Lesson 4 Storing data safely.

Slides:



Advertisements
Similar presentations
CTS130 Spreadsheet Lesson 14 Using Worksheet Templates.
Advertisements

Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
QMS Documentation Click the mouse to advance slides and animations in this slide show…
 When you receive a new you will be shown a highlighted in yellow box where your can be found  To open your new just double click.
A Computer is Like a Filing Cabinet
This is the first page of the log in, this is were you enter your unique details.
Data Protection Act. Lesson Objectives To understand the data protection act.
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely John Deere presents:
Emergency Records Organizer. Purpose of Keeping Emergency Records Record information that will be needed in one of the following situations: You or a.
 Password is what you set or student number  User name is  first 5 letters of last name  nelso  First 3 letters of first name  kar  Looks like:
SECURING DATA FOR ER STAFF Windy L. Newton May 29, 2015.
SLIR Computer Lab: Orientation and Training December 16, 1998.
TeamViewer. TeamViewer is an easy and friendly way for desktop sharing.
Windows XP Professional Features ©Richard L. Goldman February 5, 2003.
 When you receive a new you will be shown a highlighted in yellow box where your can be found  To open your new just double click.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
E-Safety. A great place… Image by: Shutterstock/nasirkhan As we have discussed over the last few lessons, the Internet is a great tool for sharing information,
© Harcourt Education 2006 OCR Nationals in ICT Teacher’s Resource; Unit 1 AO1 Lesson 3 Good Working Practices Keeping Work Safe.
4 TH YEAR PARENTS EVENING MOBILE DEVICES Mrs Helen Alexander Head of ICT/Computing.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Emergency Records Organizer By SIR Phil Goff, Branch 116 Area 2 Computers and Technology January 17, 2013.
1 Introduction to NTFS Permissions Assign NTFS permissions to specify Which users and groups can gain access to folders and files What they can do with.
11 Researcher practice in data management Margaret Henty.
Less Paper, More Power. Document Digitization and Management Solution. digipaper.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
How to use Exam Software
Enjoy Enhanced Control by Choosing Payroll Services
Introduction to NTFS Permissions
Understanding The Computer Login Account
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Data Protection Act.
Backstage view in word 2010.
Go to Covington County Schools Webpage Click on Forms and Links
HOW TO PUT PASSWORD IN WORD, SPREAD SHEET AND DATABASE
* First of all, you need to click “Start”, “Control Panel” and then System and Security. After this, you need to click on the link ‘Back up Your Computer’
Industrial Technology
Transfer E-Books, Newspapers & Magazines From PC To Kindle. (CHECK HERE)
How to fix AOL related issue AOL is a type of digital media company that has developed and maintained many online services including service, search.
Cloud Storage Services
Data Protection Scenarios
Guess What today’s lesson is all about…..
Setting up an online account
UNIT R001: Understanding Computer Systems
Bookmarking. Bookmarking Learning Outcomes Know how to create book marks Know how to produce a well structured, logical system to store electronic.
Unit 1 Effective Communication in Health and Social Care
HOW TO TRAIN PATIENTS ON COMPLETING THE QUESTIONNAIRES
D3 Confidentiality.
Information management and communication
Adam Little 3/10/2018 [website]
File Management.
INI MAIL A GUIDE TO VOICE MAIL!.
Safeguarding and Protecting individuals from abuse
in Business.
Guide to completing ANDA-AQCA 2017
Adverse events: Safe to report, safe to learn
BIT 143: Programming & Data Structures in C#
GDPR.
Understanding Browsers
Log on to Typing.com Type for 10 Minutes.
What do you think is different between these two images?
Typing.com Searching Scenario Continue typing test(s)
Company Name | Phone Number | Website | Address
Informed Consent Before taking part in this study it is important that you understand: This study aims to evaluate the benefits of lessons on sexually.
Tuesday, November 13th Typing.com 10 minutes.
Welcome to Career Life Education & Digital Communications 11!
Keeping your passwords safe
How To Password Protect A PDF Free With or Without Acrobat.
How To Compact or Compress PST Files In MS Outlook 2019/2016/2013.
UMMS Human Resources Learning Management System (LMS): Resetting Your Password Hello my name is Martha Streeter and I am the Director of HR Communications,
Presentation transcript:

Lesson 4 Storing data safely

Learning outcomes for today Consider how we store data Consider what data is required and what isn’t Overview of the Data Protection in the UK and its implications

How do we store data? How do you store data On your computer On your phone In your diary????

Keeping data secure Discussion how data security has developed over the years and the need to protect data and the responsibility we have when we collect data. Discussion of SMART passwords, don’t share passwords, have different passwords for different logons.

Which is your user area? Class discussion why is it important to organise folders and files- security aspect A mixture of files and folders. Names like Doc 1 or New folder 1, New folder 2. Lots of miss filled work. A simplistic system of clearly named folders and files stating what they contain.

Time for a tidy If in a computer room encourage students to clear out their user area. Creat a new folder for IP split into subfolder “Class notes” “Research” and “IP”

Storing data securely Do you need to use names/ contact details? If not anonymise all data Put a password on workbooks – BUT DON’T FORGET IT! File- Save as- Tools- General options Students to complete activity sheet producing an excel sheet and securing it

Data Protection in the UK What information can you keep about others? What cant you keep? How long can you keep it? What if there is a mistake? https://www.gov.uk/data-protection/the-data-protection-act