SlideShare uma empresa Scribd logo
1 de 13
Made by: Salvador Palma
   Eduardo Diaz-Bazan
What is the Data Protection Act and why was it
•
    created?
     What are the eight principles of the Data
•
    Protection Act?
     Data Protection Act: What rights do we have?
•

     What is an Information Commissioner, Data
•
    Controller and Data Subject?
     Are there any exemptions to the Data Protection
•
    Act?
The Data Protection Act was developed to give

    protection and lay down the rules about how
    personal data can be used.
    It was created to protect individuals from misuse

    of this data. It governs the collection and
    processing of data by organisations and the
    individual rights to access the data if they wish.
Data must be kept secure.
1.

     Data stored must be relevant.
2.

     Data stored must be kept no longer than necessary.
3.

     Data stored must be kept accurate and up-to-date.
4.

5. Data must be obtained and processed lawfully.
6. Data must be processed within the data subject
  rights.
7. Data must be obtained and specified for lawful
  purposes.
8. Data must not be transferred to countries without
  adequate data protection laws.
To be supplied with the data held about us.
•

    To change incorrect data.
•

    To prevent data being used about us if it will
•
    cause distress.
    To stop data being used in attempts to sell us
•
    something if the data was not collected for that
    purpose.
    To use the law to gain compensation.
•
Information Commissioner: Person who has

    the power to enforce the Act.


    Data Controller: Person or Company that

    collects and keeps data about people.


    Data Subject: Person who has data about them

    stored outside their direct control.
Police can access personal information in order to
•
    solve crimes.
    The taxman can access personal information to
•
    ensure people pay their taxes.
    Any data held for domestic purposes at home e.g.
•
    birthday lists, address books.
Early invasions of privacy was defined as the trespass,

    assault, or eavesdropping, but now, all the new
    technologies like computers and cell phones have to
    be taken into account.

    Before many of nowadays technology, people could

    be almost certain that they could hold a conversation
    privately in a person's home or office and that they
    could not be heard by other people. Before the
    invention of computer databases, people could have
    information safe and secure in a filing cabinet which
    is hard to access, but now with the use of
    technologies like computers, people can hack
    computers and access to a lot of private information.
Modern privacy laws state that the following are considered as the

    most important invasions of privacy:
    unreasonable intrusion upon the seclusion of another, for example, physical invasion of a

    person's home (e.g., unwanted entry, looking into windows with binoculars or camera, tapping
    telephone), searching wallet or purse, repeated and persistent telephone calls, obtaining
    financial data (e.g., bank balance) without person's consent, etc.
    appropriation of a person's name or likeness; successful assertions of this right commonly

    involve defendant's use of a person's name or likeness on a product label or in advertising a
    product or service. A similar concept is the quot;right of publicityquot; in Restatement (Third) Unfair
    Competition §§46-47 (1995). The distinction is that privacy protects against quot;injury to
    personal feelingsquot;, while the right of publicity protects against unauthorized commercial
    exploitation of a person's name or face. As a practical matter, celebrities generally sue under
    the right of publicity, while ordinary citizens sue under privacy.
    publication of private facts, for example, income tax data, sexual relations, personal letters,

    family quarrels, medical treatment, photographs of person in his/her home.
    publication that places a person in a false light, which is similar to defamation. A successful

    defamation action requires that the information be false. In a privacy action the information is
    generally true, but the information created a false impression about the plaintiff.

    Further more, it must be said that the most common and most latent privacy concern is the

    second one, also known as identity theft.
surreptitious interception of conversations in a house or hotel room is

    eavesdropping. See e.g., N.Y. Penal §§ 250.00, 250.05
     one has a right of privacy for contents of envelopes sent via first-class

    U.S. Mail. 18 USC § 1702; 39 USC § 3623
     one has a right of privacy for contents of telephone conversations,

    telegraph messages, or electronic data by wire. 18 USC § 2510 et seq.
    one has a right of privacy for contents of radio messages. 47 USC §605

    A federal statute denies federal funds to educational institutions that do

    not maintain confidentiality of student records, which enforces privacy
    rights of students in a backhanded way. 20 USC § 1232g. Commonly
    called the Buckley-Pell Amendment to the Family Educational Rights and
    Privacy Act. See also Krebs v. Rutgers, 797 F.Supp. 1246 (D.N.J. 1991);
    Tombrello v. USX Corp., 763 F.Supp. 541 (N.D.Ala.1991).
    Records of sales or rentals of video tapes are confidential. 18 USC §2710

    Content of e-mail in public systems are confidential. 18 USC § 2702(a).
    Bank records are confidential. 12 USC §3401 et seq.

    library records are confidential in some states.   e.g., N.Y. CPLR § 4509;

    Quad/Graphics, Inc. v. Southern Adirondack Library Sys., 664 N.Y.S.2d
    225 (N.Y.Sup.Ct. 30 Sep 1997)
Islam gives great importance to the fundamental human right to

    privacy.
    This is evident from the Quran, as some of the verses state:'Do

    not spy on one another' (49:12); 'Do not enter any houses except
    your own homes unless you are sure of their occupants' consent'
    (24:27).
    various laws have been declared to be in violation of the

    injunctions of Islam by the Federal Shariah Court. The
    Constitution of Pakistan, as well as the Pakistani law on Freedom
    of Information, recognizes the right to privacy. Despite this, the
    main objective of the draft Pakistani Data Protection Law is not to
    enshrine the principles of Islam, but to satisfy the requirements
    of European Union Directive 95/46, in particular Article 25
    thereof, with the hope of ensuring that data will be allowed to
    flow freely between the European Union and Pakistan, thus
    making Pakistan an attractive market for outsourcing.
In pakistan , the new law has been applied, it

    consists on the protection of private facts.
    The EDPSA that the subjet being investigated

    or of whow data is being collected should be
    provided with a notice. This notice will have
    to be given to the Certification Council.
(a) name or trade name, and address of the data controller and data

    processor
    (b) manner of collection of local data

    (c) purposes and means of the processing;

    (c) description of the data, the location where they are kept and the

    categories of data subjects to whom they relate;
    (d) limits of data clisclosure aud disseniination

    (e) intended transfers of data to any country or teritory outside Pakistan;

    (f) general description that allows an assessment of the technical and

    organizational measures taken to ensyre data security;
    (g) specification of any data filing system which fue processing is related

    to, and the connections, if any. with other data processing or data filing
    systems. whether within
    Pakistan or not;

    (h) copy of the contract between data controller aiid data processor;

    (i) the capacity and authority of the individual submitting the notice.


Mais conteúdo relacionado

Mais procurados

Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
Privacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminarPrivacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminarLance Michalson
 
Data Privacy Act in the Philippines
Data Privacy Act in the PhilippinesData Privacy Act in the Philippines
Data Privacy Act in the PhilippinesShirley Ingles-Cruz
 
Data Privacy Act of 2012 (R.A. 10173) Briefing 2017
Data Privacy Act of 2012 (R.A. 10173) Briefing 2017Data Privacy Act of 2012 (R.A. 10173) Briefing 2017
Data Privacy Act of 2012 (R.A. 10173) Briefing 2017Jay Castillo
 
Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Russell_Kennedy
 
It legislation
It legislationIt legislation
It legislationdoogstone
 
Philippine Data Privacy Act of 2012 (RA 10173)
Philippine Data Privacy Act of 2012 (RA 10173)Philippine Data Privacy Act of 2012 (RA 10173)
Philippine Data Privacy Act of 2012 (RA 10173)Kirk Go
 
Sovereignty: the state of data
Sovereignty: the state of dataSovereignty: the state of data
Sovereignty: the state of datadan hyde
 
Clyrofor popia readiness webinar
Clyrofor  popia readiness webinarClyrofor  popia readiness webinar
Clyrofor popia readiness webinarLesedi Mnisi
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodblogzilla
 
October 2007 Icle Presentation Final
October 2007 Icle Presentation   FinalOctober 2007 Icle Presentation   Final
October 2007 Icle Presentation FinalDavid Cassidy
 
10 Things You Need To Know About Privacy
10 Things You Need To Know About Privacy10 Things You Need To Know About Privacy
10 Things You Need To Know About PrivacyNow Dentons
 
Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Andrew Sharpe
 

Mais procurados (19)

An Encyclopedia of Wiretaps
An Encyclopedia of WiretapsAn Encyclopedia of Wiretaps
An Encyclopedia of Wiretaps
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Privacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminarPrivacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminar
 
Data Privacy Act in the Philippines
Data Privacy Act in the PhilippinesData Privacy Act in the Philippines
Data Privacy Act in the Philippines
 
CEU DPA
CEU DPACEU DPA
CEU DPA
 
Data Privacy Act of 2012 (R.A. 10173) Briefing 2017
Data Privacy Act of 2012 (R.A. 10173) Briefing 2017Data Privacy Act of 2012 (R.A. 10173) Briefing 2017
Data Privacy Act of 2012 (R.A. 10173) Briefing 2017
 
Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)
 
Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
 
Personal Data Protection Law
Personal Data Protection LawPersonal Data Protection Law
Personal Data Protection Law
 
It legislation
It legislationIt legislation
It legislation
 
Philippine Data Privacy Act of 2012 (RA 10173)
Philippine Data Privacy Act of 2012 (RA 10173)Philippine Data Privacy Act of 2012 (RA 10173)
Philippine Data Privacy Act of 2012 (RA 10173)
 
Sovereignty: the state of data
Sovereignty: the state of dataSovereignty: the state of data
Sovereignty: the state of data
 
Popi act presentation
Popi act presentationPopi act presentation
Popi act presentation
 
Clyrofor popia readiness webinar
Clyrofor  popia readiness webinarClyrofor  popia readiness webinar
Clyrofor popia readiness webinar
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
 
October 2007 Icle Presentation Final
October 2007 Icle Presentation   FinalOctober 2007 Icle Presentation   Final
October 2007 Icle Presentation Final
 
10 Things You Need To Know About Privacy
10 Things You Need To Know About Privacy10 Things You Need To Know About Privacy
10 Things You Need To Know About Privacy
 
Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Data Protection (Download for slideshow)
Data Protection (Download for slideshow)
 
AIIM 2015 - Data Privacy
AIIM 2015 - Data PrivacyAIIM 2015 - Data Privacy
AIIM 2015 - Data Privacy
 

Semelhante a Revision Data Protection Act (Eduardo And Salvador)

Revision Data Protection Act ( Eduardo And Salvador)
Revision    Data  Protection  Act ( Eduardo And  Salvador)Revision    Data  Protection  Act ( Eduardo And  Salvador)
Revision Data Protection Act ( Eduardo And Salvador)itgsabc
 
Privacy, human rights and Location Based Services
Privacy, human rights and Location Based ServicesPrivacy, human rights and Location Based Services
Privacy, human rights and Location Based Servicesblogzilla
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in ITAnushka Perera
 
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdfAll_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdfJakeAldrinDegala1
 
Links Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docxLinks Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docxsmile790243
 
Surveillance Coursework (COMPLETED-2
Surveillance Coursework (COMPLETED-2Surveillance Coursework (COMPLETED-2
Surveillance Coursework (COMPLETED-2Matthew MacNabb
 
Privacy versus Security: A Legal Perspective
Privacy versus Security: A Legal PerspectivePrivacy versus Security: A Legal Perspective
Privacy versus Security: A Legal PerspectiveJason Nathu
 
Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)Dan Michaluk
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_indiaAltacit Global
 
Information Security: The Trinidad & Tobago Legal Context
Information Security: The Trinidad & Tobago Legal ContextInformation Security: The Trinidad & Tobago Legal Context
Information Security: The Trinidad & Tobago Legal ContextJason Nathu
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxadampcarr67227
 
Privacy Breaches In Canada It.Can May 1 2009
Privacy Breaches In Canada   It.Can May 1 2009Privacy Breaches In Canada   It.Can May 1 2009
Privacy Breaches In Canada It.Can May 1 2009canadianlawyer
 
Sec af pa slides
Sec af pa slidesSec af pa slides
Sec af pa slideswrightjr02
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentDonald E. Hester
 

Semelhante a Revision Data Protection Act (Eduardo And Salvador) (19)

Revision Data Protection Act ( Eduardo And Salvador)
Revision    Data  Protection  Act ( Eduardo And  Salvador)Revision    Data  Protection  Act ( Eduardo And  Salvador)
Revision Data Protection Act ( Eduardo And Salvador)
 
Privacy and Privacy Law in India By Prashant Mali
Privacy and Privacy Law in India By Prashant MaliPrivacy and Privacy Law in India By Prashant Mali
Privacy and Privacy Law in India By Prashant Mali
 
Privacy, human rights and Location Based Services
Privacy, human rights and Location Based ServicesPrivacy, human rights and Location Based Services
Privacy, human rights and Location Based Services
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdfAll_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
 
Links Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docxLinks Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docx
 
Privacy - USC 2005
Privacy - USC 2005Privacy - USC 2005
Privacy - USC 2005
 
Surveillance Coursework (COMPLETED-2
Surveillance Coursework (COMPLETED-2Surveillance Coursework (COMPLETED-2
Surveillance Coursework (COMPLETED-2
 
Privacy versus Security: A Legal Perspective
Privacy versus Security: A Legal PerspectivePrivacy versus Security: A Legal Perspective
Privacy versus Security: A Legal Perspective
 
Data Privacy Act.pdf
Data Privacy Act.pdfData Privacy Act.pdf
Data Privacy Act.pdf
 
Freedoms Forsaken
Freedoms ForsakenFreedoms Forsaken
Freedoms Forsaken
 
Freedoms forsaken
Freedoms forsakenFreedoms forsaken
Freedoms forsaken
 
Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_india
 
Information Security: The Trinidad & Tobago Legal Context
Information Security: The Trinidad & Tobago Legal ContextInformation Security: The Trinidad & Tobago Legal Context
Information Security: The Trinidad & Tobago Legal Context
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
Privacy Breaches In Canada It.Can May 1 2009
Privacy Breaches In Canada   It.Can May 1 2009Privacy Breaches In Canada   It.Can May 1 2009
Privacy Breaches In Canada It.Can May 1 2009
 
Sec af pa slides
Sec af pa slidesSec af pa slides
Sec af pa slides
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 

Mais de itgsabc

Smart Homes (Alberto & Eduardo)
Smart Homes (Alberto & Eduardo)Smart Homes (Alberto & Eduardo)
Smart Homes (Alberto & Eduardo)itgsabc
 
Smart Houses (Alberto & Eduardo)
Smart Houses (Alberto & Eduardo)Smart Houses (Alberto & Eduardo)
Smart Houses (Alberto & Eduardo)itgsabc
 
Revision Viruses ( Gerardo E)
Revision     Viruses ( Gerardo  E)Revision     Viruses ( Gerardo  E)
Revision Viruses ( Gerardo E)itgsabc
 
Revision Psychological Consequences Of Being In Constant Contact ( Jose, ...
Revision    Psychological Consequences Of Being In Constant Contact ( Jose,  ...Revision    Psychological Consequences Of Being In Constant Contact ( Jose,  ...
Revision Psychological Consequences Of Being In Constant Contact ( Jose, ...itgsabc
 
Portfolio Teleworking ( Javier)
Portfolio    Teleworking ( Javier)Portfolio    Teleworking ( Javier)
Portfolio Teleworking ( Javier)itgsabc
 
Revision Terrorist And Rebel Use Of It (David & Jorge)
Revision   Terrorist And Rebel Use Of It (David & Jorge)Revision   Terrorist And Rebel Use Of It (David & Jorge)
Revision Terrorist And Rebel Use Of It (David & Jorge)itgsabc
 
Revision Expert Systems (Claudia, Federico, Natalia)
Revision   Expert Systems (Claudia, Federico, Natalia)Revision   Expert Systems (Claudia, Federico, Natalia)
Revision Expert Systems (Claudia, Federico, Natalia)itgsabc
 
Portfolio Internet Addiction (Monica And Lorena)
Portfolio   Internet Addiction (Monica And Lorena)Portfolio   Internet Addiction (Monica And Lorena)
Portfolio Internet Addiction (Monica And Lorena)itgsabc
 
Portfolio Pro Ana Websites (Joanna And Rebecca)
Portfolio   Pro Ana Websites (Joanna And Rebecca)Portfolio   Pro Ana Websites (Joanna And Rebecca)
Portfolio Pro Ana Websites (Joanna And Rebecca)itgsabc
 
Portfolio Biometric Use In Schools (Fingerprints) (Jenny)
Portfolio   Biometric Use In Schools       (Fingerprints) (Jenny)Portfolio   Biometric Use In Schools       (Fingerprints) (Jenny)
Portfolio Biometric Use In Schools (Fingerprints) (Jenny)itgsabc
 
Revision Psychological Consequences Of Being In Constant Contact (Jose, Bobby)
Revision   Psychological Consequences Of Being In Constant Contact (Jose, Bobby)Revision   Psychological Consequences Of Being In Constant Contact (Jose, Bobby)
Revision Psychological Consequences Of Being In Constant Contact (Jose, Bobby)itgsabc
 
Revision Viruses (Gerardo E)
Revision    Viruses (Gerardo E)Revision    Viruses (Gerardo E)
Revision Viruses (Gerardo E)itgsabc
 
Portfolio Should Students Use Wikipedia (David C)
Portfolio   Should Students Use Wikipedia (David C)Portfolio   Should Students Use Wikipedia (David C)
Portfolio Should Students Use Wikipedia (David C)itgsabc
 
Portfolio Teleworking (Javier)
Portfolio   Teleworking (Javier)Portfolio   Teleworking (Javier)
Portfolio Teleworking (Javier)itgsabc
 
School Of 2020 (Monica & Mauxi)
School Of 2020 (Monica & Mauxi)School Of 2020 (Monica & Mauxi)
School Of 2020 (Monica & Mauxi)itgsabc
 
School Of 2020 (Willy)
School Of 2020 (Willy)School Of 2020 (Willy)
School Of 2020 (Willy)itgsabc
 
School Of 2020 (Nicolas & Salvador)
School Of 2020 (Nicolas & Salvador)School Of 2020 (Nicolas & Salvador)
School Of 2020 (Nicolas & Salvador)itgsabc
 
School Of 2020 (Gerardo E)
School Of 2020 (Gerardo E)School Of 2020 (Gerardo E)
School Of 2020 (Gerardo E)itgsabc
 
School Of 2020 (Jose & David)
School Of 2020 (Jose & David)School Of 2020 (Jose & David)
School Of 2020 (Jose & David)itgsabc
 
School Of 2020 (Gerardo A)
School Of 2020 (Gerardo A)School Of 2020 (Gerardo A)
School Of 2020 (Gerardo A)itgsabc
 

Mais de itgsabc (20)

Smart Homes (Alberto & Eduardo)
Smart Homes (Alberto & Eduardo)Smart Homes (Alberto & Eduardo)
Smart Homes (Alberto & Eduardo)
 
Smart Houses (Alberto & Eduardo)
Smart Houses (Alberto & Eduardo)Smart Houses (Alberto & Eduardo)
Smart Houses (Alberto & Eduardo)
 
Revision Viruses ( Gerardo E)
Revision     Viruses ( Gerardo  E)Revision     Viruses ( Gerardo  E)
Revision Viruses ( Gerardo E)
 
Revision Psychological Consequences Of Being In Constant Contact ( Jose, ...
Revision    Psychological Consequences Of Being In Constant Contact ( Jose,  ...Revision    Psychological Consequences Of Being In Constant Contact ( Jose,  ...
Revision Psychological Consequences Of Being In Constant Contact ( Jose, ...
 
Portfolio Teleworking ( Javier)
Portfolio    Teleworking ( Javier)Portfolio    Teleworking ( Javier)
Portfolio Teleworking ( Javier)
 
Revision Terrorist And Rebel Use Of It (David & Jorge)
Revision   Terrorist And Rebel Use Of It (David & Jorge)Revision   Terrorist And Rebel Use Of It (David & Jorge)
Revision Terrorist And Rebel Use Of It (David & Jorge)
 
Revision Expert Systems (Claudia, Federico, Natalia)
Revision   Expert Systems (Claudia, Federico, Natalia)Revision   Expert Systems (Claudia, Federico, Natalia)
Revision Expert Systems (Claudia, Federico, Natalia)
 
Portfolio Internet Addiction (Monica And Lorena)
Portfolio   Internet Addiction (Monica And Lorena)Portfolio   Internet Addiction (Monica And Lorena)
Portfolio Internet Addiction (Monica And Lorena)
 
Portfolio Pro Ana Websites (Joanna And Rebecca)
Portfolio   Pro Ana Websites (Joanna And Rebecca)Portfolio   Pro Ana Websites (Joanna And Rebecca)
Portfolio Pro Ana Websites (Joanna And Rebecca)
 
Portfolio Biometric Use In Schools (Fingerprints) (Jenny)
Portfolio   Biometric Use In Schools       (Fingerprints) (Jenny)Portfolio   Biometric Use In Schools       (Fingerprints) (Jenny)
Portfolio Biometric Use In Schools (Fingerprints) (Jenny)
 
Revision Psychological Consequences Of Being In Constant Contact (Jose, Bobby)
Revision   Psychological Consequences Of Being In Constant Contact (Jose, Bobby)Revision   Psychological Consequences Of Being In Constant Contact (Jose, Bobby)
Revision Psychological Consequences Of Being In Constant Contact (Jose, Bobby)
 
Revision Viruses (Gerardo E)
Revision    Viruses (Gerardo E)Revision    Viruses (Gerardo E)
Revision Viruses (Gerardo E)
 
Portfolio Should Students Use Wikipedia (David C)
Portfolio   Should Students Use Wikipedia (David C)Portfolio   Should Students Use Wikipedia (David C)
Portfolio Should Students Use Wikipedia (David C)
 
Portfolio Teleworking (Javier)
Portfolio   Teleworking (Javier)Portfolio   Teleworking (Javier)
Portfolio Teleworking (Javier)
 
School Of 2020 (Monica & Mauxi)
School Of 2020 (Monica & Mauxi)School Of 2020 (Monica & Mauxi)
School Of 2020 (Monica & Mauxi)
 
School Of 2020 (Willy)
School Of 2020 (Willy)School Of 2020 (Willy)
School Of 2020 (Willy)
 
School Of 2020 (Nicolas & Salvador)
School Of 2020 (Nicolas & Salvador)School Of 2020 (Nicolas & Salvador)
School Of 2020 (Nicolas & Salvador)
 
School Of 2020 (Gerardo E)
School Of 2020 (Gerardo E)School Of 2020 (Gerardo E)
School Of 2020 (Gerardo E)
 
School Of 2020 (Jose & David)
School Of 2020 (Jose & David)School Of 2020 (Jose & David)
School Of 2020 (Jose & David)
 
School Of 2020 (Gerardo A)
School Of 2020 (Gerardo A)School Of 2020 (Gerardo A)
School Of 2020 (Gerardo A)
 

Último

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Último (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Revision Data Protection Act (Eduardo And Salvador)

  • 1. Made by: Salvador Palma Eduardo Diaz-Bazan
  • 2. What is the Data Protection Act and why was it • created? What are the eight principles of the Data • Protection Act? Data Protection Act: What rights do we have? • What is an Information Commissioner, Data • Controller and Data Subject? Are there any exemptions to the Data Protection • Act?
  • 3. The Data Protection Act was developed to give  protection and lay down the rules about how personal data can be used. It was created to protect individuals from misuse  of this data. It governs the collection and processing of data by organisations and the individual rights to access the data if they wish.
  • 4. Data must be kept secure. 1. Data stored must be relevant. 2. Data stored must be kept no longer than necessary. 3. Data stored must be kept accurate and up-to-date. 4. 5. Data must be obtained and processed lawfully. 6. Data must be processed within the data subject rights. 7. Data must be obtained and specified for lawful purposes. 8. Data must not be transferred to countries without adequate data protection laws.
  • 5. To be supplied with the data held about us. • To change incorrect data. • To prevent data being used about us if it will • cause distress. To stop data being used in attempts to sell us • something if the data was not collected for that purpose. To use the law to gain compensation. •
  • 6. Information Commissioner: Person who has  the power to enforce the Act. Data Controller: Person or Company that  collects and keeps data about people. Data Subject: Person who has data about them  stored outside their direct control.
  • 7. Police can access personal information in order to • solve crimes. The taxman can access personal information to • ensure people pay their taxes. Any data held for domestic purposes at home e.g. • birthday lists, address books.
  • 8. Early invasions of privacy was defined as the trespass,  assault, or eavesdropping, but now, all the new technologies like computers and cell phones have to be taken into account. Before many of nowadays technology, people could  be almost certain that they could hold a conversation privately in a person's home or office and that they could not be heard by other people. Before the invention of computer databases, people could have information safe and secure in a filing cabinet which is hard to access, but now with the use of technologies like computers, people can hack computers and access to a lot of private information.
  • 9. Modern privacy laws state that the following are considered as the  most important invasions of privacy: unreasonable intrusion upon the seclusion of another, for example, physical invasion of a  person's home (e.g., unwanted entry, looking into windows with binoculars or camera, tapping telephone), searching wallet or purse, repeated and persistent telephone calls, obtaining financial data (e.g., bank balance) without person's consent, etc. appropriation of a person's name or likeness; successful assertions of this right commonly  involve defendant's use of a person's name or likeness on a product label or in advertising a product or service. A similar concept is the quot;right of publicityquot; in Restatement (Third) Unfair Competition §§46-47 (1995). The distinction is that privacy protects against quot;injury to personal feelingsquot;, while the right of publicity protects against unauthorized commercial exploitation of a person's name or face. As a practical matter, celebrities generally sue under the right of publicity, while ordinary citizens sue under privacy. publication of private facts, for example, income tax data, sexual relations, personal letters,  family quarrels, medical treatment, photographs of person in his/her home. publication that places a person in a false light, which is similar to defamation. A successful  defamation action requires that the information be false. In a privacy action the information is generally true, but the information created a false impression about the plaintiff. Further more, it must be said that the most common and most latent privacy concern is the  second one, also known as identity theft.
  • 10. surreptitious interception of conversations in a house or hotel room is  eavesdropping. See e.g., N.Y. Penal §§ 250.00, 250.05 one has a right of privacy for contents of envelopes sent via first-class  U.S. Mail. 18 USC § 1702; 39 USC § 3623 one has a right of privacy for contents of telephone conversations,  telegraph messages, or electronic data by wire. 18 USC § 2510 et seq. one has a right of privacy for contents of radio messages. 47 USC §605  A federal statute denies federal funds to educational institutions that do  not maintain confidentiality of student records, which enforces privacy rights of students in a backhanded way. 20 USC § 1232g. Commonly called the Buckley-Pell Amendment to the Family Educational Rights and Privacy Act. See also Krebs v. Rutgers, 797 F.Supp. 1246 (D.N.J. 1991); Tombrello v. USX Corp., 763 F.Supp. 541 (N.D.Ala.1991). Records of sales or rentals of video tapes are confidential. 18 USC §2710  Content of e-mail in public systems are confidential. 18 USC § 2702(a). Bank records are confidential. 12 USC §3401 et seq.  library records are confidential in some states. e.g., N.Y. CPLR § 4509;  Quad/Graphics, Inc. v. Southern Adirondack Library Sys., 664 N.Y.S.2d 225 (N.Y.Sup.Ct. 30 Sep 1997)
  • 11. Islam gives great importance to the fundamental human right to  privacy. This is evident from the Quran, as some of the verses state:'Do  not spy on one another' (49:12); 'Do not enter any houses except your own homes unless you are sure of their occupants' consent' (24:27). various laws have been declared to be in violation of the  injunctions of Islam by the Federal Shariah Court. The Constitution of Pakistan, as well as the Pakistani law on Freedom of Information, recognizes the right to privacy. Despite this, the main objective of the draft Pakistani Data Protection Law is not to enshrine the principles of Islam, but to satisfy the requirements of European Union Directive 95/46, in particular Article 25 thereof, with the hope of ensuring that data will be allowed to flow freely between the European Union and Pakistan, thus making Pakistan an attractive market for outsourcing.
  • 12. In pakistan , the new law has been applied, it  consists on the protection of private facts. The EDPSA that the subjet being investigated  or of whow data is being collected should be provided with a notice. This notice will have to be given to the Certification Council.
  • 13. (a) name or trade name, and address of the data controller and data  processor (b) manner of collection of local data  (c) purposes and means of the processing;  (c) description of the data, the location where they are kept and the  categories of data subjects to whom they relate; (d) limits of data clisclosure aud disseniination  (e) intended transfers of data to any country or teritory outside Pakistan;  (f) general description that allows an assessment of the technical and  organizational measures taken to ensyre data security; (g) specification of any data filing system which fue processing is related  to, and the connections, if any. with other data processing or data filing systems. whether within Pakistan or not;  (h) copy of the contract between data controller aiid data processor;  (i) the capacity and authority of the individual submitting the notice. 