DATA PROTECTION- what is this act? What it is for?
Controls how your personal information is used by organisations, businesses or the government. It also imposes restriction on the transfer of data, also like placing the materials on the web.
Everyone responsible for using data has to follow strict rules called data protection principles, they must make sure the information is: * used fairly and lawfully * used for limited, specifically stated purposes * used in a way that is adequate, relevant and not excessive * accurate * kept for no longer than is absolutely necessary * handled according to people’s data protection rights * kept safe and secure * not transferred outside the UK without adequate
…show more content…
Before you download the app read the reviews and research the app, consider mobile security software.
Update when prompted- avoiding updates can leave the tablet or smartphone incredibly vulnerable, if you get behind on an update, you are leaving your smartphone open for attack.
Physical- anti-theft accessories- some product can help to prevent your kit being stolen.
Kensington locks- this SecureBack range is available for tablets, e-readers, smart phones and starts at around £30.
Socket- that attaches equipment’s case using high-strength adhesive pads.
Alarms- a way of stopping a thief is to protect it with the alarm. The lock alarm mini will work with anything that has a slot through which you can slip the cable. A 100DB siren sounds if the lock cable is cut or motion is detected
Norton Anti-theft- lets you remotely lock down your personal files, preventing the thief from accessing your data, and you can even use the devices built in camera to snap a photo of whoever is using it at the time. * Taking precautions- confidentiality
To prevent hacking- use firewall- it stops unwanted intruders. * Keep the firewall up to date * Report if breached immediately * Use anti-spam * Security on smartphones
COMPUTER MISUSE ACT 1990-
It helps to tackle the problems caused by hacking. It enables hackers to be
Data Protection Act 1998 – gives individuals the right to know what information is held about them, and those that processes personal information must comply with eight principles, which makes sure that personal information is fairly and lawfully processed; processed for limited purposes; adequate, relevant and not excessive; accurate and up to date; not kept for longer than is necessary; processed in line with your rights; secure; not transferred to other countries without adequate protection;
Data protection is a very important piece of legislation that was brought into power in 1998, because it has been designed to prevent confidential and personal information being passed on to other people and any relevant companies without a person’s consent. This also means that any information that is stored of children should be kept in either a password protected or lockable location.
* Processed in line with the rights of individuals - this includes the right to be informed of all the information held about them, to prevent processing of their personal information for marketing purposes, and to compensation if they can prove they have been damaged by a data controller's non-compliance with the Act.
Laptop’s Physical Security- Physical locks are the best means to prevent your laptop from being stolen. All laptops should be set to require a password to log on to the computer. Use a screen guard. These guards help prevent people from peeking over your shoulder as you work on sensitive information in a public place. Never leave access numbers or passwords in your carrying case. Configure your screen saver to require a password. Purchase CompuTrace for your computer. If your computer is stolen, CompuTrace will alert the proper authorities to find and retrieve your computer. Never leave your laptop unattended, even for a moment.
The data protection Act 1988 and 2003 are designed to protect an induvial privacy. Any information shared with someone in the trust can only be passed on to third party with the agreement of person disclosing it. information must only be shared on professional basis using appropriate channel. There are eight rules of data protection which govern the processing of personal data. • Obtain and process the information fairly.
The Data Protection Act 1998 (DPA 1998) is an act defining the ways in which information about people may be legally used and handled. The main intent is to protect individuals against misuse or abuse of information about them.
The Data Protection Act 1988 – This act covers the rights of an individual. Written, confidentially, retrieval and handling of verbal information.
The data protection act is a law on the processing of data in identifying people. The law does not
The data protection Act 1998 is how personal information of living people is being used. The main intention is to protect people’s data from being used illegally. The principles of the data protection act that must be followed are the information must be used moderately and follow the rules set by the law. The information must be kept for a certain period of time. For example, if an organisation has information of someone and they can only keep it for 5
| |The data protection act gives individuals the right to see the information recorded about them and | |
Data Protection Act 1998 - This act defines the ways in which information about living people may be legally used and handled. The main intend is to protect individuals against misuse or abuse of
This act applies to all organisations that process data relating to their staff and customers. It is the main legal framework in UK that protects personal data. The act contains 8 data protection principles which are:
The Data Protection Act 1998 is a piece of legislation that controls how an individual’s personal information is used by organisations, businesses and the government. This Act ensures that HR departments only collect data from individuals is covered by what we are allowed to collect under the Act, relevant and not excessive, we must also be sure that data is not stored for longer than necessary. We must ensure that data is stored securely and confidentially; and that we are open about the reasons why we are collecting and storing the data.
Attention Getter: Other than our car keys, our mobile devices have become something that we can’t leave the house with. This includes our smartphones, laptops, tablets, USBs, and digital cameras.
The following tips according to the U.S. Department of Homeland Security can help users enhance the security for mobile devices and potentially prevent them. The first one is to consider the security features when purchasing a mobile device, make sure that the service provider offers encryption when sending data through the network, ask if the provider can find and wipe remotely a mobile device and delete malicious apps. In addition, check if the provider offers authentication features like passwords.