DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.

Slides:



Advertisements
Similar presentations
Administrative Systems and the Law What you need to know to produce an oral presentation for Unit 7 When the presentations will take place Resources you.
Advertisements

Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
Identity Fraud 1 / 18 Eastbourne Citizens Advice Bureau Financial Literacy IDENTITY FRAUD.
Protecting Your Identity: What to Know, What to Do.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Training prepared by Geoff Webb Information Security & Governance Consultant Data Protection isn’t a choice, it’s the law What all CPH staff must do 17/07/2013.
Identity Theft Both Offline And Online It’s Not New Just Easier…
1 Pertemuan 7 Points of Exposure Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Duncan Woodhouse – Assistant Registrar for Information Security, Risk Management and Business Continuity Helen Wollerton – Administrative Officer (Legal.
3 Is there something I should know? Exercising our rights.
Data Protection Act.
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
DATA PROTECTION AND PATIENT CONFIDENTIALITY IN RESEARCH Nic Drew Data Protection Manager University Hospital of Wales   
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
The Data Protection Act
Data Protection Act. Lesson Objectives To understand the data protection act.
The Legal Framework Can you work out which slide each bullet point should go on?!
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Practical Information Management
Handling information 14 Standard.
Have You Lost Your Identity? By Sierra Bowland. Deter Detect Defend.
Health & Social Care Apprenticeships & Diploma
Elma Graham. To understand what data protection is To reflect on how data protection affects you To consider how you would safeguard the data of others.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Professional Values and Basic Business Legislation.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Pass ECDL41 European Computer Driving Licence Module 1 – Concepts of IT Chapter 1.6 – Legal Issues and Security.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
Data Protection Act & Freedom of Information Simon Mansell Corporate Governance and Information Team.
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
12/12/2015 Data Protection Act /12/2015 The DP Act A law that protects personal privacy and upholds individual’s rights Anyone who handles personal.
Information Systems Unit 3.
1 Banking and Reconciliation. 2 To Certify As A Cash Handler  Visit the training website  Review the Payment Card Industry (PCI)
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Sharing Personal Data ‘What you need to know’ Corporate Information Governance Team Strategic Intelligence.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
How to Manage Risk. This is the process involves the process for any application from a: Individual Cardholder Company or Corporate cards Merchants Any.
Freedom of Information Act ‘What you need to know’ Corporate Information Governance Team Strategic Intelligence.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
Data protection act. During the second half of the 20th century, businesses, organisations and the government began using computers to store information.
Data Protection GCSE ICT Mrs N Steventon-2005.
Handling Personal Data
Data Protection Act.
Internal Controls.
Protecting Your Identity:
Security of People, Property and Information
Data Protection Act.
Unit 7 – Organisational Systems Security
General Data Protection Regulations 2018
Protecting Your Credit Identity
Handling Information Securely
Handling information 14 Standard.
Internal Controls.
European Computer Driving Licence Syllabus version 5.0
Internal Controls.
Presentation transcript:

DATA PROTECTION & FREEDOM OF INFORMATION

What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you to access personal information that is held about you. The Freedom of Information Act gives you the rights to see official information held by public authorities.

DATA PROTECTION The Data Protection Act allows you to see information held about you, sets out rules to make sure that this information is handled properly and allows you to get it corrected if it is wrong. Responsibility is placed on organisations that hold your personal information to comply with eight principles, which make sure that personal information is: 1. Fairly and lawfully processed 2. Processed for limited purposes 3. Adequate, relevant and not excessive 4. Accurate and up to date 5. Not kept for longer than is necessary 6. Processed in line with your rights 7. Secure 8. Not transferred to other countries without adequate protection.

DATA PROTECTION WITHIN PROTOCOL Protocol complies with the Data Protection Act which regulates personal and sensitive personal data stored on computers and held in manual records. They will hold personal information relating to you for the purpose of the administration and management of your employment and/or the company’s business. If colleagues receive an external request for personal information about themselves, colleagues or customers, this should be referred to their People Manager. You are entitled to have access to the personal information we hold about you on our system and manual files.

DATA PROTECTION WITHIN THE ASSESSMENT PROCESS During learning and assessment visits our learners and their employers need to demonstrate the same principles of Data Protection, when gathering evidence for qualifications as they do in their own environments. A1.1 performance criteria states that an A1 candidate must be able to show that they know how to protect confidentiality and agree arrangements to deal with sensitive issues. When planning assessment it must be ensured that any product evidence available containing confidential company information or customer and employee personal details must be left in natural habitat and its location referred to within the portfolio. Assessors must also gain authorisation from the placement that this evidence can be referred to as an Internal Verifier or External Verifier may wish to contact the placement or learner to confirm its validity and the learners competence. Inclusion of personal or company details within a portfolio can result in a tariff being applied by an External Verifier and affect the relationship we hold with the placement. If colleagues are under any doubt as to what can or cannot be included they must gain advice before planning to gather this within the evidence.

FREEDOM OF INFORMATION The Freedom of Information Act deals with access to official information, while parallel regulations deal with environmental information. The Freedom of Information Act gives you the right to obtain information held by public authorities unless there are good reasons to keep it confidential. This act applies to England, Wales and Northern Ireland. Separate legislation applies to Scottish public authorities. The Act recognises that there will be valid reasons why some kinds of information may be withheld, such as if its release would prejudice national security or damage commercial interests.

IDENTITY FRAUD Listed below are some tips to help stop your information from falling into the wrong hands:  Store in a safe place any documents carrying your personal details, such as your passport, driving licence, bank statements and utility bills  Shred or destroy personal documents you are throwing away such as bills, receipts, bank or credit card statements and other documents that show your name, address or other personal details.  If you have to post personal documents, ask the post office for advice on the more secure method.  Limit the number of documents you carry around that contain your personal details. If possible, don’t leave personal documents in your vehicle.  Check your bank and credit card statements regularly for unfamiliar transactions.

IDENTITY FRAUD  Use different passwords and PINs for different accounts and take extra care when using public computers to access your personal information.  Regularly get a copy of your personal credit file to check for any suspicious credit applications. For more information on how to do this, refer to  Always think about who you are giving your information to. Be cautious about providing any personal details to unsolicited callers by phone, fax, post, or in person, unless you are sure the person is who they say they are. If you are suspicious, ring the organisation back on an advertised number or visit their website.  Even if you know who is asking for your information, think twice before you answer their questions. If it’s not clear why they need the information, ask them or just move on to the next question.

IDENTITY FRAUD  Ensure your home computer is protected before you go online – buying a good anti-virus, firewall and anti-spam software package will protect your computer against viruses and any spyware software, which can be used to obtain your personal information.  Do not click on links to go to a website unless you can be confident it is genuine.  If you use a central or communal postal delivery point, such as in a block of flats, make sure you have a lockable postbox and collect your post as soon as possible. If your mail regularly fails to arrive, report this to Royal Mail.  If you move house, redirect all your mail and inform your bank, utility companies and other organisations of your new address.