preview

Data Protection

Good Essays

DATA PROTECTION- what is this act? What it is for?
Controls how your personal information is used by organisations, businesses or the government. It also imposes restriction on the transfer of data, also like placing the materials on the web.
Everyone responsible for using data has to follow strict rules called data protection principles, they must make sure the information is: * used fairly and lawfully * used for limited, specifically stated purposes * used in a way that is adequate, relevant and not excessive * accurate * kept for no longer than is absolutely necessary * handled according to people’s data protection rights * kept safe and secure * not transferred outside the UK without adequate …show more content…

Before you download the app read the reviews and research the app, consider mobile security software.
Update when prompted- avoiding updates can leave the tablet or smartphone incredibly vulnerable, if you get behind on an update, you are leaving your smartphone open for attack.
Physical- anti-theft accessories- some product can help to prevent your kit being stolen.
Kensington locks- this SecureBack range is available for tablets, e-readers, smart phones and starts at around £30.
Socket- that attaches equipment’s case using high-strength adhesive pads.
Alarms- a way of stopping a thief is to protect it with the alarm. The lock alarm mini will work with anything that has a slot through which you can slip the cable. A 100DB siren sounds if the lock cable is cut or motion is detected
Norton Anti-theft- lets you remotely lock down your personal files, preventing the thief from accessing your data, and you can even use the devices built in camera to snap a photo of whoever is using it at the time. * Taking precautions- confidentiality
To prevent hacking- use firewall- it stops unwanted intruders. * Keep the firewall up to date * Report if breached immediately * Use anti-spam * Security on smartphones
COMPUTER MISUSE ACT 1990-
It helps to tackle the problems caused by hacking. It enables hackers to be

Get Access