• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The Data Protection Act

Extracts from this document...

Introduction

The Data Protection Act Public concern about computerised information centres upon :- ? How can we be sure that information held about us is accurate? ? If information is used for one purpose, how can we be sure that it will not be used for something else? ? How can access to information be guaranteed only to certain people? IV. Should individuals be concerned that banks, for example, tell the Inland Revenue if an account receives more than �150 interest in a year? The Act serves to help calm some of these fears by making those who hold computerised records register the fact and also enabling an individual to see what is held about him or her and to receive compensation if material is inaccurate The Data Protection Act demands that Personal data should be :- 1Collected and Processed Fairly and Lawfully 2Used Only for Registered Purposes Or Disclosed to Registered Recipients 3Accurate and Kept Up to Date 4Held No Longer Than is Necessary for the Stated Purpose 5Contained Within Appropriate Security. Data Protection ~ 1984 1.The information to be contained in personal data shall be obtained, and personal data shall be processed, fairly and lawfully. 2.Personal data shall be held only for one or more specified and lawful purposes. 3.Personal data held for any purpose or purposes shall not be used or disclosed in any matter incompatible with that purpose or those purposes. 4.Personal data held for any purpose or purposes shall be adequate, relevant and not excessive in relation to that purpose or those purposes. 5.Personal data shall be accurate and, where necessary, kept up to date. 6.Personal data held for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes. 7.An individual shall be entitled :- (a)at reasonable intervals and without undue delay or expense i)to be informed by any Data User whether holds personal data of which that individual is subject. ...read more.

Middle

This is the 'transmit enable' code and is decimal 17 or 11 hex. This code is received by the computer, which knows that it is able to commence transmitting data to the modem. This is the XON condition. If there is incoming traffic, the modem sends out an ASCII DC3 character. This is the XOFF condition and is 19 in decimal (13 in hex). The computer receives this code and stops transmitting data Note: * This method is be used with a serial printer. It sends out an XOFF code when its intemal buffer is full. As it prints, it reduces the amount of characters in its buffer. When the buffer has sufficient space, it sends out a DC 1 code to the computer, which resumes the transmission of data to the printer. * The ASCII codes DC 1 and DC3 stand for Device Control 1 and Device Control 3. * This method can transmit and receive text files, since the printable ASCII set ranges from 32 to I ~ Binary files (i.e. containing machine code) contain a full range of possible numeric values. This would include the values for the DC 1 and DC3 signals, which means that XON/XOFF is not suitable for transmitting and receiving binary files. RS232 Pins A summary of the uses of the main pins on a computer's serial port is shown in the following table. * DTR Data Terminal ready - The computer informs the modem that it is powered up and ready to be active, by switching this pin to an 'ON' state. Most modems require to receive this signal before they will operate * DSR (Data Set Ready) - The modem informs the computer that it is powered up and ready to be active, by switching this pin to an 'ON' state. Most computer ports require this signal before they will operate * CTS (Clear to Send) ...read more.

Conclusion

Wire Leased 4,800 Half Duplex Two Wire Switched 4,800 V.29 Full Duplex Four Wire Leased 9,600 Quadrature Amplitude Modulation Half Duplex Two Wire Switched 9,600 V.32bis Full Duplex Two Wire Switched 14,400 V.34 Full Duplex Two Wire Switched 28,800 Bell 103 Full Duplex Two Wire Switched 28,800 V.42 V42bis Data Comp V90 56,600 Even Parity The sending device counts the number of 'one' bits in the character to be Panty Bit transmitted. If the number of these data bits is even, as in the top diagram, the parity bit is set to zero. If the number of 'one' bits is odd, as in the lower diagram, 1001 1 10 the parity bit is set to one. Thus the total number of 'ones' in the byte will Parity Bit always be even, no matter how many 'ones' are in the character being transmitted0100101 If any of the data bits or parity bits is accidentally altered during transmission, the receiving device can detect the problem by counting the number of bits. If the total is not an even number, there has been corruption of the data. This provides an elementary check for data errors. Odd Parity Here, the sending device counts the number of 'one' bits in the byte to be transmitted. If the number of these data bits is even, as in the top diagram, the parity bit is set to one. If the number of 'one' bits is already odd, as in the lower diagram, the parity bit is set to zero. In this way, the total number of 'ones1 in the group is always maintained at an odd value. Note Parity checking is a useful facility but it is not foolproof. For example, two bits in a byte both being altered from zero to one would produce a correct parity check although the data in the byte had been corrupted. In practice, larger blocks of data are examined for corruption (see section later on Error Detection). H. T. Harvey 11-Feb-04 1of 7 Legislation.doc ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    LAN & Topologies & Data Flow

    3 star(s)

    In a topology a given topology except a Ring topology it will normally consist of two or more nodes connected to it. In a Ring topology each node is connected exactly twice. Bus Topology - In a bus network the clients are connected via a shared communication line which is known as a bus.

  2. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    Every user gets leased line to a frame relay node. TCP/IP stands for Transmission Control Protocol over Internet Protocol. This relates to frame relay when it uses encapsulation to give abstractions of protocol and services. An application uses a given set of protocols and services and sends the data down to the layer so the data can be further encapsulated.

  1. LAN & WAN Protocols

    It is designed to support variable-length subnet masking. If OSPF detects changes in a topology such as link failures then it immediately converges on a loop free routing structure. TCP Transmission Control Protocol is middle level communication protocol which allows communication between application programs and internet protocols. TCP is vastly deployed and used by many internet popular services application protocols including the WWW and the e-mail.

  2. I have been given the task to design a database for a company called ...

    Order Form 3 Existing Customer form Yes The results in the table show that all the buttons work and do not need modifying. TESTING THE QUERIES I needed to test all the queries to make sure they were working properly.

  1. Programming Techniques

    A more complex selection statement is the case statement (sometimes called a switch statement). This statement causes the computer to select one of a list of options, for example: Case Menuchoice of 'A' : writeln('you have chosen Add') 'C' : writeln('You have chosen change') 'D' : writeln('You have chosen Delete')

  2. Different ways of data capture

    must be an even number. e.g ASC11 code for letter B is 1000010, the last digit is 0(even) so number of 1's (on)= 2, an even number, a character code of 1101110 will have a parity bit of 1 (1s(on) = 5 odd. ACCURACY + VALIDITY When data is collected from surveys for marketing reasons

  1. Computer Aided Design Package

    They began to set aside money when the client first began to search for a company that will do this job for them. This makes a total of �15,000. Paper for the plotter will probably cost the company about �426.70 a month, ink will cost the company about �34.95 per

  2. With diagrams compare and contrast the relative advantages and disadvantages of digital transmission over ...

    These electrical signals are transmitted through the telephone lines, and played on the vibrating diaphragm of the receiver part of the listener's handset. Describe briefly with a diagram what a modem is. Explain the role of a modem in the transmission of computer data over analogue sections of the Public Switch Telephone Network (PSTN).

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work