SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Data Protection Act (1998) Made by: Salvador Palma Eduardo Diaz-Bazan
[object Object]
  What are the eight principles of the Data Protection Act?
  Data Protection Act: What rights do we have?
  What is an Information Commissioner, Data Controller and Data Subject?
  Are there any exemptions to the Data Protection Act?After this presentation you should be able to know…
The Data Protection Act was developed to give protection and lay down the rules about how personal data can be used. It was created to protect individuals from misuse of this data.  It governs the collection and processing of data by organisations and the individual rights to access the data if they wish. What is it and why was it created?
What are the eight principles of it? Data must be kept secure. Data stored must be relevant. Data stored must be kept no longer than necessary. Data stored must be kept accurate and up-to-date. 5. Data must be obtained and processed lawfully. 6. Data must be processed within the data subject rights. 7. Data must be obtained and specified for lawful purposes. 8. Data must not be transferred to countries without adequate data protection laws.
[object Object]
To change incorrect data.
To prevent data being used about us if it will cause distress.
To stop data being used in attempts to sell us something if the data was not collected for that purpose.
To use the law to gain compensation.What rights do we have as data subjects?

Weitere ähnliche Inhalte

Was ist angesagt?

Data Privacy Act in the Philippines
Data Privacy Act in the PhilippinesData Privacy Act in the Philippines
Data Privacy Act in the PhilippinesShirley Ingles-Cruz
 
Right to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-finalRight to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-finalGraham Smith
 
Data Privacy Act of 2012 (R.A. 10173) Briefing 2017
Data Privacy Act of 2012 (R.A. 10173) Briefing 2017Data Privacy Act of 2012 (R.A. 10173) Briefing 2017
Data Privacy Act of 2012 (R.A. 10173) Briefing 2017Jay Castillo
 
What happens to our virtual account or digital asset or data after our death ?
What happens to our virtual account or digital asset or data after our death ?What happens to our virtual account or digital asset or data after our death ?
What happens to our virtual account or digital asset or data after our death ?Bivas Chatterjee
 
Privacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminarPrivacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminarLance Michalson
 
Philippine Data Privacy Act of 2012 (RA 10173)
Philippine Data Privacy Act of 2012 (RA 10173)Philippine Data Privacy Act of 2012 (RA 10173)
Philippine Data Privacy Act of 2012 (RA 10173)Kirk Go
 
October 2007 Icle Presentation Final
October 2007 Icle Presentation   FinalOctober 2007 Icle Presentation   Final
October 2007 Icle Presentation FinalDavid Cassidy
 
Data Privacy Act of 2012 implication to cooperatives
Data Privacy Act of 2012 implication to cooperativesData Privacy Act of 2012 implication to cooperatives
Data Privacy Act of 2012 implication to cooperativesjo bitonio
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection ActYizi
 
Clyrofor popia readiness webinar
Clyrofor  popia readiness webinarClyrofor  popia readiness webinar
Clyrofor popia readiness webinarLesedi Mnisi
 

Was ist angesagt? (20)

Data Privacy Act in the Philippines
Data Privacy Act in the PhilippinesData Privacy Act in the Philippines
Data Privacy Act in the Philippines
 
Privacy and Privacy Law in India By Prashant Mali
Privacy and Privacy Law in India By Prashant MaliPrivacy and Privacy Law in India By Prashant Mali
Privacy and Privacy Law in India By Prashant Mali
 
Right to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-finalRight to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-final
 
CEU DPA
CEU DPACEU DPA
CEU DPA
 
Data Privacy Act of 2012 (R.A. 10173) Briefing 2017
Data Privacy Act of 2012 (R.A. 10173) Briefing 2017Data Privacy Act of 2012 (R.A. 10173) Briefing 2017
Data Privacy Act of 2012 (R.A. 10173) Briefing 2017
 
What happens to our virtual account or digital asset or data after our death ?
What happens to our virtual account or digital asset or data after our death ?What happens to our virtual account or digital asset or data after our death ?
What happens to our virtual account or digital asset or data after our death ?
 
Right to privacy
Right to privacyRight to privacy
Right to privacy
 
Privacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminarPrivacy and Protection of Personal Information law seminar
Privacy and Protection of Personal Information law seminar
 
Philippine Data Privacy Act of 2012 (RA 10173)
Philippine Data Privacy Act of 2012 (RA 10173)Philippine Data Privacy Act of 2012 (RA 10173)
Philippine Data Privacy Act of 2012 (RA 10173)
 
October 2007 Icle Presentation Final
October 2007 Icle Presentation   FinalOctober 2007 Icle Presentation   Final
October 2007 Icle Presentation Final
 
Data privacy act
Data privacy actData privacy act
Data privacy act
 
Data privacy act of 2012 presentation
Data privacy act of 2012 presentationData privacy act of 2012 presentation
Data privacy act of 2012 presentation
 
Privacy act
Privacy actPrivacy act
Privacy act
 
Right to privacy in India
Right to privacy in IndiaRight to privacy in India
Right to privacy in India
 
Data Privacy Act of 2012 implication to cooperatives
Data Privacy Act of 2012 implication to cooperativesData Privacy Act of 2012 implication to cooperatives
Data Privacy Act of 2012 implication to cooperatives
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
Sopa and pipa
Sopa and pipaSopa and pipa
Sopa and pipa
 
The Right to Privacy
The Right to PrivacyThe Right to Privacy
The Right to Privacy
 
Popi act presentation
Popi act presentationPopi act presentation
Popi act presentation
 
Clyrofor popia readiness webinar
Clyrofor  popia readiness webinarClyrofor  popia readiness webinar
Clyrofor popia readiness webinar
 

Ähnlich wie Revision Data Protection Act ( Eduardo And Salvador)

Privacy, human rights and Location Based Services
Privacy, human rights and Location Based ServicesPrivacy, human rights and Location Based Services
Privacy, human rights and Location Based Servicesblogzilla
 
Links Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docxLinks Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docxsmile790243
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer PrivacyAshish Jain
 
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdfAll_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdfJakeAldrinDegala1
 
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...Prof. (Dr.) Tabrez Ahmad
 
Chapter2
Chapter2Chapter2
Chapter2Pibi Lu
 
An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database ProtectionSinghania2015
 
Pubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David MinkPubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David MinkMatt Siltala
 
1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docxhyacinthshackley2629
 
Lesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxLesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxadnis1
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in ITAnushka Perera
 
Examples of international privacy legislation
Examples of international privacy legislationExamples of international privacy legislation
Examples of international privacy legislationUlf Mattsson
 

Ähnlich wie Revision Data Protection Act ( Eduardo And Salvador) (15)

Privacy, human rights and Location Based Services
Privacy, human rights and Location Based ServicesPrivacy, human rights and Location Based Services
Privacy, human rights and Location Based Services
 
Privacy - USC 2005
Privacy - USC 2005Privacy - USC 2005
Privacy - USC 2005
 
Links Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docxLinks Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docx
 
Consumer Privacy
Consumer PrivacyConsumer Privacy
Consumer Privacy
 
Chap 4 (1)
Chap 4 (1)Chap 4 (1)
Chap 4 (1)
 
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdfAll_you_need_to Know_About_the_Data_Privacy_Act.pdf
All_you_need_to Know_About_the_Data_Privacy_Act.pdf
 
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...
 
Chapter2
Chapter2Chapter2
Chapter2
 
An Indian Outline on Database Protection
An Indian Outline on Database ProtectionAn Indian Outline on Database Protection
An Indian Outline on Database Protection
 
Cie 2 cyber law
Cie 2  cyber lawCie 2  cyber law
Cie 2 cyber law
 
Pubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David MinkPubcon Privacy Legal Presentation by David Mink
Pubcon Privacy Legal Presentation by David Mink
 
1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx
 
Lesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxLesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptx
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
Examples of international privacy legislation
Examples of international privacy legislationExamples of international privacy legislation
Examples of international privacy legislation
 

Mehr von itgsabc

Smart Homes (Alberto & Eduardo)
Smart Homes (Alberto & Eduardo)Smart Homes (Alberto & Eduardo)
Smart Homes (Alberto & Eduardo)itgsabc
 
Smart Houses (Alberto & Eduardo)
Smart Houses (Alberto & Eduardo)Smart Houses (Alberto & Eduardo)
Smart Houses (Alberto & Eduardo)itgsabc
 
Revision Viruses ( Gerardo E)
Revision     Viruses ( Gerardo  E)Revision     Viruses ( Gerardo  E)
Revision Viruses ( Gerardo E)itgsabc
 
Revision Psychological Consequences Of Being In Constant Contact ( Jose, ...
Revision    Psychological Consequences Of Being In Constant Contact ( Jose,  ...Revision    Psychological Consequences Of Being In Constant Contact ( Jose,  ...
Revision Psychological Consequences Of Being In Constant Contact ( Jose, ...itgsabc
 
Portfolio Teleworking ( Javier)
Portfolio    Teleworking ( Javier)Portfolio    Teleworking ( Javier)
Portfolio Teleworking ( Javier)itgsabc
 
Revision Terrorist And Rebel Use Of It (David & Jorge)
Revision   Terrorist And Rebel Use Of It (David & Jorge)Revision   Terrorist And Rebel Use Of It (David & Jorge)
Revision Terrorist And Rebel Use Of It (David & Jorge)itgsabc
 
Revision Expert Systems (Claudia, Federico, Natalia)
Revision   Expert Systems (Claudia, Federico, Natalia)Revision   Expert Systems (Claudia, Federico, Natalia)
Revision Expert Systems (Claudia, Federico, Natalia)itgsabc
 
Portfolio Internet Addiction (Monica And Lorena)
Portfolio   Internet Addiction (Monica And Lorena)Portfolio   Internet Addiction (Monica And Lorena)
Portfolio Internet Addiction (Monica And Lorena)itgsabc
 
Portfolio Pro Ana Websites (Joanna And Rebecca)
Portfolio   Pro Ana Websites (Joanna And Rebecca)Portfolio   Pro Ana Websites (Joanna And Rebecca)
Portfolio Pro Ana Websites (Joanna And Rebecca)itgsabc
 
Portfolio Biometric Use In Schools (Fingerprints) (Jenny)
Portfolio   Biometric Use In Schools       (Fingerprints) (Jenny)Portfolio   Biometric Use In Schools       (Fingerprints) (Jenny)
Portfolio Biometric Use In Schools (Fingerprints) (Jenny)itgsabc
 
Revision Psychological Consequences Of Being In Constant Contact (Jose, Bobby)
Revision   Psychological Consequences Of Being In Constant Contact (Jose, Bobby)Revision   Psychological Consequences Of Being In Constant Contact (Jose, Bobby)
Revision Psychological Consequences Of Being In Constant Contact (Jose, Bobby)itgsabc
 
Revision Viruses (Gerardo E)
Revision    Viruses (Gerardo E)Revision    Viruses (Gerardo E)
Revision Viruses (Gerardo E)itgsabc
 
Portfolio Should Students Use Wikipedia (David C)
Portfolio   Should Students Use Wikipedia (David C)Portfolio   Should Students Use Wikipedia (David C)
Portfolio Should Students Use Wikipedia (David C)itgsabc
 
Portfolio Teleworking (Javier)
Portfolio   Teleworking (Javier)Portfolio   Teleworking (Javier)
Portfolio Teleworking (Javier)itgsabc
 
School Of 2020 (Monica & Mauxi)
School Of 2020 (Monica & Mauxi)School Of 2020 (Monica & Mauxi)
School Of 2020 (Monica & Mauxi)itgsabc
 
School Of 2020 (Willy)
School Of 2020 (Willy)School Of 2020 (Willy)
School Of 2020 (Willy)itgsabc
 
School Of 2020 (Nicolas & Salvador)
School Of 2020 (Nicolas & Salvador)School Of 2020 (Nicolas & Salvador)
School Of 2020 (Nicolas & Salvador)itgsabc
 
School Of 2020 (Gerardo E)
School Of 2020 (Gerardo E)School Of 2020 (Gerardo E)
School Of 2020 (Gerardo E)itgsabc
 
School Of 2020 (Jose & David)
School Of 2020 (Jose & David)School Of 2020 (Jose & David)
School Of 2020 (Jose & David)itgsabc
 
School Of 2020 (Gerardo A)
School Of 2020 (Gerardo A)School Of 2020 (Gerardo A)
School Of 2020 (Gerardo A)itgsabc
 

Mehr von itgsabc (20)

Smart Homes (Alberto & Eduardo)
Smart Homes (Alberto & Eduardo)Smart Homes (Alberto & Eduardo)
Smart Homes (Alberto & Eduardo)
 
Smart Houses (Alberto & Eduardo)
Smart Houses (Alberto & Eduardo)Smart Houses (Alberto & Eduardo)
Smart Houses (Alberto & Eduardo)
 
Revision Viruses ( Gerardo E)
Revision     Viruses ( Gerardo  E)Revision     Viruses ( Gerardo  E)
Revision Viruses ( Gerardo E)
 
Revision Psychological Consequences Of Being In Constant Contact ( Jose, ...
Revision    Psychological Consequences Of Being In Constant Contact ( Jose,  ...Revision    Psychological Consequences Of Being In Constant Contact ( Jose,  ...
Revision Psychological Consequences Of Being In Constant Contact ( Jose, ...
 
Portfolio Teleworking ( Javier)
Portfolio    Teleworking ( Javier)Portfolio    Teleworking ( Javier)
Portfolio Teleworking ( Javier)
 
Revision Terrorist And Rebel Use Of It (David & Jorge)
Revision   Terrorist And Rebel Use Of It (David & Jorge)Revision   Terrorist And Rebel Use Of It (David & Jorge)
Revision Terrorist And Rebel Use Of It (David & Jorge)
 
Revision Expert Systems (Claudia, Federico, Natalia)
Revision   Expert Systems (Claudia, Federico, Natalia)Revision   Expert Systems (Claudia, Federico, Natalia)
Revision Expert Systems (Claudia, Federico, Natalia)
 
Portfolio Internet Addiction (Monica And Lorena)
Portfolio   Internet Addiction (Monica And Lorena)Portfolio   Internet Addiction (Monica And Lorena)
Portfolio Internet Addiction (Monica And Lorena)
 
Portfolio Pro Ana Websites (Joanna And Rebecca)
Portfolio   Pro Ana Websites (Joanna And Rebecca)Portfolio   Pro Ana Websites (Joanna And Rebecca)
Portfolio Pro Ana Websites (Joanna And Rebecca)
 
Portfolio Biometric Use In Schools (Fingerprints) (Jenny)
Portfolio   Biometric Use In Schools       (Fingerprints) (Jenny)Portfolio   Biometric Use In Schools       (Fingerprints) (Jenny)
Portfolio Biometric Use In Schools (Fingerprints) (Jenny)
 
Revision Psychological Consequences Of Being In Constant Contact (Jose, Bobby)
Revision   Psychological Consequences Of Being In Constant Contact (Jose, Bobby)Revision   Psychological Consequences Of Being In Constant Contact (Jose, Bobby)
Revision Psychological Consequences Of Being In Constant Contact (Jose, Bobby)
 
Revision Viruses (Gerardo E)
Revision    Viruses (Gerardo E)Revision    Viruses (Gerardo E)
Revision Viruses (Gerardo E)
 
Portfolio Should Students Use Wikipedia (David C)
Portfolio   Should Students Use Wikipedia (David C)Portfolio   Should Students Use Wikipedia (David C)
Portfolio Should Students Use Wikipedia (David C)
 
Portfolio Teleworking (Javier)
Portfolio   Teleworking (Javier)Portfolio   Teleworking (Javier)
Portfolio Teleworking (Javier)
 
School Of 2020 (Monica & Mauxi)
School Of 2020 (Monica & Mauxi)School Of 2020 (Monica & Mauxi)
School Of 2020 (Monica & Mauxi)
 
School Of 2020 (Willy)
School Of 2020 (Willy)School Of 2020 (Willy)
School Of 2020 (Willy)
 
School Of 2020 (Nicolas & Salvador)
School Of 2020 (Nicolas & Salvador)School Of 2020 (Nicolas & Salvador)
School Of 2020 (Nicolas & Salvador)
 
School Of 2020 (Gerardo E)
School Of 2020 (Gerardo E)School Of 2020 (Gerardo E)
School Of 2020 (Gerardo E)
 
School Of 2020 (Jose & David)
School Of 2020 (Jose & David)School Of 2020 (Jose & David)
School Of 2020 (Jose & David)
 
School Of 2020 (Gerardo A)
School Of 2020 (Gerardo A)School Of 2020 (Gerardo A)
School Of 2020 (Gerardo A)
 

Kürzlich hochgeladen

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Kürzlich hochgeladen (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Revision Data Protection Act ( Eduardo And Salvador)

  • 1. Data Protection Act (1998) Made by: Salvador Palma Eduardo Diaz-Bazan
  • 2.
  • 3. What are the eight principles of the Data Protection Act?
  • 4. Data Protection Act: What rights do we have?
  • 5. What is an Information Commissioner, Data Controller and Data Subject?
  • 6. Are there any exemptions to the Data Protection Act?After this presentation you should be able to know…
  • 7. The Data Protection Act was developed to give protection and lay down the rules about how personal data can be used. It was created to protect individuals from misuse of this data. It governs the collection and processing of data by organisations and the individual rights to access the data if they wish. What is it and why was it created?
  • 8. What are the eight principles of it? Data must be kept secure. Data stored must be relevant. Data stored must be kept no longer than necessary. Data stored must be kept accurate and up-to-date. 5. Data must be obtained and processed lawfully. 6. Data must be processed within the data subject rights. 7. Data must be obtained and specified for lawful purposes. 8. Data must not be transferred to countries without adequate data protection laws.
  • 9.
  • 11. To prevent data being used about us if it will cause distress.
  • 12. To stop data being used in attempts to sell us something if the data was not collected for that purpose.
  • 13. To use the law to gain compensation.What rights do we have as data subjects?
  • 14. Information Commissioner: Person who has the power to enforce the Act. Data Controller: Person or Company that collects and keeps data about people. Data Subject: Person who has data about them stored outside their direct control. What is an Information Commissioner, Data Controller and Data Subject?
  • 15.
  • 16. The taxman can access personal information to ensure people pay their taxes.
  • 17. Any data held for domestic purposes at home e.g. birthday lists, address books.Are there any exemptions to the Data Protection Act?
  • 18. Early invasions of privacy was defined as the trespass, assault, or eavesdropping, but now, all the new technologies like computers and cell phones have to be taken into account. Before many of nowadays technology, people could be almost certain that they could hold a conversation privately in a person's home or office and that they could not be heard by other people. Before the invention of computer databases, people could have information safe and secure in a filing cabinet which is hard to access, but now with the use of technologies like computers, people can hack computers and access to a lot of private information. Privacy in the US
  • 19. Modernprivacylawsstatethatthefollowing are considered as themostimportantinvasions of privacy: unreasonable intrusion upon the seclusion of another, for example, physical invasion of a person's home (e.g., unwanted entry, looking into windows with binoculars or camera, tapping telephone), searching wallet or purse, repeated and persistent telephone calls, obtaining financial data (e.g., bank balance) without person's consent, etc. appropriation of a person's name or likeness; successful assertions of this right commonly involve defendant's use of a person's name or likeness on a product label or in advertising a product or service. A similar concept is the "right of publicity" in Restatement (Third) Unfair Competition §§46-47 (1995). The distinction is that privacy protects against "injury to personal feelings", while the right of publicity protects against unauthorized commercial exploitation of a person's name or face. As a practical matter, celebrities generally sue under the right of publicity, while ordinary citizens sue under privacy. publication of private facts, for example, income tax data, sexual relations, personal letters, family quarrels, medical treatment, photographs of person in his/her home. publication that places a person in a false light, which is similar to defamation. A successful defamation action requires that the information be false. In a privacy action the information is generally true, but the information created a false impression about the plaintiff. Further more, itmustbesaidthatthemostcommon and mostlatentprivacyconcernisthesecondone, alsoknown as identitytheft. Modernprivacylaws
  • 20. surreptitious interception of conversations in a house or hotel room is eavesdropping. See e.g., N.Y. Penal §§ 250.00, 250.05 one has a right of privacy for contents of envelopes sent via first-class U.S. Mail. 18 USC § 1702; 39 USC § 3623 one has a right of privacy for contents of telephone conversations, telegraph messages, or electronic data by wire. 18 USC § 2510 et seq. one has a right of privacy for contents of radio messages. 47 USC §605 A federal statute denies federal funds to educational institutions that do not maintain confidentiality of student records, which enforces privacy rights of students in a backhanded way. 20 USC § 1232g. Commonly called the Buckley-Pell Amendment to the Family Educational Rights and Privacy Act. See also Krebs v. Rutgers, 797 F.Supp. 1246 (D.N.J. 1991); Tombrello v. USX Corp., 763 F.Supp. 541 (N.D.Ala.1991). Records of sales or rentals of video tapes are confidential. 18 USC §2710 Content of e-mail in public systems are confidential. 18 USC § 2702(a). Bank records are confidential. 12 USC §3401 et seq. library records are confidential in some states.     e.g., N.Y. CPLR § 4509; Quad/Graphics, Inc. v. Southern Adirondack Library Sys., 664 N.Y.S.2d 225 (N.Y.Sup.Ct. 30 Sep 1997) Federal statutes:
  • 21. Islam gives great importance to the fundamental human right to privacy. This is evident from the Quran, as some of the verses state:'Do not spy on one another' (49:12); 'Do not enter any houses except your own homes unless you are sure of their occupants' consent' (24:27). various laws have been declared to be in violation of the injunctions of Islam by the Federal Shariah Court. The Constitution of Pakistan, as well as the Pakistani law on Freedom of Information, recognizes the right to privacy. Despite this, the main objective of the draft Pakistani Data Protection Law is not to enshrine the principles of Islam, but to satisfy the requirements of European Union Directive 95/46, in particular Article 25 thereof, with the hope of ensuring that data will be allowed to flow freely between the European Union and Pakistan, thus making Pakistan an attractive market for outsourcing. Privacy in Islam countries
  • 22. In pakistan , the new law has beenapplied, itconsistsontheprotection of privatefacts. The EDPSA thatthesubjetbeinginvestigatedor of whow data isbeingcollectedshouldbeprovidedwith a notice. ThisnoticewillhavetobegiventotheCertification Council. Electronic Data Protection and Safety Act
  • 23. (a) nameortradename, and address of the data controller and data processor (b) manner of collection of local data (c) purposes and means of theprocessing; (c) description of the data, thelocationwherethey are kept and thecategories of data subjectstowhomthey relate; (d) limits of data clisclosureauddisseniination (e) intendedtransfers of data toany country orteritoryoutsidePakistan; (f) general descriptionthatallowsanassessment of thetechnical and organizationalmeasurestakentoensyre data security; (g) specification of any data filingsystemwhich fue processingisrelatedto, and theconnections, ifany. withother data processingor data filingsystems. whetherwithin Pakistanornot; (h) copy of thecontractbetween data controlleraiid data processor; (i) thecapacity and authority of the individual submittingthenotice. The notice: