacy of the individual so that information cannot be given or sold to businesses without the individual's consent. It gives the individual right to check the data.
What are the 8 principles of the act? (1-2) 1. data must be obtained and kept within the law. The data controller must be registered with the data commissioner and must ask the data subject for permission for the data to be used. 2. The data controller must only use the data for the purpose he has permission for.
What are the 8 principles of the act? (3-6) 3. The data must be relevant and not excessive; the data controller must not collect more than is necessary. 4. The data must be accurate and kept up to date 5. The data should not be kept for longer than necessary.
What are the 8 principles of the act? (6-8) 6. The data subject must be allowed to look at the data and it must be kept in accordance to his rights 7. The data must be kept securely so that only those who are allowed to access it do so 8. Data can only be used within the European Union unless another country has similar data protection laws to the EU's
What is a loyalty card? A loyalty card is a card that customers sign up for to collect deals and promotions from being a repeat customer e.g. Tesco clubcard
Who uses loyalty cards? The customer uses the loyalty card by showing it with each purchase and therefore gets discounts. The store uses the information to send specific promotions and deals to those depending on their spending e.g. constant nappy purchases suggests they have a child
How can you store data securely? You can by using.... -Passwords -Firewalls -Screen savers -Encryption -Virus Protection
what is a data controller? A data controller is the person who holds the information about others
What is a data subject? A data subject is the person who's information is being collected and used by the controller
What is a firewall? A firewall is a software function that allows or denies people access who are attempting to access the system based on a set of rules.
What is the purpose of a firewall? The purpose is to prevent or delay access to the internal network of a computer. The software checks data and IP (internet provider) addresses and can prevent access by viruses, malware (harmful software) and the wrong sort of downloads/ uploads.
What is a secure password? A secure password uses a range of characters and numbers and punctuation e.g. Hj8-olX. This lowers the risk of infiltration. Specific data can be set passwords to be seen or altered.
What is a screen saver? A screen saver is a type of computer programme that prevents damage to computer monitors by blanking the screen. On their own, screen savers don't make data secure, they need a password to. But it stops people seeing private files.
What is encryption? Means putting data into a secret code. Sensitive data can be put in code to prevent theft. You would need to purchase specialist software that uses an algorithm which is a set of rules to decrypt the information
What is virus protection? Is a type of software programme that prevents the corruption or loss of data. It identifies viruses or harmful software and removes them
Mostrar resumen completo Ocultar resumen completo

Similar

Security of Data
justsomeuser98
Test de Auxiliar de Enfermeria para repaso
leyvamiri
Test sobre Julio Cortázar
crisferroeldeluna
Leyes de Mendel
crisferroeldeluna
MATEMÁTICAS PRIMARIA
Ulises Yo
El Humanismo
Alonso Grimaldo
Cómo Usar la Plantilla del Plan de Estudio de 5 Minutos
Diego Santos
Grupos funcionales (Bioquímica)
Nadim Bissar
Límites
Cesar Morgado
2.2 LOS MEDIOS DE TELECOMUNICACIONES I
antonio del valle
LEY 1/2000 ENJUICIAMIENTO CIVIL: "De los procesos matrimoniales y de menores" (III)
Miguel Angel del Rio