Anonymised information

Slides:



Advertisements
Similar presentations
Legal & Regulatory Compliance. Overview What types of information should be included? What issues or problems might there be? What benefits could be obtained?
Advertisements

Administrative Systems and the Law What you need to know to produce an oral presentation for Unit 7 When the presentations will take place Resources you.
TEAM 4 Case Study Mauritius: Mrs Nandini Kissoon-Luckputtya
The Data Protection (Jersey) Law 2005.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
1 Pertemuan 7 Points of Exposure Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
University of Sunderland Professionalism and Personal Skills Unit 11 Professionalism and Personal Skills Computer Legislation.
DATA PROTECTION AND PATIENT CONFIDENTIALITY IN RESEARCH Nic Drew Data Protection Manager University Hospital of Wales   
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Data Protection Overview
The Data Protection Act
Data Protection Act. Lesson Objectives To understand the data protection act.
 The Data Protection Act 1998 is an Act of Parliament which defines UK law on the processing of data on identifiable living people and it is the main.
The Legal Framework Can you work out which slide each bullet point should go on?!
CENTRAL SCOTLAND POLICE Data Protection & Information Security Stuart Macfarlane Information Governance Unit Police Service of Scotland.
The Information Commissioner’s Office David Evans.
Health & Social Care Apprenticeships & Diploma
EHRs and the European Union – current legislation and future directions. Dr Richard Fitton.
Research Paper Presentation Software Engineering in agent systems.
Elma Graham. To understand what data protection is To reflect on how data protection affects you To consider how you would safeguard the data of others.
The Data Protection Act 1998 The Eight Principles.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
Data Protection Act AS Module Heathcote Ch. 12.
The Data Protection Act (1998). The Data Protection Act allows you to Check if any organisation keeps information about you on computer or in paper form.
Data Protection Corporate training Data Protection Act 1998 Replaces DPA 1994 EC directive 94/46/EC The Information Commissioner The courts.
Processing personal health data: the regulator’s perspective Ken Macdonald Assistant Commissioner Information Commissioner’s Office.
What is personal data? Personal data is data about an individual which they consider to be private.
The Data Protection Act - Confidentiality and Associated Problems.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
Everyone has a duty to comply with the Act, including employers, employees, trainees, self-employed, manufacturers, suppliers, designers, importers of.
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
Data Protection Property Management Conference. What’s it got to do with me ? As a member of a management committee responsible for Guiding property you.
The Data Protection Act What the Act covers The misuse of personal data by organisations and businesses.
Data Protection Act The Data Protection Act (DPA) is a balance between rights of the DATA SUBJECT and obligations of the DATA CONTROLLER DATA CONTROLLER.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Computing, Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
Data Protection Philip Reed. Introduction What is data? What is data protection? Who needs your data? Who wants your data? Who does not need your data?
DATA PROTECTION ACT INTRODUCTION The Data Protection Act 1998 came into force on the 1 st March It is more far reaching than its predecessor,
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
DATA PROTECTION ACT DATA PROTECTION ACT  Gives rights to data subjects (i.e. people who have data stored about them on a computer)  Information.
Security of, privacy of and access to personal/confidential information/data.
Sharing Personal Data ‘What you need to know’ Corporate Information Governance Team Strategic Intelligence.
Clark Holt Limited (Co. No ), Hardwick House, Prospect Place, Swindon, SN1 3LJ Authorised and regulated by the Solicitors Regulation.
Data protection act. During the second half of the 20th century, businesses, organisations and the government began using computers to store information.
Protecting Data, Sharing Information Graham Wakerley: Director
The Data Protection Act 1998
The Data Protection Act 1998
Making the Connection ISO Master Class An Overview.
Data Protection GCSE ICT Mrs N Steventon-2005.
CISI – Financial Products, Markets & Services
Data Protection and Confidentiality
Trevor Ellis Trainee Programmer (1981 – 28 years ago)
Level 2 Diploma in Customer Service
Legislation in ICT.
General Data Protection Regulation
Data Protection Act.
The Data Protection Act 1998
Data Protection Legislation
The Data Protection Act & ICT Law
Data Protection Act.
Data Protection principles
Unit 7 – Organisational Systems Security
Unit 1 Effective Communication in Health and Social Care
Identify the laws and guidelines that affect day-to-day use of IT.
General Data Protection Regulations 2018
Legislation in ICT.
Understanding Data Protection
Dr Elizabeth Lomas The General Data Protection Regulation (GDPR): Changing the data protection landscape Dr Elizabeth Lomas
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

Security of, privacy of and access to personal/confidential information/data

Anonymised information Information about individuals without mentioning the person by name is called anonymised information. Where anonymised information would be sufficient for a particular purpose, organisations should always omit personal details wherever possible.

Aggregated information Aggregated information is where personal details of individuals are combined to provide information without naming those individuals. This could be in the form of medical information regarding a list of patients who are suffering from a certain illness.

Duty of confidence As was mentioned above, organisations should include a duty of confidence clause in employment contracts. Individuals who feel that their confidential data has been made public (i.e. their confidentiality has been breached) should complain to the organisation.

Duty of fidelity An employee must be loyal to their employer for so long as they work for them. That means that they must not tell any rival companies about their work. This does not mean that the information is confidential. Once an employee leaves a company they are free to use the skills and knowledge with their new employer.

Why was suspected child offender allowed to work in a school, which lead to him murdering these two girls?

Because he was only ‘suspected’ and never found guilty. The police wouldn’t realise this data to the school, due to data protection

What is the Data protection legislation? Data protection acts exist in most countries. These set down rules for keeping data private as well as confidential. Most countries have similar sets of data protection rules.

What are the eight principles of the DPA? Personal data shall be processed fairly and lawfully. Personal data shall be obtained only for a lawful purpose), and shall not be used for anything other than that purpos(es)

Personal data shall be adequate, relevant and not excessive in relation to the purpose (or purposes) for which they are processed.

Personal data shall be accurate and, where necessary, kept up to date. Personal data processed for any purpose shall not be kept for longer than is necessary for that purpose.

Personal data shall be processed in accordance with the rights of data subjects. Appropriate measures shall be taken against unauthorised or unlawful processing data. Including loss / leaks.

Personal data shall not be transferred to a country outside the European Economic Area unless that country guarantees the same level of data protection.

Phishing My username My password

Pharming Instead of an email being sent with a fake link. Imagine you goto HSBC.ae and the site has been ‘hacked’. It looks correct But you login and it doesn’t work. Pharming is when the site or DNS is hacked, this is down to banks to check this

Spyware Software that is accidently downloaded. Allows ‘creator of the software’ to be able to spy on you. Most anti-virus will detect spyware as well.