Data Protection Act 1998

Descrição

Mapa Mental sobre Data Protection Act 1998, criado por nquermia20 em 13-01-2014.
nquermia20
Mapa Mental por nquermia20, atualizado more than 1 year ago
nquermia20
Criado por nquermia20 mais de 10 anos atrás
32
0

Resumo de Recurso

Data Protection Act 1998
  1. Data protection principles
    1. 1.Personal data will be processed fairly and lawfully.
      1. In order for this principle to be applied one of these 6 sub-principles must be met.
        1. 1.The person has given consent for the use of their personal data.
          1. 2.The processing of the data is necessary for a contract or the commencing of a contract.
            1. 3.Processing of the data is a legal requirment.
              1. 4.Processing is necessary to protect the interests of the data subject.
                1. 5.Processing is needed to carry out any public services.
                  1. 6.Processing of said data is necessary to pursue the legitimate interests of "third parties". Unless it would be unjust prejudice towards the interests of the data subject.
                2. 2.Personal data shall be obtained for only the specified uses.
                  1. 3. Personal data will be relevant and not excessive towards the purpose that the data was intended for.
                    1. 4. Personal data shall be accurate and if necessary kept up to date.
                      1. 5.Personal data shall not be kept longer than necessary for the intended purpose.
                        1. 6. That the personal data has to be used in accord with human rights.
                          1. 7. Measures will be taken to prevent the unauthorized access to personal data or the damaging.
                            1. 8.personal data shall not be transferred to a country outside the European Economic Area, unless that country can and does follow the Data Protection Act 1998.
                            2. Other Facts
                              1. Replaced the Data Protection Act of 1984 and the Access to Personal Files Act of 1987.
                              2. Threats to privacy
                                1. Social Networking Sites:
                                  1. They store the interactions that you have and then save and use them at a later date
                                  2. Spyware:
                                    1. You can be tricked into downloading some spyware from which someone can spy on the information on your computer.
                                    2. Hackers:
                                      1. They get unauthorised access to your personal information.
                                      2. Identity Theft:
                                        1. Someone would pretend to be someone there not by using stolen personal information.
                                        2. Cookies:
                                          1. Stored small pieces of data about your interent history and this can be used to create personalised advertising this could be seen as a privacy.
                                          2. Search Engines:
                                            1. They store the history the time and the searches you've made in order to help personalise future internet access and also advertising. This does however create an easy route for hackers.
                                          3. What you can do to contteract these threats to privacy.
                                            1. Social Networking sites, use the privacy settings and also be aware of how much personal data you post on the internet.
                                              1. Spyware, simply have the latest antispyware software.
                                                1. Hackers, use firewalls, good passwords and encrypt information that you send across the internet.
                                                  1. Identity Theft, keep all your personal information safe.
                                                    1. Cookies, learn how to delet and manage cookies
                                                      1. Search engines, be careful to sign out of accounts especially on public computers.

                                                      Semelhante

                                                      Biology Revision - Y10 Mock
                                                      Tom Mitchell
                                                      History of Medicine: Ancient Ideas
                                                      James McConnell
                                                      Geography Coastal Zones Flashcards
                                                      Zakiya Tabassum
                                                      Biology- Genes and Variation
                                                      Laura Perry
                                                      FREQUENCY TABLES: MODE, MEDIAN AND MEAN
                                                      Elliot O'Leary
                                                      Enzymes and Respiration
                                                      I Turner
                                                      GCSE AQA Biology - Unit 2
                                                      James Jolliffe
                                                      GCSE Maths: Algebra & Number Quiz
                                                      Andrea Leyden
                                                      GCSE Maths: Geometry & Measures
                                                      Andrea Leyden
                                                      GCSE AQA Biology 1 Quiz
                                                      Lilac Potato
                                                      GCSE History – Social Impact of the Nazi State in 1945
                                                      Ben C