Data Protection Act 1998

Mind Map by , created almost 6 years ago

Mind Map on Data Protection Act 1998, created by nquermia20 on 01/13/2014.

Created by nquermia20 almost 6 years ago
Elliot O'Leary
pelumi opabisi
RE Keywords - Paper 1 - Religion and life
Kerris Linney
AQA GCSE Biology B1 unit 1
Olivia Phillips
IGCSE Physics formulas
Imani :D
New GCSE Maths
Sarah Egan
Elliot O'Leary
New GCSE Maths required formulae
Sarah Egan
9 History- The Treaty of Versailles
Elliot O'Leary
Data Protection Act 1998
1 Data protection principles
1.1 1.Personal data will be processed fairly and lawfully.
1.1.1 In order for this principle to be applied one of these 6 sub-principles must be met. 1.The person has given consent for the use of their personal data. 2.The processing of the data is necessary for a contract or the commencing of a contract. 3.Processing of the data is a legal requirment. 4.Processing is necessary to protect the interests of the data subject. 5.Processing is needed to carry out any public services. 6.Processing of said data is necessary to pursue the legitimate interests of "third parties". Unless it would be unjust prejudice towards the interests of the data subject.
1.2 2.Personal data shall be obtained for only the specified uses.
1.3 3. Personal data will be relevant and not excessive towards the purpose that the data was intended for.
1.4 4. Personal data shall be accurate and if necessary kept up to date.
1.5 5.Personal data shall not be kept longer than necessary for the intended purpose.
1.6 6. That the personal data has to be used in accord with human rights.
1.7 7. Measures will be taken to prevent the unauthorized access to personal data or the damaging.
1.8 8.personal data shall not be transferred to a country outside the European Economic Area, unless that country can and does follow the Data Protection Act 1998.
2 Other Facts
2.1 Replaced the Data Protection Act of 1984 and the Access to Personal Files Act of 1987.
3 Threats to privacy
3.1 Social Networking Sites:
3.1.1 They store the interactions that you have and then save and use them at a later date
3.2 Spyware:
3.2.1 You can be tricked into downloading some spyware from which someone can spy on the information on your computer.
3.3 Hackers:
3.3.1 They get unauthorised access to your personal information.
3.4 Identity Theft:
3.4.1 Someone would pretend to be someone there not by using stolen personal information.
3.5 Cookies:
3.5.1 Stored small pieces of data about your interent history and this can be used to create personalised advertising this could be seen as a privacy.
3.6 Search Engines:
3.6.1 They store the history the time and the searches you've made in order to help personalise future internet access and also advertising. This does however create an easy route for hackers.
4 What you can do to contteract these threats to privacy.
4.1 Social Networking sites, use the privacy settings and also be aware of how much personal data you post on the internet.
4.2 Spyware, simply have the latest antispyware software.
4.3 Hackers, use firewalls, good passwords and encrypt information that you send across the internet.
4.4 Identity Theft, keep all your personal information safe.
4.5 Cookies, learn how to delet and manage cookies
4.6 Search engines, be careful to sign out of accounts especially on public computers.

Media attachments