• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Managing Research and Information: Data Protection Act

Extracts from this document...

Introduction

Managing Research and Information First Name: Hanjuan (Vicky) Surname: Deng Title: Data Protection Act The Data Protection Act (DPA) exists to ensure that information relating to people that is stored in computer databases (e.g. PMR systems) or written records (e.g. physical or mental health or condition )is confidential. The 8 Data Protection principles Anyone processing personal data must comply with the eight enforceable principles of good practice. These state that data must be: I. Personal data shall be processed fairly and lawfully, unless it shall not be processed. For example, the company has got the right to take their details about their date of birth or their credit card number if customers want to book holiday in an agency. ...read more.

Middle

3. Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed. For instance, we are doing special offer for the customers who have got best payment records, so we only need to put relevant details about theirs address, telephone number, e-mail address, and good payment details. Otherwise, order date and delivery requirement are not necessary to use. 4. Personal data shall be accurate and, where necessary, kept up to date. Data controllers should be considered to update the personal data held - for example, by checking back at intervals with the original source or with the data subject. ...read more.

Conclusion

7. Secure-All PMR systems should be protected by a password which denies entry to unauthorised users. Most if not all of the PMR systems on the market have the facility to set a password which the system prompts for when it is started. We should make sure this facility is enabled. Ideally we should also change the password from the factory default setting to a password known only by us and our authorised staff. 8. Personal data shall not be transferred to a country without adequate protection. The DPA refers only to data stored on a computer or kept in written records. It does not refer to other forms of confidential information, for example the contents of confidential conversations. 1 Hanjuan (Vicky) Deng Pre-Master MSc ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Legislation & The Legal Framework section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a star student thought of this essay

3 star(s)

Response to the question

In summary, the report lists the eight different principles of the Data Protection Act, which is quite good. However the report doesn't contain the background to why the Act was enforced. The student has described the eight different principles of ...

Read full review

Response to the question

In summary, the report lists the eight different principles of the Data Protection Act, which is quite good. However the report doesn't contain the background to why the Act was enforced. The student has described the eight different principles of the Data Protection Act. This shows the examiner that the're the student understands the eight different aspects of the law.The report doesn't contains any paragraph to explain why the Data Protection Law was enforced. The report will need to contain this information, to achieve high marks. Furthermore, the report doesn't mention the implications of websites not abiding by the eight principles, and how this effects a number of users.

Level of analysis

The report has listed the eight principles of the Data Protection Act, and this is quite good. The report has gone further by describing how each one of these is used amongst a number of websites. In addition, the report provides examples which links the background understanding to real situations, which shows an in-depth knowledge of the subject concerned.

Quality of writing

The report explains what 'DPA' (Data Protection Act) means, and explains this term using a detailed description. This is quite good, as this shows in-depth understanding of the term mentioned. However further down the report, the report doesn't state what an 'PMR' is, and all technical terms will need to be explained to ensure that the examiner understands what the student is talking about.


Did you find this review helpful? Join our team of reviewers and help other students learn

Reviewed by danielbeal 22/02/2012

Read less
Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Legislation & The Legal Framework essays

  1. Marked by a teacher

    Ict and the law

    4 star(s)

    must be kept no longer than necessary; * Data stored must be kept accurate and up-to-date; * Data must be obtained and processed lawfully; * Data must be processed within the data subject rights; * Data must be obtained and specified for lawful purposes; * Data must not be transferred to countries without adequate data protection laws.

  2. Peer reviewed

    E-commerce - the legal considerations

    3 star(s)

    Important things to include are Intellectual Property Rights (IPR) and Copyright. Make sure the agreement states they are transferred to you otherwise your agency may retain copyright of your site. Domain name (URL) Just because a name may be available doesn't mean you can use it.

  1. The impact of ICT on the environment

    to be cut and make our offices, which are full of paper, more environmentally friendly. Computers have mostly helped in the business side of health and medicine in the past for record keeping but now technological advances can help in the diagnostics and healing processes.

  2. ICT Legislation

    of high rank This act also protects the work which I have on the school server. In which I use to do word processed work on, no one can access my login account if they are not a teacher. Since it is all protected by a login name and a

  1. Assets table - recording the copyright information on the logos and pictures I used.

    This was chosen because it was a good sized fair trade product. Swap advert Two brothers next to each other with a smile and someone with clean water with a smile on their face. image s N/A Two happy African boys I have cropped the image and made it bigger

  2. The Legislation That Protects Individuals and Groups using IT. Use of It by myself ...

    They can be stalked, harassed and a whole range of other criminal offences. But the Data Protection Act keeps the wrong people from accessing this personal data and makes sure the school keeps it safe. I, as a student, can feel much more secure knowing the act is in place and protects the information I have given to the school.

  1. Ict and the law

    This means that the minimum data required to complete any task can be held but not more than the minimum. . Appropriate measure should be taken to ensure personal data is held securely. The act was updated in 1998 because people were starting to use the internet more.

  2. 3E-The legislation that protects individuals and groups from the misuse of ICT

    Obrien's personal will be a downfall to MR. Obrien because he cannot accuse or take action upon the organisation he is working at because of the fact that the event was carried out by an anonymous PC hacker. There are a few improvements that can be made to this specific law.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work