Data Protection Issues – Compliance Within Computing Organisations, The Causes, Effects and Consequences.

Authors Avatar
Project and Professional Studies Unit

Data Protection Issues - Compliance Within Computing Organisations, The

Causes, Effects and Consequences.

Page

. Introduction to the data protection bill 1998 2

.1 The Eight Principles of The Data Protection Act 2

i. Fairly and lawfully processed 2

ii. Processed for one or more limited lawful purposes 2

iii. Adequate, relevant and not excessive 2

iv. Accurate and valid and where necessary kept up to date 3

v. Personal data processed for any purpose shall not be kept longer than deemed necessary 3

vi. Processed in accordance with the data subject's rights under this Act 3

vii. Securely protected by appropriate technical and organisational measures 3

viii. Personal data will not be transferred to Countries without adequate protection 3

2. Registration For Data Protection Act 4

3. Exclusions and Exceptions 4

4. Typical Example Of Active Data Protection Environments 5

Employer/Employee Relationships

5. Enforcement Of Data Protection 5

6. Implications For System Designers 6

Protection from potential dangers

7. Implications For Customers 8

The Fear Off Online Transactions

8. Summary 9

APPENDIX

THE PROBLEMS WITH DATA PROTECTION AND NEW TECHNOLOGY

EXAMPLE 1 - Marks and Spencers deny security threat. 10

EXAMPLE 2 - Halifax Net share dealing system breached. 10

EXAMPLE 3 - Egg admits security breach. 10

EXAMPLE 4 - Powergen's lax security condemned 10

EXAMPLE 5 - Barclays security breach forces online service to close. 11

EXAMPLE 6 - Crackers fell Cabinet Office Web site. 11

Bibliography 12

. Introduction to the data protection bill 1998

We've probably all heard of it, but just what is it - 'The Data Protection Act'? The much maligned and often misquoted and even misunderstood. Well, naturally it's about data, and according to Websters Online Dictionary - data is: a collection of facts from which conclusions may be drawn,

and so we are looking at the aspect of it's protection and it's associated issues.

Data Protection is not merely something with which large companies have to comply; "Data Protection affects a huge range of individuals and organisations, both in the public and private sectors" Rt. Hon Jack Straw MP, Home Secretary (British Computer Society, Conference 2000)

Our chief concerns are the issues governing computing businesses or organisations that store and retrieve data in any way shape or form and the challenges, threats and implications this may pose to the successful deployment of technical resources. Since the introduction of the Data Protection Act in the United Kingdom in 1984, this enforceable piece of legislation has carried with it severe penalties for being in default of it. Recently repealed by the latest Act of 1998 (implemented 1st March 2000), and accessible for viewing at the following online internet location: http://www.legislation.hmso.gov.uk/acts/acts1998/19980029.htm.

.1 The Eight Principles of The Data Protection Act

It is said in the latest Act to be introduced, that the eight principles of good practice must be adhered to and that data must therefore be:

i. Fairly and lawfully processed

Indicates that data shall only be used for the purpose that the organisation is registered for. Regard is to be had for the method by which data is obtained, including in particular whether any person from whom it is obtained from is deceived or misled as to the purpose for which the details are to be processed.

ii. Processed for one or more limited lawful purposes

Within the business organisation's registration will be an outline of the specific purpose for which data will be used. The broadness of these purposes will usually be competently crafted to account for all its daily activities. These limited purposes are to also prevent the use of data for any other usage, which is incompatible.

iii. Adequate, relevant and not excessive

Very similar to the points outlined in Principle number 2 above, in that data hording must not take place, essentially through the use of computer systems and shall not be used for other purposes other than purposes intended for.

iv. Accurate and valid and where necessary kept up to date

Throughout the data's life its usefulness will naturally deteriorate, by the very nature of it being of a dynamic substance, this factor alone should deem the data to have a limited life span. After its effectiveness over a period of time has reduced, it should be removed or amended.

v. Personal data processed for any purpose shall not be kept longer than deemed necessary

Although a relatively sensible Principle to behold, its practicality is essentially difficult to determine and implement. It begs the question of how long is 'necessary'? Should it be voiced through the legal process it is generally regarded that normal industry procedures would be taken into account, depending on previous precedence's set out before it.

vi. Processed in accordance with the data subject's rights under this Act

The belief attached to this somewhat key Principle is that the person of whom data is being kept shall have access to the specific data. With a reasonable duration of time and monitory fee attached to the disclosure of the request. More shall be said of this later in the employment section.
Join now!


vii. Securely protected by appropriate technical and organisational measures

To defeat unauthorised access to sensitive data, appropriate suitable and sustainable security measures must be in place at all times. The unlawful access or theft of private and personal data or statistics must at no times be allowed to compromise the ethics of business through accidental loss, destruction, damage or amendment to personal data.

viii. Personal data will not be transferred to Countries without adequate protection

In particular, Countries outside the European Economic Community must provide adequate levels of protection for the employee guardians of the ...

This is a preview of the whole essay