SlideShare uma empresa Scribd logo
1 de 22
Chapter 08 – Data

Protection, Privacy and Freedom
of Information
IT5104 - Professional Issues in IT

OpenArc Campus – BIT Sem V – PIIT

1
•

Storage

•

Processing

•

Retention

•

Release (Transferring, Publishing…etc)

D
A
T
A

&

I
N
F
O
R
M
A
T
I
O
N

•

Protection

•

Privacy

•

Freedom of Information
2
Why it came?
•

Very large amount of data about individuals was being
collected

and

stored

in

computers

and

then

used

for

unacceptable purposes which were not the intention when the
data was collected.
•

Unauthorized people could access such data and that the data
might be out dated, incomplete or just plain wrong.

At the beginning, the law for this matter was designed to protect
individuals,

against

the

misuse

of

personal

data

by

large

organizations. But evolutionary gone to a wider concern.

3
People

are

entitled

to

keep

personal

information

private.
Ex : Bank Balance, Medical History, Vote in Election…etc
But for security measures there can be situations, such as telephone
tapping and email monitoring by employers as well as security
services of the state.

Do governments also entitled to keep their information
private?
Governments

are

traditionally

reluctant

to

release

information to their citizens. But there is a pressure from public for

more open governments and for legislations that guarantee freedom
of information.
4
Protection and Privacy are two different concepts but goes like
as the same.
Terminology of UK Data protection Act 1998

Data

Collected with the intention to process and

create

information or just to keep as a record.
Data Controller

Legal or natural person who determines why or how
personal data is processed.

Data Processor

Anyone who processes personal data on behalf of the
data controller.

Data Protection

5
Personal Data

Data which relates to a living person who can be
indentified from that data. (Possibly taken together with
other information the data controller is likely to have. It
can be include, expressions of opinion about the person
and indications of the intentions of the data controller or
any other person, toward the individual.)

Data Subject

Individual who is the subject of personal data

Sensitive

Personal data relating to the racial or ethnic origin of data

Personal Data

subjects.

Their

political

opinions,

religious

beliefs,

memberships of societies, physical or mental health,
marital life, or whether they have committed or alleged to
have committed any criminal offence.

Processing

Obtaining, recording or holding the information/data or
carrying out any operations on it.
6
In the act Data Processing also means
• Organization, adaptation or alteration of the information/data
• Retrieval, consultation or use of the information/data
• Disclosure

of

the

information/data

by

transmission,

dissemination or otherwise making available
• Alignment, combination, blocking, erasure or destruction of the
information/data

7
1998 UK Data Protection Act lays down 8 principles which
apply to the collection and processing of personal data of any

sort. Data Controller is responsible for ensuring that these
principles are complied with in respect of all the personal
data, for which they are responsible.

Data Protection Principles

8
1) Personal data shall be processed fairly and lawfully.

If the data subject doesn’t give their consent, data can only be
processed if the data controller is under a legal or statutory
obligation for which the processing is necessary.
ex:
It is necessary to inform the users of a website explicitly if it
employs cookies and must give users the opportunity of refusing it.

9
2) Personal data shall be obtained only for one or more
specified and lawful purposes, and shall not be further
processed in any manner incompatible with that purpose
or those purposes.

10
3) Personal data shall be adequate, relevant and not
excessive in relation to the purpose or purposes for which
they are processed.

Ex:
Requiring to declare marital status when joining to a public library.
Shops demanding to know customers' addresses for an order even
the order do not require a delivery service.

11
4) Personal data shall be accurate and, where necessary,
kept up to date.

Doctors have great difficulty in maintaining up-to-date data
about their patients' addresses.

12
5)

Personal data processed for any purpose or purposes

shall not be kept for longer than is necessary for that
purpose or those purposes.

• At the time data captured, it needed to be defined how long each
item of personal data needs to be kept.

• There need to be procedures to ensure that all data is erased at
the appropriate time, and this must include erasure from backup
copies.
• There can be situations to keep some personal data for an
indefinite

period

such

like

university

records

of

graduating

students.
13
6)

Personal data shall be processed in accordance with
the rights of data subjects.

14
7)

Appropriate technical and organizational measures

shall be taken against unauthorized or unlawful processing
of personal data and against accidental loss or destruction
of, or damage to, personal data.

This implies the need for access control (through passwords or
other means), backup procedures, integrity checks on the data,
etc.
And there also need to be authorized personnel who have access

to manage these things.

15
8)

Personal data shall not be transferred to a country or

territory outside the region unless that country or territory
ensures an adequate level of protection for the rights and

freedom of data subjects in relation to the processing of
personal data.

16
Data subjects have the right to know whether a data controller
held data relating to them. Also they have right to see those data,
and the right to have those data erased or corrected if it is
inaccurate.
Data subjects have the right to receive:
•

A description of the personal data being held;

•

An explanation of the purpose why it is being held

•

A description of the people/organizations to which it may be
disclosed;

•

An clear statement of the specific data held about them;

•

A description of the source of the data.

Rights of Data Subjects

17
Data subjects have the right:
•

To prevent processing likely to cause damage and distress;

•

To prevent processing for the purposes of direct marketing;

•

To have compensation in case of damage caused by processing
of personal data in violation of the principles of the Act.

There may be exceptions such like

•

Examination candidates do not have the right of access to their
marks until after the results of the examinations have been
published.

•

Disclosing the information may result in infringing someone

else's rights.
•

Disclosing may be threat to national security.
18
All these rights apply to data that is held electronically and, in
some cases, to data that is held in manual file systems.

If however, the data is processed automatically and is likely to be
used as the sole basis for taking a decision relating to data
subjects

(for

example,

deciding

whether

to

grant

them

a

Loan), they have the right to be informed by the data controller, of
the logic involved in taking that decision. They can also demand
that a decision relating to them that has been taken on full
automatic process should be reconsidered on some other way.

19
Government security services and law enforcement authorities
can only intercept, monitor and investigate electronic data in
certain

specified

situations

such

as

when

preventing

and

detecting crime.

Organizations that provide computer and telephone services
(this includes not only ISPs and other telecommunications
service providers but also most employers) can monitor and
record communications without the consent of the users of the
service in some circumstances.
Organizations intercepting communications in this way are under
an obligation to make all reasonable efforts to inform users that

such interception may take place.

Privacy
20
Every citizen does have rights of access to information held by
bodies in the public sector such like Parliament, government
departments, health authorities, universities, schools, etc.
But there may be exceptions in situations such disclosures may
avoided due to public interest.
Public authorities are advised to adopt schemes for publication of

information. (1919)
Freedom of information does not mean that people can access
others’ personal information.

Freedom of Information

21
• Threat of individual privacy due to Large Centralized Data
Banks.
• Abuse of information management due to Data Matching.

• Unauthorized Traceability of operations performed via online
services.
• Navigation Trails (Browser Cookies)
• Capturing Information about the way individuals use the

internet and build profiles of their habits for marketing purpose
or blackmail.
• Jurisdiction for trans-border data flow ? (ex: WikiLeaks)

The Impact of the Internet

22

Mais conteúdo relacionado

Mais procurados

Fundamentals of Information Systems Security Chapter 10
Fundamentals of Information Systems Security Chapter 10Fundamentals of Information Systems Security Chapter 10
Fundamentals of Information Systems Security Chapter 10Dr. Ahmed Al Zaidy
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentationmlw32785
 
Data protection ppt
Data protection pptData protection ppt
Data protection pptgrahamwell
 
Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1Dr. Ahmed Al Zaidy
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacyhimanshu jain
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation tomasztopa
 
GDPR Introduction and overview
GDPR Introduction and overviewGDPR Introduction and overview
GDPR Introduction and overviewJane Lambert
 
DCH Data Protection Training Presentation
DCH Data Protection Training PresentationDCH Data Protection Training Presentation
DCH Data Protection Training PresentationMark Gracey
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyThoughtworks
 
Legal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityLegal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityCarl Ceder
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
Fundamentals of Information Systems Security Chapter 9
Fundamentals of Information Systems Security Chapter 9Fundamentals of Information Systems Security Chapter 9
Fundamentals of Information Systems Security Chapter 9Dr. Ahmed Al Zaidy
 
[Presentation] GDPR - How to Ensure Compliance
[Presentation] GDPR - How to Ensure Compliance[Presentation] GDPR - How to Ensure Compliance
[Presentation] GDPR - How to Ensure ComplianceAIIM International
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 

Mais procurados (20)

Data protection
Data protectionData protection
Data protection
 
Fundamentals of Information Systems Security Chapter 10
Fundamentals of Information Systems Security Chapter 10Fundamentals of Information Systems Security Chapter 10
Fundamentals of Information Systems Security Chapter 10
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1Fundamentals of Information Systems Security Chapter 1
Fundamentals of Information Systems Security Chapter 1
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacy
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
GDPR Introduction and overview
GDPR Introduction and overviewGDPR Introduction and overview
GDPR Introduction and overview
 
Privacy and Data Protection
Privacy and Data ProtectionPrivacy and Data Protection
Privacy and Data Protection
 
Privacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital WorldPrivacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital World
 
Legal Basis in GDPR
Legal Basis in GDPRLegal Basis in GDPR
Legal Basis in GDPR
 
DCH Data Protection Training Presentation
DCH Data Protection Training PresentationDCH Data Protection Training Presentation
DCH Data Protection Training Presentation
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny Leroy
 
Legal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityLegal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information Security
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Fundamentals of Information Systems Security Chapter 9
Fundamentals of Information Systems Security Chapter 9Fundamentals of Information Systems Security Chapter 9
Fundamentals of Information Systems Security Chapter 9
 
[Presentation] GDPR - How to Ensure Compliance
[Presentation] GDPR - How to Ensure Compliance[Presentation] GDPR - How to Ensure Compliance
[Presentation] GDPR - How to Ensure Compliance
 
IT compliance
IT complianceIT compliance
IT compliance
 
18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 

Semelhante a Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104

Data Protection and Privacy Laws
Data Protection and Privacy LawsData Protection and Privacy Laws
Data Protection and Privacy Lawsahlawatassociates
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection ActSaimaRafiq
 
Freedom of Information and Data Protection
Freedom of Information and Data ProtectionFreedom of Information and Data Protection
Freedom of Information and Data ProtectionEquiGov Institute
 
General Data Protection Regulation (GDPR) for Identity Architects
General Data Protection Regulation (GDPR) for Identity ArchitectsGeneral Data Protection Regulation (GDPR) for Identity Architects
General Data Protection Regulation (GDPR) for Identity ArchitectsWSO2
 
Data Protection Act 1998 (amended 2000)
Data Protection Act 1998 (amended 2000)Data Protection Act 1998 (amended 2000)
Data Protection Act 1998 (amended 2000)The Pathway Group
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsHarrison Clark Rickerbys
 
Personal data: Legal Issues in Research Data Collection and Sharing by EUDAT ...
Personal data: Legal Issues in Research Data Collection and Sharing by EUDAT ...Personal data: Legal Issues in Research Data Collection and Sharing by EUDAT ...
Personal data: Legal Issues in Research Data Collection and Sharing by EUDAT ...EUDAT
 
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...Harrison Clark Rickerbys
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11mrmwood
 
PHIE Privacy Guidelines
PHIE Privacy GuidelinesPHIE Privacy Guidelines
PHIE Privacy GuidelinesRomsty
 
Pdpa presentation
Pdpa presentationPdpa presentation
Pdpa presentationAlan Teh
 
Data protection
Data protectionData protection
Data protectionjayne45
 
Information governance
Information governanceInformation governance
Information governanceGerardo Medina
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsHarrison Clark Rickerbys
 
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...Harrison Clark Rickerbys
 
Data Protection Guide – What are your rights as a citizen?
Data Protection Guide – What are your rights as a citizen?Data Protection Guide – What are your rights as a citizen?
Data Protection Guide – What are your rights as a citizen?Edouard Nguyen
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management Endcode_org
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analyticsshekharkanodia
 

Semelhante a Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104 (20)

Data Protection and Privacy Laws
Data Protection and Privacy LawsData Protection and Privacy Laws
Data Protection and Privacy Laws
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
 
Freedom of Information and Data Protection
Freedom of Information and Data ProtectionFreedom of Information and Data Protection
Freedom of Information and Data Protection
 
General Data Protection Regulation (GDPR) for Identity Architects
General Data Protection Regulation (GDPR) for Identity ArchitectsGeneral Data Protection Regulation (GDPR) for Identity Architects
General Data Protection Regulation (GDPR) for Identity Architects
 
Data Protection Act 1998 (amended 2000)
Data Protection Act 1998 (amended 2000)Data Protection Act 1998 (amended 2000)
Data Protection Act 1998 (amended 2000)
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business Advisors
 
Personal data: Legal Issues in Research Data Collection and Sharing by EUDAT ...
Personal data: Legal Issues in Research Data Collection and Sharing by EUDAT ...Personal data: Legal Issues in Research Data Collection and Sharing by EUDAT ...
Personal data: Legal Issues in Research Data Collection and Sharing by EUDAT ...
 
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11
 
Data privacy act of 2012 presentation
Data privacy act of 2012 presentationData privacy act of 2012 presentation
Data privacy act of 2012 presentation
 
PHIE Privacy Guidelines
PHIE Privacy GuidelinesPHIE Privacy Guidelines
PHIE Privacy Guidelines
 
Pdpa presentation
Pdpa presentationPdpa presentation
Pdpa presentation
 
Data protection
Data protectionData protection
Data protection
 
Information governance
Information governanceInformation governance
Information governance
 
Data Protection GDPR Basics
Data Protection GDPR BasicsData Protection GDPR Basics
Data Protection GDPR Basics
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business Advisors
 
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
GDPR Breakfast Briefing for Business Owners, IT Directors, HR Directors & Ops...
 
Data Protection Guide – What are your rights as a citizen?
Data Protection Guide – What are your rights as a citizen?Data Protection Guide – What are your rights as a citizen?
Data Protection Guide – What are your rights as a citizen?
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analytics
 

Mais de Upekha Vandebona

Software Engineering Ethics
Software Engineering EthicsSoftware Engineering Ethics
Software Engineering EthicsUpekha Vandebona
 
Need for Software Engineering
Need for Software EngineeringNeed for Software Engineering
Need for Software EngineeringUpekha Vandebona
 
Characteristics of Software
Characteristics of SoftwareCharacteristics of Software
Characteristics of SoftwareUpekha Vandebona
 
Introduction to Software Engineering
Introduction to Software EngineeringIntroduction to Software Engineering
Introduction to Software EngineeringUpekha Vandebona
 
Porter Forces and eBusiness Models
Porter Forces and  eBusiness ModelsPorter Forces and  eBusiness Models
Porter Forces and eBusiness ModelsUpekha Vandebona
 
Porter Forces and eBusiness Strategies
Porter Forces and  eBusiness StrategiesPorter Forces and  eBusiness Strategies
Porter Forces and eBusiness StrategiesUpekha Vandebona
 
Revenue Models for e-Business on The Web
Revenue Models for e-Business on The WebRevenue Models for e-Business on The Web
Revenue Models for e-Business on The WebUpekha Vandebona
 
Michael Porter’s Five Forces
Michael Porter’s Five ForcesMichael Porter’s Five Forces
Michael Porter’s Five ForcesUpekha Vandebona
 
eCommerce Business Strategies
eCommerce Business StrategieseCommerce Business Strategies
eCommerce Business StrategiesUpekha Vandebona
 
Supply Chain Management, Customer Relationship Management and Knowledge Manag...
Supply Chain Management, Customer Relationship Management and Knowledge Manag...Supply Chain Management, Customer Relationship Management and Knowledge Manag...
Supply Chain Management, Customer Relationship Management and Knowledge Manag...Upekha Vandebona
 
Direct to Customer Interaction through eBusiness
Direct to Customer Interaction through eBusinessDirect to Customer Interaction through eBusiness
Direct to Customer Interaction through eBusinessUpekha Vandebona
 
eBusiness Benefits and Issues
eBusiness Benefits and IssueseBusiness Benefits and Issues
eBusiness Benefits and IssuesUpekha Vandebona
 
Orientation of eBusiness Applications
Orientation of eBusiness ApplicationsOrientation of eBusiness Applications
Orientation of eBusiness ApplicationsUpekha Vandebona
 
Professional and Ethical, Issues and Responsibilities
Professional and Ethical, Issues and ResponsibilitiesProfessional and Ethical, Issues and Responsibilities
Professional and Ethical, Issues and ResponsibilitiesUpekha Vandebona
 
Privacy and Civil Liberties
Privacy and Civil LibertiesPrivacy and Civil Liberties
Privacy and Civil LibertiesUpekha Vandebona
 
Organizational Context - Processes
Organizational Context - ProcessesOrganizational Context - Processes
Organizational Context - ProcessesUpekha Vandebona
 
Professional Communication in Computing - Writing
Professional Communication in Computing - WritingProfessional Communication in Computing - Writing
Professional Communication in Computing - WritingUpekha Vandebona
 
Professional Communication in Computing
Professional Communication in ComputingProfessional Communication in Computing
Professional Communication in ComputingUpekha Vandebona
 

Mais de Upekha Vandebona (20)

Software Engineering Ethics
Software Engineering EthicsSoftware Engineering Ethics
Software Engineering Ethics
 
Need for Software Engineering
Need for Software EngineeringNeed for Software Engineering
Need for Software Engineering
 
Characteristics of Software
Characteristics of SoftwareCharacteristics of Software
Characteristics of Software
 
Introduction to Software Engineering
Introduction to Software EngineeringIntroduction to Software Engineering
Introduction to Software Engineering
 
Porter Forces and eBusiness Models
Porter Forces and  eBusiness ModelsPorter Forces and  eBusiness Models
Porter Forces and eBusiness Models
 
Porter Forces and eBusiness Strategies
Porter Forces and  eBusiness StrategiesPorter Forces and  eBusiness Strategies
Porter Forces and eBusiness Strategies
 
Revenue Models for e-Business on The Web
Revenue Models for e-Business on The WebRevenue Models for e-Business on The Web
Revenue Models for e-Business on The Web
 
Michael Porter’s Five Forces
Michael Porter’s Five ForcesMichael Porter’s Five Forces
Michael Porter’s Five Forces
 
eCommerce Business Strategies
eCommerce Business StrategieseCommerce Business Strategies
eCommerce Business Strategies
 
Supply Chain Management, Customer Relationship Management and Knowledge Manag...
Supply Chain Management, Customer Relationship Management and Knowledge Manag...Supply Chain Management, Customer Relationship Management and Knowledge Manag...
Supply Chain Management, Customer Relationship Management and Knowledge Manag...
 
eBusiness Roadmap
eBusiness RoadmapeBusiness Roadmap
eBusiness Roadmap
 
eBusiness Environment
eBusiness EnvironmenteBusiness Environment
eBusiness Environment
 
Direct to Customer Interaction through eBusiness
Direct to Customer Interaction through eBusinessDirect to Customer Interaction through eBusiness
Direct to Customer Interaction through eBusiness
 
eBusiness Benefits and Issues
eBusiness Benefits and IssueseBusiness Benefits and Issues
eBusiness Benefits and Issues
 
Orientation of eBusiness Applications
Orientation of eBusiness ApplicationsOrientation of eBusiness Applications
Orientation of eBusiness Applications
 
Professional and Ethical, Issues and Responsibilities
Professional and Ethical, Issues and ResponsibilitiesProfessional and Ethical, Issues and Responsibilities
Professional and Ethical, Issues and Responsibilities
 
Privacy and Civil Liberties
Privacy and Civil LibertiesPrivacy and Civil Liberties
Privacy and Civil Liberties
 
Organizational Context - Processes
Organizational Context - ProcessesOrganizational Context - Processes
Organizational Context - Processes
 
Professional Communication in Computing - Writing
Professional Communication in Computing - WritingProfessional Communication in Computing - Writing
Professional Communication in Computing - Writing
 
Professional Communication in Computing
Professional Communication in ComputingProfessional Communication in Computing
Professional Communication in Computing
 

Último

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 

Último (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 

Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104

  • 1. Chapter 08 – Data Protection, Privacy and Freedom of Information IT5104 - Professional Issues in IT OpenArc Campus – BIT Sem V – PIIT 1
  • 3. Why it came? • Very large amount of data about individuals was being collected and stored in computers and then used for unacceptable purposes which were not the intention when the data was collected. • Unauthorized people could access such data and that the data might be out dated, incomplete or just plain wrong. At the beginning, the law for this matter was designed to protect individuals, against the misuse of personal data by large organizations. But evolutionary gone to a wider concern. 3
  • 4. People are entitled to keep personal information private. Ex : Bank Balance, Medical History, Vote in Election…etc But for security measures there can be situations, such as telephone tapping and email monitoring by employers as well as security services of the state. Do governments also entitled to keep their information private? Governments are traditionally reluctant to release information to their citizens. But there is a pressure from public for more open governments and for legislations that guarantee freedom of information. 4
  • 5. Protection and Privacy are two different concepts but goes like as the same. Terminology of UK Data protection Act 1998 Data Collected with the intention to process and create information or just to keep as a record. Data Controller Legal or natural person who determines why or how personal data is processed. Data Processor Anyone who processes personal data on behalf of the data controller. Data Protection 5
  • 6. Personal Data Data which relates to a living person who can be indentified from that data. (Possibly taken together with other information the data controller is likely to have. It can be include, expressions of opinion about the person and indications of the intentions of the data controller or any other person, toward the individual.) Data Subject Individual who is the subject of personal data Sensitive Personal data relating to the racial or ethnic origin of data Personal Data subjects. Their political opinions, religious beliefs, memberships of societies, physical or mental health, marital life, or whether they have committed or alleged to have committed any criminal offence. Processing Obtaining, recording or holding the information/data or carrying out any operations on it. 6
  • 7. In the act Data Processing also means • Organization, adaptation or alteration of the information/data • Retrieval, consultation or use of the information/data • Disclosure of the information/data by transmission, dissemination or otherwise making available • Alignment, combination, blocking, erasure or destruction of the information/data 7
  • 8. 1998 UK Data Protection Act lays down 8 principles which apply to the collection and processing of personal data of any sort. Data Controller is responsible for ensuring that these principles are complied with in respect of all the personal data, for which they are responsible. Data Protection Principles 8
  • 9. 1) Personal data shall be processed fairly and lawfully. If the data subject doesn’t give their consent, data can only be processed if the data controller is under a legal or statutory obligation for which the processing is necessary. ex: It is necessary to inform the users of a website explicitly if it employs cookies and must give users the opportunity of refusing it. 9
  • 10. 2) Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes. 10
  • 11. 3) Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed. Ex: Requiring to declare marital status when joining to a public library. Shops demanding to know customers' addresses for an order even the order do not require a delivery service. 11
  • 12. 4) Personal data shall be accurate and, where necessary, kept up to date. Doctors have great difficulty in maintaining up-to-date data about their patients' addresses. 12
  • 13. 5) Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes. • At the time data captured, it needed to be defined how long each item of personal data needs to be kept. • There need to be procedures to ensure that all data is erased at the appropriate time, and this must include erasure from backup copies. • There can be situations to keep some personal data for an indefinite period such like university records of graduating students. 13
  • 14. 6) Personal data shall be processed in accordance with the rights of data subjects. 14
  • 15. 7) Appropriate technical and organizational measures shall be taken against unauthorized or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data. This implies the need for access control (through passwords or other means), backup procedures, integrity checks on the data, etc. And there also need to be authorized personnel who have access to manage these things. 15
  • 16. 8) Personal data shall not be transferred to a country or territory outside the region unless that country or territory ensures an adequate level of protection for the rights and freedom of data subjects in relation to the processing of personal data. 16
  • 17. Data subjects have the right to know whether a data controller held data relating to them. Also they have right to see those data, and the right to have those data erased or corrected if it is inaccurate. Data subjects have the right to receive: • A description of the personal data being held; • An explanation of the purpose why it is being held • A description of the people/organizations to which it may be disclosed; • An clear statement of the specific data held about them; • A description of the source of the data. Rights of Data Subjects 17
  • 18. Data subjects have the right: • To prevent processing likely to cause damage and distress; • To prevent processing for the purposes of direct marketing; • To have compensation in case of damage caused by processing of personal data in violation of the principles of the Act. There may be exceptions such like • Examination candidates do not have the right of access to their marks until after the results of the examinations have been published. • Disclosing the information may result in infringing someone else's rights. • Disclosing may be threat to national security. 18
  • 19. All these rights apply to data that is held electronically and, in some cases, to data that is held in manual file systems. If however, the data is processed automatically and is likely to be used as the sole basis for taking a decision relating to data subjects (for example, deciding whether to grant them a Loan), they have the right to be informed by the data controller, of the logic involved in taking that decision. They can also demand that a decision relating to them that has been taken on full automatic process should be reconsidered on some other way. 19
  • 20. Government security services and law enforcement authorities can only intercept, monitor and investigate electronic data in certain specified situations such as when preventing and detecting crime. Organizations that provide computer and telephone services (this includes not only ISPs and other telecommunications service providers but also most employers) can monitor and record communications without the consent of the users of the service in some circumstances. Organizations intercepting communications in this way are under an obligation to make all reasonable efforts to inform users that such interception may take place. Privacy 20
  • 21. Every citizen does have rights of access to information held by bodies in the public sector such like Parliament, government departments, health authorities, universities, schools, etc. But there may be exceptions in situations such disclosures may avoided due to public interest. Public authorities are advised to adopt schemes for publication of information. (1919) Freedom of information does not mean that people can access others’ personal information. Freedom of Information 21
  • 22. • Threat of individual privacy due to Large Centralized Data Banks. • Abuse of information management due to Data Matching. • Unauthorized Traceability of operations performed via online services. • Navigation Trails (Browser Cookies) • Capturing Information about the way individuals use the internet and build profiles of their habits for marketing purpose or blackmail. • Jurisdiction for trans-border data flow ? (ex: WikiLeaks) The Impact of the Internet 22