Revision Data Protection Act (Eduardo And Salvador)


Published on

Published in: Technology, News & Politics
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Revision Data Protection Act (Eduardo And Salvador)

  1. 1. Made by: Salvador Palma Eduardo Diaz-Bazan
  2. 2. What is the Data Protection Act and why was it • created? What are the eight principles of the Data • Protection Act? Data Protection Act: What rights do we have? • What is an Information Commissioner, Data • Controller and Data Subject? Are there any exemptions to the Data Protection • Act?
  3. 3. The Data Protection Act was developed to give  protection and lay down the rules about how personal data can be used. It was created to protect individuals from misuse  of this data. It governs the collection and processing of data by organisations and the individual rights to access the data if they wish.
  4. 4. Data must be kept secure. 1. Data stored must be relevant. 2. Data stored must be kept no longer than necessary. 3. Data stored must be kept accurate and up-to-date. 4. 5. Data must be obtained and processed lawfully. 6. Data must be processed within the data subject rights. 7. Data must be obtained and specified for lawful purposes. 8. Data must not be transferred to countries without adequate data protection laws.
  5. 5. To be supplied with the data held about us. • To change incorrect data. • To prevent data being used about us if it will • cause distress. To stop data being used in attempts to sell us • something if the data was not collected for that purpose. To use the law to gain compensation. •
  6. 6. Information Commissioner: Person who has  the power to enforce the Act. Data Controller: Person or Company that  collects and keeps data about people. Data Subject: Person who has data about them  stored outside their direct control.
  7. 7. Police can access personal information in order to • solve crimes. The taxman can access personal information to • ensure people pay their taxes. Any data held for domestic purposes at home e.g. • birthday lists, address books.
  8. 8. Early invasions of privacy was defined as the trespass,  assault, or eavesdropping, but now, all the new technologies like computers and cell phones have to be taken into account. Before many of nowadays technology, people could  be almost certain that they could hold a conversation privately in a person's home or office and that they could not be heard by other people. Before the invention of computer databases, people could have information safe and secure in a filing cabinet which is hard to access, but now with the use of technologies like computers, people can hack computers and access to a lot of private information.
  9. 9. Modern privacy laws state that the following are considered as the  most important invasions of privacy: unreasonable intrusion upon the seclusion of another, for example, physical invasion of a  person's home (e.g., unwanted entry, looking into windows with binoculars or camera, tapping telephone), searching wallet or purse, repeated and persistent telephone calls, obtaining financial data (e.g., bank balance) without person's consent, etc. appropriation of a person's name or likeness; successful assertions of this right commonly  involve defendant's use of a person's name or likeness on a product label or in advertising a product or service. A similar concept is the quot;right of publicityquot; in Restatement (Third) Unfair Competition §§46-47 (1995). The distinction is that privacy protects against quot;injury to personal feelingsquot;, while the right of publicity protects against unauthorized commercial exploitation of a person's name or face. As a practical matter, celebrities generally sue under the right of publicity, while ordinary citizens sue under privacy. publication of private facts, for example, income tax data, sexual relations, personal letters,  family quarrels, medical treatment, photographs of person in his/her home. publication that places a person in a false light, which is similar to defamation. A successful  defamation action requires that the information be false. In a privacy action the information is generally true, but the information created a false impression about the plaintiff. Further more, it must be said that the most common and most latent privacy concern is the  second one, also known as identity theft.
  10. 10. surreptitious interception of conversations in a house or hotel room is  eavesdropping. See e.g., N.Y. Penal §§ 250.00, 250.05 one has a right of privacy for contents of envelopes sent via first-class  U.S. Mail. 18 USC § 1702; 39 USC § 3623 one has a right of privacy for contents of telephone conversations,  telegraph messages, or electronic data by wire. 18 USC § 2510 et seq. one has a right of privacy for contents of radio messages. 47 USC §605  A federal statute denies federal funds to educational institutions that do  not maintain confidentiality of student records, which enforces privacy rights of students in a backhanded way. 20 USC § 1232g. Commonly called the Buckley-Pell Amendment to the Family Educational Rights and Privacy Act. See also Krebs v. Rutgers, 797 F.Supp. 1246 (D.N.J. 1991); Tombrello v. USX Corp., 763 F.Supp. 541 (N.D.Ala.1991). Records of sales or rentals of video tapes are confidential. 18 USC §2710  Content of e-mail in public systems are confidential. 18 USC § 2702(a). Bank records are confidential. 12 USC §3401 et seq.  library records are confidential in some states. e.g., N.Y. CPLR § 4509;  Quad/Graphics, Inc. v. Southern Adirondack Library Sys., 664 N.Y.S.2d 225 (N.Y.Sup.Ct. 30 Sep 1997)
  11. 11. Islam gives great importance to the fundamental human right to  privacy. This is evident from the Quran, as some of the verses state:'Do  not spy on one another' (49:12); 'Do not enter any houses except your own homes unless you are sure of their occupants' consent' (24:27). various laws have been declared to be in violation of the  injunctions of Islam by the Federal Shariah Court. The Constitution of Pakistan, as well as the Pakistani law on Freedom of Information, recognizes the right to privacy. Despite this, the main objective of the draft Pakistani Data Protection Law is not to enshrine the principles of Islam, but to satisfy the requirements of European Union Directive 95/46, in particular Article 25 thereof, with the hope of ensuring that data will be allowed to flow freely between the European Union and Pakistan, thus making Pakistan an attractive market for outsourcing.
  12. 12. In pakistan , the new law has been applied, it  consists on the protection of private facts. The EDPSA that the subjet being investigated  or of whow data is being collected should be provided with a notice. This notice will have to be given to the Certification Council.
  13. 13. (a) name or trade name, and address of the data controller and data  processor (b) manner of collection of local data  (c) purposes and means of the processing;  (c) description of the data, the location where they are kept and the  categories of data subjects to whom they relate; (d) limits of data clisclosure aud disseniination  (e) intended transfers of data to any country or teritory outside Pakistan;  (f) general description that allows an assessment of the technical and  organizational measures taken to ensyre data security; (g) specification of any data filing system which fue processing is related  to, and the connections, if any. with other data processing or data filing systems. whether within Pakistan or not;  (h) copy of the contract between data controller aiid data processor;  (i) the capacity and authority of the individual submitting the notice. 