WHAT IS GENERAL DATA PROTECTION REGULATION?

Slides:



Advertisements
Similar presentations
What Are Scams? Scams are designed to trick you into giving away your money or your personal details. Scams come to you in many forms – by mail, ,
Advertisements

Internet Safety Rockingham County Public Schools
Fraud and Identity Theft Test Review. Who should you contact if you are a victim of identity theft?
Internet Safety/Cyber Ethics
Netiquette Rules.
Confidentiality… important facts to know and critical things to do!
Safety In CyberSpace. ‘Report Abuse’ in action Look for this link on websites Microsoft have made a real commitment Approx £30,000 per month revenue.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Reliability & Desirability of Data
Can YOU Stay Safe in Cyberspace? Protect online accounts and mobile phones with a PASSWORD – and don't share it with anyone! Look through your online contacts.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
Viruses For… What is a virus? A virus, affects your computer and damages its software. It can affect your computer, and some viruses can damage your.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Internet safety.. Dangers of the internet: Paedophiles. Cyber bullying. Money theft. Sexual harassment. Identity theft. Hacking of your accounts. Viruses.
To understand how to recognise and avoid potential fraudulent situations To appreciate that being a victim of fraud may affect me emotionally as well.
Pick Ups & Job Management Beginning the Job. Pick Ups The job of bookkeeping & Accountancy is about writing up, analysing, ensuring legal compliance and.
The Importance of Whois Accuracy Leslie Nobile
Gosbecks E-Safety Guide
Media Relations in an Emergency
Unit 5 Understand how to work in partnership
As modern children, we have a huge number of electronic devices available to us. We might use computers, tablets, mobile phones or games consoles; for.
Creating your online identity
E-Safety.
To Know what Cyber crime is
EA Sports FIFA 15-FIFA Coins or Points
Unit 4 IT Security.
How to use the internet safely and How to protect my personal data?
Quiz: How Are Your Meetings
How do we buy and sell on the Internet safely?
Online Safety! By: Michelle Deng.
How to use the internet safely and How to protect my personal data?
Year 4.
Mastering Administration
How to build a good reputation online
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
E-safety Staying safe online 2017/18.
Internet Fraud By (NAMES).
Dos and Don’t While Buying Locks Online (0)
Ian Ramsey C of E School GCSE ICT Smart working Online shopping.
Be Safe, Be Seen, Be Secure
Lesson 2: Epic Security Considerations
Finham Primary School – GDPR Practice Guidelines
How we use Your Health Records
GDPR (General Data Protection Regulation)
D3 Confidentiality.
Information management and communication
e-Commerce: Buying and Selling on the Internet
What is BankMobile? A process to select how to receive student refunds and student payroll payments It is fast, secure, and convenient. Go to:
SkillSurvey Texting Process
A Guide to Completing the Red Card Report Form
Phishing Don’t fall for fake
Mastering Administration
Follow safety rules so that YOU: Avoid getting HURT.
17 New Rules for Successful E-Commerce Websites
STAYING SAFE ON THE INTERNET
E SAFETY ASSEMBLY.
Highworth Town Juniors FC
Lesson 3 – staying safe with and chat
What is Phishing? Pronounced “Fishing”
STAYING SAFE WITH TECHNOLOLGY View the following presentation and try to click on the correct answers of the slides with questions.
Company Name | Phone Number | Website | Address
MyLion Registration Website | Mobile device
Communicating in the IT Industry
Advocacy Standards Events
A Student & Parent Guide
Guidance on completing the form
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

WHAT IS GENERAL DATA PROTECTION REGULATION? An EU wide regulation about the way organisations must behave when using your personal data It is combatting those unscrupulous organisations that hack into data, with the intention to use it in corrupt fashion or sell it on It also is aimed at making sure all legitimate organisations handle data in a responsible fashion so that it remains protected and confidential

WHAT IS THE RELEVANCE TO CREWE & DISTRICT? All organisations that handle personal data must ensure they do it correctly We have some personal data in our data base and we make it accessible through the web site – so it applies to us We need to be sure we are compliant and that you are confident that your data is safe with us

WHAT IS THE DATA WE ARE TALKING ABOUT? Personal data is anything that can be used to trace back to an individual that ought not to be made available unless the owner wants it to be - so: Email address, DOB, address, phone numbers, photos, match scores on scoresheets, club and team registration, BE number, tournament record, player statistics These are all the things we use that refer to you as an individual

HOW DO WE USE IT? To ensure that your registration is correctly managed in terms of Badminton England, club, teams To inform you of news and events via email, and respond to any mail you send us To record your scores in matches To provide you with a playing performance that we can also use to handicap from (for John Ford, Masters, Handicap) To record your tournament winners history

SO IS THE DATA SECURE AND PROTECTED? Yes it is – our webmaster has designed special protection routines that only allow people with the right permission to look at the data and manage it We use a secure internet service that prevents data being intercepted We are a ‘closed shop’, in that we do not import data from anywhere and we don’t export it to anywhere. What is in C&D stays in C&D You and Club officials maintain your data so it is accurate

SO SHOULD YOU DO ANYTHING? Not really – but the things you can do are: Insist on being able to see what data we have in C&D. If you ask we will show you. Club officials can show you that, and league officials also Tell us if there is anything you do not want to be made public – let’s just say email address. If so then we have to make that inaccessible.

SO SHOULD YOU DO ANYTHING? You can also Instruct us to erase any data we have that you decide you don’t want recorded. We have to do that, so club or league officials will sort that out Instruct corrections to be made if the data is wrong – club officials can do that and you can manage your own data Choose not to receive our communications

SO IS THIS A SONG AND DANCE ABOUT NOTHING? Definitely not. Modern cyber security is fighting a constant battle against hacking for gain. If data gets into the wrong hands: bank accounts can be fleeced, you are sold things you don’t want, you are harangued by people trying to con you, your emails disappear and you receive pleas for cash to be sent to Outer Mongolia. It is real but it can be prevented. Crewe and District is not a particularly lucrative place for hackers, our contact details are probably the most valuable, but we do not want to become another headline and there is no reason to think we will so long as we all fulfil our responsibilities properly