What is an Information Commissioner, Data Controller and Data Subject?
Are there any exemptions to the Data Protection Act?</li></ul>After this presentation you should be able to know…<br />
The Data Protection Act was developed to give protection and lay down the rules about how personal data can be used.<br />It was created to protect individuals from misuse of this data. It governs the collection and processing of data by organisations and the individual rights to access the data if they wish.<br />What is it and why was it created?<br />
What are the eight principles of it?<br />Data must be kept secure.<br />Data stored must be relevant.<br />Data stored must be kept no longer than necessary.<br />Data stored must be kept accurate and up-to-date.<br />5. Data must be obtained and processed lawfully.<br />6. Data must be processed within the data subject rights.<br />7. Data must be obtained and specified for lawful purposes.<br />8. Data must not be transferred to countries without adequate data protection laws.<br />
<ul><li>To be supplied with the data held about us.
To prevent data being used about us if it will cause distress.
To stop data being used in attempts to sell us something if the data was not collected for that purpose.
To use the law to gain compensation.</li></ul>What rights do we have as data subjects?<br />
Information Commissioner: Person who has the power to enforce the Act.<br />Data Controller: Person or Company that collects and keeps data about people.<br />Data Subject: Person who has data about them stored outside their direct control.<br />What is an Information Commissioner, Data Controller and Data Subject?<br />
<ul><li>Police can access personal information in order to solve crimes.
The taxman can access personal information to ensure people pay their taxes.
Any data held for domestic purposes at home e.g. birthday lists, address books.</li></ul>Are there any exemptions to the Data Protection Act?<br />
Early invasions of privacy was defined as the trespass, assault, or eavesdropping, but now, all the new technologies like computers and cell phones have to be taken into account. <br />Before many of nowadays technology, people could be almost certain that they could hold a conversation privately in a person's home or office and that they could not be heard by other people. Before the invention of computer databases, people could have information safe and secure in a filing cabinet which is hard to access, but now with the use of technologies like computers, people can hack computers and access to a lot of private information. <br />Privacy in the US<br />
Modernprivacylawsstatethatthefollowing are considered as themostimportantinvasions of privacy:<br />unreasonable intrusion upon the seclusion of another, for example, physical invasion of a person's home (e.g., unwanted entry, looking into windows with binoculars or camera, tapping telephone), searching wallet or purse, repeated and persistent telephone calls, obtaining financial data (e.g., bank balance) without person's consent, etc. <br />appropriation of a person's name or likeness; successful assertions of this right commonly involve defendant's use of a person's name or likeness on a product label or in advertising a product or service. A similar concept is the "right of publicity" in Restatement (Third) Unfair Competition §§46-47 (1995). The distinction is that privacy protects against "injury to personal feelings", while the right of publicity protects against unauthorized commercial exploitation of a person's name or face. As a practical matter, celebrities generally sue under the right of publicity, while ordinary citizens sue under privacy. <br />publication of private facts, for example, income tax data, sexual relations, personal letters, family quarrels, medical treatment, photographs of person in his/her home. <br />publication that places a person in a false light, which is similar to defamation. A successful defamation action requires that the information be false. In a privacy action the information is generally true, but the information created a false impression about the plaintiff. <br />Further more, itmustbesaidthatthemostcommon and mostlatentprivacyconcernisthesecondone, alsoknown as identitytheft. <br />Modernprivacylaws<br />
surreptitious interception of conversations in a house or hotel room is eavesdropping. See e.g., N.Y. Penal §§ 250.00, 250.05<br /> one has a right of privacy for contents of envelopes sent via first-class U.S. Mail. 18 USC § 1702; 39 USC § 3623<br /> one has a right of privacy for contents of telephone conversations, telegraph messages, or electronic data by wire. 18 USC § 2510 et seq. <br />one has a right of privacy for contents of radio messages. 47 USC §605 <br />A federal statute denies federal funds to educational institutions that do not maintain confidentiality of student records, which enforces privacy rights of students in a backhanded way. 20 USC § 1232g. Commonly called the Buckley-Pell Amendment to the Family Educational Rights and Privacy Act. See also Krebs v. Rutgers, 797 F.Supp. 1246 (D.N.J. 1991); Tombrello v. USX Corp., 763 F.Supp. 541 (N.D.Ala.1991). <br />Records of sales or rentals of video tapes are confidential. 18 USC §2710 Content of e-mail in public systems are confidential. 18 USC § 2702(a). <br />Bank records are confidential. 12 USC §3401 et seq. <br />library records are confidential in some states. e.g., N.Y. CPLR § 4509; Quad/Graphics, Inc. v. Southern Adirondack Library Sys., 664 N.Y.S.2d 225 (N.Y.Sup.Ct. 30 Sep 1997)<br />Federal statutes:<br />
Islam gives great importance to the fundamental human right to privacy. <br />This is evident from the Quran, as some of the verses state:'Do not spy on one another' (49:12); 'Do not enter any houses except your own homes unless you are sure of their occupants' consent' (24:27). <br />various laws have been declared to be in violation of the injunctions of Islam by the Federal Shariah Court. The Constitution of Pakistan, as well as the Pakistani law on Freedom of Information, recognizes the right to privacy. Despite this, the main objective of the draft Pakistani Data Protection Law is not to enshrine the principles of Islam, but to satisfy the requirements of European Union Directive 95/46, in particular Article 25 thereof, with the hope of ensuring that data will be allowed to flow freely between the European Union and Pakistan, thus making Pakistan an attractive market for outsourcing. <br />Privacy in Islam countries<br />
In pakistan , the new law has beenapplied, itconsistsontheprotection of privatefacts.<br />The EDPSA thatthesubjetbeinginvestigatedor of whow data isbeingcollectedshouldbeprovidedwith a notice. ThisnoticewillhavetobegiventotheCertification Council. <br />Electronic Data Protection and Safety Act<br />
(a) nameortradename, and address of the data controller and data processor<br />(b) manner of collection of local data <br />(c) purposes and means of theprocessing; <br />(c) description of the data, thelocationwherethey are kept and thecategories of data subjectstowhomthey relate; <br />(d) limits of data clisclosureauddisseniination<br />(e) intendedtransfers of data toany country orteritoryoutsidePakistan; <br />(f) general descriptionthatallowsanassessment of thetechnical and organizationalmeasurestakentoensyre data security; <br />(g) specification of any data filingsystemwhich fue processingisrelatedto, and theconnections, ifany. withother data processingor data filingsystems. whetherwithin<br />Pakistanornot; <br />(h) copy of thecontractbetween data controlleraiid data processor; <br />(i) thecapacity and authority of the individual submittingthenotice. <br />The notice:<br />