SlideShare a Scribd company logo
2
Most read
3
Most read
5
Most read
Data Protection
The Data Protection Act 1998
People using their mobile phone on O2's
mobile networks in the UK to browse
websites have been inadvertently
handing over their phone number to the
website owner.

The privacy breach means that site
owners could be collecting the phone
numbers of visitors which could then be
used for telephone and SMS marketing
without the phone owner's consent.

The Information Commissioner's Office
said it is considering whether to
investigate further, a spokesman said
there was no immediate breach of the
Data Protection Act. A mobile phone
number on its own is not classed as
"personally identifying information"
(PII), because it does not identify an
individual on its own.
The problem
• Huge amounts of data about you can be
  stored on computer, and easily searched. That
  data can be lost, stolen or transferred to
  another country easily.
• People need protection from careless or
  inaccurate processing of data about them,
  they also need to be able to see what data is
  being held about them.
Personal and Sensitive information
• Personal                  • Sensitive
• Data that relates to a    • Data about matters
  living individual who       such as mental health,
  can be identified from      trade union
  that data                   membership or sexual
• Either on its own or by     orientation.
  combining with other
  information held.
Data protection ppt
How much does it cost to get full access from the local council?
  http://www.westberks.gov.uk/index.aspx?articleid=4059
Fixing it
• An individual can ask the Information Commissioner to
  judge whether Data Protection has been breached
• They can go to court to get wrong information corrected,
  deleted or clarified
• They can get compensation for any harm (and associated
  distress)
• The court can also prevent processing that causes someone
  substantial harm
• The court can enforce access to the data
Silly people abusing the Act – it happens

More Related Content

PPTX
Data protection
PPTX
Privacy & Data Protection
PPS
Introduction to Data Protection and Information Security
PDF
Data Protection and Privacy
PPTX
The Data Protection Act
PPTX
Data Privacy Introduction
PPTX
Data Privacy: What you need to know about privacy, from compliance to ethics
PPTX
Data protection and privacy
Data protection
Privacy & Data Protection
Introduction to Data Protection and Information Security
Data Protection and Privacy
The Data Protection Act
Data Privacy Introduction
Data Privacy: What you need to know about privacy, from compliance to ethics
Data protection and privacy

What's hot (20)

PPTX
Unit 6 Privacy and Data Protection 8 hr
PPTX
Presentation on Information Privacy
PPT
“Privacy Today” Slide Presentation
PDF
Overview on data privacy
PDF
Privacy and Data Security
PPTX
Data Privacy and Protection Presentation
PPT
Data protection in_india
PPTX
GDPR Presentation slides
PPT
Data Protection Act
PDF
Data Protection Predictions for 2023.pdf
PPTX
Privacy issues and internet privacy
PPTX
what is data security full ppt
PPTX
Presentation on GDPR
PPTX
Data security
PPTX
INFORMATION SECURITY
PPT
Data Protection (Download for slideshow)
PPTX
Security Threats in E-Commerce
PPTX
Information privacy and Security
PPTX
Data Security - English
Unit 6 Privacy and Data Protection 8 hr
Presentation on Information Privacy
“Privacy Today” Slide Presentation
Overview on data privacy
Privacy and Data Security
Data Privacy and Protection Presentation
Data protection in_india
GDPR Presentation slides
Data Protection Act
Data Protection Predictions for 2023.pdf
Privacy issues and internet privacy
what is data security full ppt
Presentation on GDPR
Data security
INFORMATION SECURITY
Data Protection (Download for slideshow)
Security Threats in E-Commerce
Information privacy and Security
Data Security - English
Ad

Similar to Data protection ppt (20)

PPT
Safety And Security Of Data 4
PDF
Issues related to ict
PPT
Data protection act new 13 12-11
PDF
The principles of the Data Protection Act in detail - uk
PDF
Privacy versus Security: A Legal Perspective
PPT
Privacy introduction
PPS
Legislation
PPT
Personal privacy and computer technologies
PPTX
The Data Protection Act
PPTX
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104
PPTX
3A – DATA PROTECTION: ADVICE
 
PPT
Privacy learning forum broadmeadows
PDF
Information Security: The Trinidad & Tobago Legal Context
PPTX
GDPR Practicalities - The Data Shed
PPTX
Ichec & ESC gdpr feb 2020
PPT
Legal update 21 september 2012
PPT
Data privacy & social media
PDF
Data protection guide
PPT
Data breach protection from a DB2 perspective
PPTX
Data set Legislation
Safety And Security Of Data 4
Issues related to ict
Data protection act new 13 12-11
The principles of the Data Protection Act in detail - uk
Privacy versus Security: A Legal Perspective
Privacy introduction
Legislation
Personal privacy and computer technologies
The Data Protection Act
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104
3A – DATA PROTECTION: ADVICE
 
Privacy learning forum broadmeadows
Information Security: The Trinidad & Tobago Legal Context
GDPR Practicalities - The Data Shed
Ichec & ESC gdpr feb 2020
Legal update 21 september 2012
Data privacy & social media
Data protection guide
Data breach protection from a DB2 perspective
Data set Legislation
Ad

More from grahamwell (20)

PPTX
Pseudocode
PPT
Excel =if function
PPT
Excel Min max-average
PPTX
What is binary and why do we use it?
PPTX
Introduction to touch develop
PPTX
Introduction to touch develop
PPTX
The software story
PPTX
Turtle graphics
PPTX
Database field types
PPTX
Databases 101
PPTX
Kodu controls
PPT
Pascal names and types
PPT
Python part two names and types
PPTX
Abstraction - Year 9
PPTX
Thinking about your project
PPTX
The rail fence
PPT
Lesson 1
PPT
Rsa encryption
PPT
Server side scripts
PPTX
Revision topic 1 sensors and control
Pseudocode
Excel =if function
Excel Min max-average
What is binary and why do we use it?
Introduction to touch develop
Introduction to touch develop
The software story
Turtle graphics
Database field types
Databases 101
Kodu controls
Pascal names and types
Python part two names and types
Abstraction - Year 9
Thinking about your project
The rail fence
Lesson 1
Rsa encryption
Server side scripts
Revision topic 1 sensors and control

Recently uploaded (20)

PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Pharma ospi slides which help in ospi learning
PDF
Complications of Minimal Access Surgery at WLH
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PPTX
Cell Structure & Organelles in detailed.
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Insiders guide to clinical Medicine.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
master seminar digital applications in india
PPTX
Institutional Correction lecture only . . .
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Microbial disease of the cardiovascular and lymphatic systems
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Pharma ospi slides which help in ospi learning
Complications of Minimal Access Surgery at WLH
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
Cell Structure & Organelles in detailed.
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Insiders guide to clinical Medicine.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Microbial diseases, their pathogenesis and prophylaxis
master seminar digital applications in india
Institutional Correction lecture only . . .
Abdominal Access Techniques with Prof. Dr. R K Mishra
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
TR - Agricultural Crops Production NC III.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
VCE English Exam - Section C Student Revision Booklet
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx

Data protection ppt

  • 1. Data Protection The Data Protection Act 1998
  • 2. People using their mobile phone on O2's mobile networks in the UK to browse websites have been inadvertently handing over their phone number to the website owner. The privacy breach means that site owners could be collecting the phone numbers of visitors which could then be used for telephone and SMS marketing without the phone owner's consent. The Information Commissioner's Office said it is considering whether to investigate further, a spokesman said there was no immediate breach of the Data Protection Act. A mobile phone number on its own is not classed as "personally identifying information" (PII), because it does not identify an individual on its own.
  • 3. The problem • Huge amounts of data about you can be stored on computer, and easily searched. That data can be lost, stolen or transferred to another country easily. • People need protection from careless or inaccurate processing of data about them, they also need to be able to see what data is being held about them.
  • 4. Personal and Sensitive information • Personal • Sensitive • Data that relates to a • Data about matters living individual who such as mental health, can be identified from trade union that data membership or sexual • Either on its own or by orientation. combining with other information held.
  • 6. How much does it cost to get full access from the local council? http://www.westberks.gov.uk/index.aspx?articleid=4059
  • 7. Fixing it • An individual can ask the Information Commissioner to judge whether Data Protection has been breached • They can go to court to get wrong information corrected, deleted or clarified • They can get compensation for any harm (and associated distress) • The court can also prevent processing that causes someone substantial harm • The court can enforce access to the data
  • 8. Silly people abusing the Act – it happens