• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Data protection act comparison.

Extracts from this document...

Introduction

Data protection act comparison Data protection act 1984 summarized This act is concerned with firms, which process personal data about individuals on a computer. It states that they must register with the data protection registrar. The act has eight main principles with which all registered data users much stick by: * 1. The information to be contained in personal data shall be obtained, and personal data shall be processed, fairly and lawfully. * 2. Personal data shall be held only for one or more specified and lawful purposes. * 3. Data held for any purpose or purposes shall not be used or disclosed in any manner incompatible with that purpose or those purposes. * 4. Personal Data held for any purpose or purposes shall be adequate, relevant, and not excessive in relation to that purpose or those purposes. * 5. Personal data shall be accurate and, where necessary, kept up to date. * 6. Personal data held for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes. ...read more.

Middle

Data protection act 1998 summarized This law was for the publics' privacy when organizations keep personal data about them. Any businesses that kept information about the public has to register with the dpregistrar to say what information they are going keep. The eight principles of the1998 data protection act are listed below: 1. Personal data shall be processed fairly and lawfully and not processed unless certain conditions are met and in the case of "sensitive" personal data further conditions are met. [processing includes collection] 2. Personal data shall be obtained for one or more specified and lawful purposes and must not be processed in any manner that is incompatible with that purpose or purposes. 3. Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed. 4. Personal data shall be accurate and, where necessary, kept up to date. 5. Personal data held for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes. ...read more.

Conclusion

There are major implication of this change, in that it brings manual filing systems and personal information stored on microfiche and microfilm. * A second change is that the 1998 Act broadens the definition of 'processing' to include information collection. * Another very important change is that the 1998 Act explicitly limits the export of personal information allowing transfer only to countries within the European Economic Area unless the receiving country has equivalent protection for personal information. Many countries do not have equivalent protection, notably the USA. This has major implications for putting personal information on the Web, as it is virtually impossible to restrict Web pages to people within the EEA. * The 1998 Act places much more emphasis on seeking explicit permission from individuals before collecting, processing or passing on information about them. In general people need to opt in rather than opt out (tick the box if you want us to pass your information to our trading partners rather than tick the box if you don't). * Finally, some types of personal information are now classified as 'sensitive' and such information has more stringent requirements regarding its collection, processing, storage and security. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. The Data Protection Act 1998 - questions and answers

    You also have to give a contact name and address to which individuals can write if they want to find out about the information you process about them. The Commissioner will send back a series of pre-printed forms which you require to check and return.

  2. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    Mr Ajaib can thus easily be tricked. Facebook contains a lot of bots. These are computerised programs coded to do a certain task. These bots are typically fake profiles, often disguised as attractive women, which send messages to people in hopes of passing viruses, no euphemism intended.

  1. 3E-The legislation that protects individuals and groups from the misuse of ICT

    be used when an individual living in Leyton consents and enables the organisation. If individuals information is used without there permission, then further action can be taken which could cause an organisation to perish. The law in place ensures safety and more confidentiality.

  2. Data Protection Act

    For example a tour operator which collects names and addresses of customers when they enter a competition cannot keep the data and use it for other promotional activities unless the customer gives permission. The tour operator is not allowed to sell the data to another organisation either.

  1. Data Protection Act

    Also if the school wants to share the information with third person parties then they must contact my parents. If they don't then they could be prosecuted as this is illegal. This stops my details like phone and email getting out to marketing companies contacting me.

  2. Right of privacy under Hong Kong's current laws

    Journalists would be involved in conversion when, in the course of information collection, dealing with a chattel in a manner repugnant to a person's immediate right of possession.19 Media has certain defences, such as publishing the information which was in the public interest, e.g.

  1. You have to explain how you have looked after the equipment and ensured its ...

    time and do such things as make letters start to drop off the screen or even erase the entire contents of the hard disk. As their name suggests, viruses are able to spread by 'infecting' other disks and they do this by copying themselves onto other disks, which are being used by the computer.

  2. Legal Aspects of Using Information Technology

    programs or data). The penalty is an unlimited fine a maximum of five year prison sentence Copyright, Design and Patent Act 1989 The Copyright, Design and Patent Act 1989 deals with a wide range of intellectual property, such as music, literature and software.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work