SlideShare a Scribd company logo
EP 6/12
What  personal data  have you sent over the web? What  personal data  do you enclose when you purchase an item over the internet? Are you happy to share all of this data or would you rather some was kept  private ?
The assurance that Data is consistent and correct. Making sure data is complete when it is sent, stored or operated upon in any way. Within the field of E-Commerce any Data that is sent between the customer and the business or between businesses must be subject to data integrity checks.
Making sure that personal data kept by companies is only used in the correct way. Companies have a legal responsibility to ensure that personal data is not disclosed to the wrong people. Data Security controls are in place to make sure access to data is controlled.
How can data get “damaged”? Try and think of a few examples…
Data integrity can be compromised in a number of ways:  Human errors when data is entered  Errors that occur when data is transmitted from one computer to another  Software bugs or viruses  Hardware malfunctions, such as disk crashes  Natural disasters, such as fires and floods
There are many ways to minimize these threats to data integrity. These include:  Backing up data regularly  Controlling access to data via security mechanisms  Designing user interfaces that prevent the input of invalid data  Using error detection and correction software when transmitting data
Task Where does  your  data travel, when you buy something on the web? Imagine you buy something on eBay, try and plot the path of data from your PC. At what points in this path must data be protected?
Many types of personal data are required be kept private by companies: Lifestyle Religion, Sexual orientation, Political affiliation Financial Bank details, Credit card details, Financial records Email Medical Health records
What are the potential risks for people whose personal data is not kept private? Discrimination Embarrassment Damage to personal reputation Email Spam Identity theft Fraud
European Laws state that the data must: Fairly and lawfully processed. Processed for limited purposes. Adequate, relevant and not excessive. Accurate. Not kept longer than necessary. Processed in accordance with the data subject's rights. Secure. Not transferred to countries without adequate protection.
United Kingdom introduced a Data Protection Act in 1984 in order to protect consumers. Data may only be used for the specific purposes for which it was collected Data must not be disclosed to other parties without the consent of the individual whom it is about Individuals have a right of access to the information held about them Personal information may be kept for no longer than is necessary. Companies holding personal information are required to secure this information.
Group work – 3 or 4 students Internet Research Data Privacy and Security in  Thailand What are the laws for Thai E-Commerce companies? Are there any laws? If not, why not? Are there plans to implement data protection laws? Give me some actual example of  personal data  being stolen or abused in Thailand?  What happened? Identity theft? Credit card theft? Fraud? Damaged reputation? Embarrassment?
How are these laws kept in place?  Police? Government agencies? What happens if companies break the law? Prison? Fines? Any examples? Please include any information you find interesting.  Please use Microsoft Word for this task. Complete the report and email to me before the start of the next lesson. [email_address]
Include in your document any links to websites or web pages that helped you to collect information. This is called a  Reference You link text quoted, from the net or books, to a reference at the bottom of your document, like this: Although the Act does not mention privacy, in practice it provides a way in which individuals can enforce the control of information about themselves. Most of the Act does not apply to domestic use, [1] References [1]  Data Protection Act 1998 ,  Part IV (Exemptions), Section 36 ,  Office of Public Sector Information This is something you will have to do at University every time you complete an assignment.
http:// www.oic.thaigov.go.th / http:// www.ipthailand.org/ipthailand / http://www.wikipedia.org/

More Related Content

PPTX
Data Privacy and Protection Presentation
PPTX
E commerce - Data Integrity and Security
PPT
“Privacy Today” Slide Presentation
PPTX
The Data Protection Act
PPTX
Data protection ppt
PPTX
Privacy issues and internet privacy
PPT
Personal privacy and computer technologies
PPTX
Eight principles of consumer data privacy
Data Privacy and Protection Presentation
E commerce - Data Integrity and Security
“Privacy Today” Slide Presentation
The Data Protection Act
Data protection ppt
Privacy issues and internet privacy
Personal privacy and computer technologies
Eight principles of consumer data privacy

What's hot (20)

PPTX
Presentation on Information Privacy
PPTX
Stacy Robin - The Degania Group - Technology and the Law
PPT
Data Protection Act
PPTX
Data Security - English
PPTX
Securing Confidential Data CI Webinar Series January 2014
PDF
Who owns your data ans why should you care
PDF
Cybercrime and the Healthcare Industry
 
PDF
HIPAA HiTech Regulations: What Non-Medical Companies Need to Know
PDF
HIPAA Email Compliance & Privacy
PDF
Privacy and Data Security
PPT
IST Presentation
PPTX
Preparing for GDPR: What Every B2B Marketer Must Know
PPTX
Intercity technology - GDPR your training toolkit
PPTX
Privacy and Data Protection Act 2014 (VIC)
PPT
Understand Risk in Communications and Data Breach
PPTX
Information Privacy
PDF
Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...
PPT
Data Privacy Micc Presentation
PDF
What to do after a data breach
PPTX
Unit 6 Privacy and Data Protection 8 hr
Presentation on Information Privacy
Stacy Robin - The Degania Group - Technology and the Law
Data Protection Act
Data Security - English
Securing Confidential Data CI Webinar Series January 2014
Who owns your data ans why should you care
Cybercrime and the Healthcare Industry
 
HIPAA HiTech Regulations: What Non-Medical Companies Need to Know
HIPAA Email Compliance & Privacy
Privacy and Data Security
IST Presentation
Preparing for GDPR: What Every B2B Marketer Must Know
Intercity technology - GDPR your training toolkit
Privacy and Data Protection Act 2014 (VIC)
Understand Risk in Communications and Data Breach
Information Privacy
Failure to Execute a HIPAA Business Associate Agreement Results in $1.55 Mill...
Data Privacy Micc Presentation
What to do after a data breach
Unit 6 Privacy and Data Protection 8 hr
Ad

Viewers also liked (6)

PPTX
E-Commerce Security
PPTX
Growth presentation on basics of tds under
PPT
Integrity slideshow
PPT
Personal Integrity
PPT
Integrity at Work
PPT
6. Security Threats with E-Commerce
E-Commerce Security
Growth presentation on basics of tds under
Integrity slideshow
Personal Integrity
Integrity at Work
6. Security Threats with E-Commerce
Ad

Similar to M6 - E Commerce - Integrity And Security (20)

PPTX
Data Privacy Introduction
PPTX
Sumera kanwal(09),Kainat Anwer(08),Saba(23).pptx
PDF
Data Privacy Program – a customized solution for the new EU General Regulatio...
PPTX
Data protection
PDF
data privacy handbook: A starter guide to data privacy compliance
PDF
Health Data Encryption: The Seven Principals of Privacy
PDF
data-privacy-egypt-what-you-need-know-en.pdf
PPT
Aleksandr Yampolskiy Presentation
PDF
Gdpr and usa data privacy issues
PDF
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
PDF
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
PPT
Lasa European NFP Technology Conference 2010 - Data protection and the cloud
PDF
GDPR by Identity Methods
PPTX
3A – DATA PROTECTION: ADVICE
 
PDF
GDPR - Sink or Swim
PDF
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
PDF
Introduction to US Privacy and Data Security: Regulations and Requirements
Data Privacy Introduction
Sumera kanwal(09),Kainat Anwer(08),Saba(23).pptx
Data Privacy Program – a customized solution for the new EU General Regulatio...
Data protection
data privacy handbook: A starter guide to data privacy compliance
Health Data Encryption: The Seven Principals of Privacy
data-privacy-egypt-what-you-need-know-en.pdf
Aleksandr Yampolskiy Presentation
Gdpr and usa data privacy issues
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Lasa European NFP Technology Conference 2010 - Data protection and the cloud
GDPR by Identity Methods
3A – DATA PROTECTION: ADVICE
 
GDPR - Sink or Swim
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Introduction to US Privacy and Data Security: Regulations and Requirements

More from Jamie Hutt (20)

PPTX
Photo Vocabulary – Animals
PPTX
Planning For Your Business Task
PPTX
M5 - Photostory
PPT
Business Studies - Spreadsheet Task
PPTX
Graphic Animation - Creating a Slideshow
PPTX
E commerce - Final Project
PPT
Business - Spreadsheets
PPT
After mid term task
PPTX
E Commerce - Final Project
PPTX
Business Studies - Advertising
PPTX
Business Studies - Different Types of Business
PPTX
Business Idea - Practical Task
PPTX
Business studies lesson 4
PPTX
Graphical Animation - Buttons
PPTX
M5 Graphic Animation - Upload
PDF
Lesson 2 - Benefits of E-Commerce
PPTX
Lesson 2 - Benefits of E-Commerce
PPTX
Business Studies - Lesson 2
PPTX
Graphical Animation - Lesson 2
PPT
Graphical Animation - Lesson 2
Photo Vocabulary – Animals
Planning For Your Business Task
M5 - Photostory
Business Studies - Spreadsheet Task
Graphic Animation - Creating a Slideshow
E commerce - Final Project
Business - Spreadsheets
After mid term task
E Commerce - Final Project
Business Studies - Advertising
Business Studies - Different Types of Business
Business Idea - Practical Task
Business studies lesson 4
Graphical Animation - Buttons
M5 Graphic Animation - Upload
Lesson 2 - Benefits of E-Commerce
Lesson 2 - Benefits of E-Commerce
Business Studies - Lesson 2
Graphical Animation - Lesson 2
Graphical Animation - Lesson 2

Recently uploaded (20)

PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Institutional Correction lecture only . . .
PDF
Sports Quiz easy sports quiz sports quiz
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
Pharma ospi slides which help in ospi learning
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Pre independence Education in Inndia.pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Insiders guide to clinical Medicine.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Microbial disease of the cardiovascular and lymphatic systems
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Institutional Correction lecture only . . .
Sports Quiz easy sports quiz sports quiz
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
TR - Agricultural Crops Production NC III.pdf
Pharma ospi slides which help in ospi learning
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Pre independence Education in Inndia.pdf
O5-L3 Freight Transport Ops (International) V1.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Insiders guide to clinical Medicine.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
O7-L3 Supply Chain Operations - ICLT Program
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx

M6 - E Commerce - Integrity And Security

  • 2. What personal data have you sent over the web? What personal data do you enclose when you purchase an item over the internet? Are you happy to share all of this data or would you rather some was kept private ?
  • 3. The assurance that Data is consistent and correct. Making sure data is complete when it is sent, stored or operated upon in any way. Within the field of E-Commerce any Data that is sent between the customer and the business or between businesses must be subject to data integrity checks.
  • 4. Making sure that personal data kept by companies is only used in the correct way. Companies have a legal responsibility to ensure that personal data is not disclosed to the wrong people. Data Security controls are in place to make sure access to data is controlled.
  • 5. How can data get “damaged”? Try and think of a few examples…
  • 6. Data integrity can be compromised in a number of ways: Human errors when data is entered Errors that occur when data is transmitted from one computer to another Software bugs or viruses Hardware malfunctions, such as disk crashes Natural disasters, such as fires and floods
  • 7. There are many ways to minimize these threats to data integrity. These include: Backing up data regularly Controlling access to data via security mechanisms Designing user interfaces that prevent the input of invalid data Using error detection and correction software when transmitting data
  • 8. Task Where does your data travel, when you buy something on the web? Imagine you buy something on eBay, try and plot the path of data from your PC. At what points in this path must data be protected?
  • 9. Many types of personal data are required be kept private by companies: Lifestyle Religion, Sexual orientation, Political affiliation Financial Bank details, Credit card details, Financial records Email Medical Health records
  • 10. What are the potential risks for people whose personal data is not kept private? Discrimination Embarrassment Damage to personal reputation Email Spam Identity theft Fraud
  • 11. European Laws state that the data must: Fairly and lawfully processed. Processed for limited purposes. Adequate, relevant and not excessive. Accurate. Not kept longer than necessary. Processed in accordance with the data subject's rights. Secure. Not transferred to countries without adequate protection.
  • 12. United Kingdom introduced a Data Protection Act in 1984 in order to protect consumers. Data may only be used for the specific purposes for which it was collected Data must not be disclosed to other parties without the consent of the individual whom it is about Individuals have a right of access to the information held about them Personal information may be kept for no longer than is necessary. Companies holding personal information are required to secure this information.
  • 13. Group work – 3 or 4 students Internet Research Data Privacy and Security in Thailand What are the laws for Thai E-Commerce companies? Are there any laws? If not, why not? Are there plans to implement data protection laws? Give me some actual example of personal data being stolen or abused in Thailand? What happened? Identity theft? Credit card theft? Fraud? Damaged reputation? Embarrassment?
  • 14. How are these laws kept in place? Police? Government agencies? What happens if companies break the law? Prison? Fines? Any examples? Please include any information you find interesting. Please use Microsoft Word for this task. Complete the report and email to me before the start of the next lesson. [email_address]
  • 15. Include in your document any links to websites or web pages that helped you to collect information. This is called a Reference You link text quoted, from the net or books, to a reference at the bottom of your document, like this: Although the Act does not mention privacy, in practice it provides a way in which individuals can enforce the control of information about themselves. Most of the Act does not apply to domestic use, [1] References [1] Data Protection Act 1998 , Part IV (Exemptions), Section 36 , Office of Public Sector Information This is something you will have to do at University every time you complete an assignment.
  • 16. http:// www.oic.thaigov.go.th / http:// www.ipthailand.org/ipthailand / http://www.wikipedia.org/

Editor's Notes

  • #2: E-Commerce - Data Integrity and Data Privacy