Lesson 3 Protecting ICT systems Data Protection Act 1998.

Slides:



Advertisements
Similar presentations
Administrative Systems and the Law What you need to know to produce an oral presentation for Unit 7 When the presentations will take place Resources you.
Advertisements

The Data Protection (Jersey) Law 2005.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
University of Sunderland Professionalism and Personal Skills Unit 11 Professionalism and Personal Skills Computer Legislation.
Factors to be taken into account when designing ICT Security Policies
Data Protection Act.
Data Protection Act Description The Data Protection Act controls how your personal information can be used and protects from the misuse of your.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Data Protection Overview
The Data Protection Act
Data Protection Act. Lesson Objectives To understand the data protection act.
The Legal Framework Can you work out which slide each bullet point should go on?!
CENTRAL SCOTLAND POLICE Data Protection & Information Security Stuart Macfarlane Information Governance Unit Police Service of Scotland.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Regulation of Personal Information Daniel Pettitt, Leon Sewell and Matthew Pallot.
Data Protection and You Your Rights & The Law Registration Basics Other Activities Disclaimer: This presentation only provides an introductory info. Please.
Data Protection and Computer Misuse Act material Modified by Eric from Mary’s slides.
Elma Graham. To understand what data protection is To reflect on how data protection affects you To consider how you would safeguard the data of others.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
Data Protection Act AS Module Heathcote Ch. 12.
The Data Protection Act (1998). The Data Protection Act allows you to Check if any organisation keeps information about you on computer or in paper form.
Data Protection Corporate training Data Protection Act 1998 Replaces DPA 1994 EC directive 94/46/EC The Information Commissioner The courts.
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
The Data Protection Act - Confidentiality and Associated Problems.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
Data Protection Act (1984, 1998). 2 Data Protection Act There are many organisations which hold personal information about individuals Examples: Loyalty.
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
The Data Protection Act What the Act covers The misuse of personal data by organisations and businesses.
LEGISLATION. DATA PROTECTION ACT (1998) The aim of this act give people the right to know what information is held about them. It also sets out rules.
Legal Implications You need to know about the following:
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
DATA PROTECTION AND RUNNING A COMPLIANT PUB WATCH SCHEME Nigel Connor Head of Legal –JD Wetherspoon PLC.
Security of, privacy of and access to personal/confidential information/data.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
Data protection act. During the second half of the 20th century, businesses, organisations and the government began using computers to store information.
The Data Protection Act 1998
The Data Protection Act 1998
Learning Intention Legislations impact on security of information
Data Protection GCSE ICT Mrs N Steventon-2005.
PowerPoint presentation
Handling Personal Data
Administrative Practices Outcome 1
Handout 2: Data Protection and Copyright
Legislation in ICT.
Data Protection Act.
Data Protection Act.
TB2 Lesson 5 Data Protection
The Data Protection Act 1998
Anonymised information
Data Protection Legislation
Data Protection & Freedom of Information- An Introduction
The Data Protection Act & ICT Law
Data Protection and Running a Compliant Pub Watch SCHeme
Unit 7 – Organisational Systems Security
Legal and Ethical Issues
Information management and communication
General Data Protection Regulations 2018
What is the Data Protection Act (DPA)? 1998
Legislation in ICT.
Data Protection.
Getting Ready For GDPR Simon Marks Director
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

Lesson 3 Protecting ICT systems Data Protection Act 1998

Protecting ICT systems Why protect computer systems ? Q and A

Internal threats to data security Disk crash – when data literally turns to dust Faulty procedures – staff training inadequate leading to data corruption Natural disasters Staff working from home – disk, data Dishonest employees (& students)

External threats Unauthorised access to data (see Computer Misuse Act) by ‘Hackers’ Virus’ loaded from outside sources Thought: Ask a bank how many times their security has been breached ? What would happen if they responded truthfully ?

Computing and the NHSnet Government spending watchdog, the National Audit Office, is to investigate a £6.2bn programme to install a computer system at the NHS. (31/08/04) What will be the benefits ? Q & A

Worries Can anyone look at my records ? Policed by Access on a need basis only Policed by Audit and monitoring will enforce

Benefits (NHSnet) The system is designed to link every GP's surgery and hospital in England and provide online records for up to 50 million patients. The government hopes every patient will have their own online record by 2010. NHS IT director general Richard Granger says people will start to feel the benefits of the system by 2005. According to health officials, the system will allow information about patients to be mobile for the first time.

Disadvantages (NHS) How much is the data worth ? Insurance companies Anti-abortionists Blackmailers Personal records Lawyers Drug companies Funeral parlours

System Protection Q & A How can I protect my system ?

System Protection Methods Physical User id + Password Restriction by user / location / time Audit and accounting Data encryption pre-transmission http://www.sygnusdata.co.uk/2_part_fetest_wanxl.htm

Encryption for security How safe is my 512-bit RSA encryption key ? http://www.rsasecurity.com/ Cracked by Dutch National Research for Mathematics and Computer Science in 1999 but it took scientists at 11 sites, in 6 countries, with 292 computers and 35 years of processing time

Encryption for personal use Q and A Is strong encryption (512) a good idea ? http://www.des-rsa-encryption-software-cryptography-group.com/

Data Safety (Types of backup) Online backup (disk shadowing, RAID – Redundant Array of Inexpensive Disks) Standalone backups Incremental backups Periodic backups

Data Safety (Protection) Anti-virus software Staff vetting Staff training Hardware pre-installation survey

Test 1 Describe four separate measures that can be taken to prevent accidental or deliberate misuse of data on a stand-alone computer.

Data Protection Act Became law in 1984 In-line with European Data Protection Directive (Data Protection Act 1998 – implemented March 2000) See also Freedom of Information Act 2000 The Telecommunications (Data Protection and Privacy) Regulations 1999 www.hmso.gov.uk

Data Protection Key Words Personal data – name, address Automatically processed – processed on a computer system. Are paper records covered ? Data users – Sole trader to multi-national Data subjects – you and me

Data Protection Act 1984, 1998 8 Principles Personal data must be obtained and processed fairly and lawfully Held for the lawful purposes described in the data user’s register entry Used for those purposes and disclosed only to those people described in the register entry Adequate, relevant and not excessive in relation to the purposes for which they are held

DPA 1984, 1998 contd 5 Accurate and where necessary up-to-date Held no longer than necessary for the designated purpose. Accessible to the individual concerned who, where appropriate, has the right to have information about themselves corrected or erased. Surrounded by proper security

The Data Protection Registrar Duties include register of data users Disseminating information regarding the DPA Promoting compliance with the Data Protection Principles Encourage Codes of Practice Consider complaints under Act or Principles

DPR contd 6 Prosecute offenders

Data User’s Registry Entry Must show their name, address etc Whose personal data they store Items of data held Purpose of holding data Source whereby data obtained Disclosed to whom Any overseas transfer of data

DPA 1984, 1998 Exemptions Payroll, pensions, accounts nor addresses for distribution Personal, family data Data subjects may be prevented from viewing data collated for research Data may be provided to subject’s agent (lawyer etc)

DPA 1984, 1998 Exemption In connection with National Security For prevention of crime For the collection of Tax and Duty

DPA – Rights of Data Subjects Civil court rights Compensation for unauthorised disclosure Compensation for inaccurate data Access to data and apply for corrections Compensation for unauthorised access, loss or destruction of data

Test 2 A company is storing details of its customers on a database. Describe three obligations the company has under the DPA.