SlideShare a Scribd company logo
1 of 17
Data protection
PROTEC TION
DATA
What is data protection
Data protection is the process of
safeguarding important data from
corruption, compromise or loss and
providing the capability to restore
the data to a functional state
Data protectionis the process ofsafeguarding
important data from corruption,compromise or
loss and providingthcapability to restorethedata
to a functional state
Methods of Data Protection
Encryption of data
Conversion of plain Text into cipher text is
called encryptions
Decryption means to translate convert
cipher text into plain text.
Even if hacker obtain the encrypted data, he
cannot understand the information.
SSL Secure Sockets Layer
1. Secure sockets layer is the standard security technology for establishing an
encrypted link between a web server and a browser.
2. This link ensures that all data passed between the web server and browsers
remain private and integral.
3. Firewall
Packet Filter:
Looks at each packet entering or leaving the network and
accepts or rejects it based on user-defined rules
Proxy Server:
Intercepts all messages entering and leaving the network.
Application -Layer Firewalls:
Recognize when certain applications and protocol such as
HTTP, FTP and DNS -- are being misused.
A firewall is a network security device that monitors incoming and outgoing
network traffic and decides whether to allow or block specific traffic based on
a defined set of security rules.
Antivirus & antispyware
Anti spyware software is a type of
program designed to prevent and detect
unwanted spyware program installations
Anti-virus software is a software utility
detects prevents and remove viruses
worms and other malware from the
computer
Other necessary steps
1. Other necessary steps
2. Do a background checks
3. At least two reference for new employee
4. Use strong password and change the password frequently
5. Stopping usage of cracked and hacked applications
what is privacy?
Privacy is the aspect of information
technology which deals with the ability of
an organization or individual to determine
what data in a computer system can be
shared with third parties.
Privacy Laws
Regulations that protects a
person's/organization’s data private and
governs collection, storage, and release
of his or her financial, medical, and other
personal information to third party.
Classification of privacy laws
• General privacy laws that have an overall bearing
on the personal information of individuals
• Specific privacy laws that are designed to regulate specific types
of information. E.g. Communication privacy laws, Financial
privacy laws, Health privacy laws, Information privacy laws
,Online privacy laws ,Privacy in one’s home.
Why Privacy Matters
1. To limit on Power- of company who hold data.
2. To respect for Individuals
3. To maintain Appropriate Social Boundaries
4. To maintain Freedom of Thought and Speech of person
whom data belong
5. To maintain Freedom of Social and Political Activities of
person whom data belong
Privacy threats
1. Web Tracking
2. Data collection
3. Lack of security
4. Connected everything
5. Public Wi-Fi
6. Government spying
7. Social networking
The (Indian) Information Technology
Act, 2000 section 43A
Under section 72A of the (Indian) Information
Technology Act, 2000, disclosure of information,
knowingly and intentionally, without the consent of the
person concerned and in breach of the lawful contract is
punishable with imprisonment for a term extending to
three years and fine extending to Rs 5,00,000
Thank You

More Related Content

Similar to Data Protection and Privacy laws class 11

12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)Patrick Garrett
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptxKnownId
 
Ethical Dimension and understanding Ethical Foundation of IT
Ethical Dimension and understanding Ethical Foundation of ITEthical Dimension and understanding Ethical Foundation of IT
Ethical Dimension and understanding Ethical Foundation of ITDr. Rosemarie Sibbaluca-Guirre
 
Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsKimarie Brown
 
Fundamentals of Information Security..pdf
Fundamentals of Information Security..pdfFundamentals of Information Security..pdf
Fundamentals of Information Security..pdfZahid Hussain
 
Security and privacy in web
Security and privacy in webSecurity and privacy in web
Security and privacy in webMaher Alshammari
 
Information System Security Policy Studies as a Form of Company Privacy Prote...
Information System Security Policy Studies as a Form of Company Privacy Prote...Information System Security Policy Studies as a Form of Company Privacy Prote...
Information System Security Policy Studies as a Form of Company Privacy Prote...Editor IJCATR
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfV2Infotech1
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxV2Infotech1
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1Temesgen Berhanu
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacyimehreenx
 
COB4 Computer Crime
COB4 Computer CrimeCOB4 Computer Crime
COB4 Computer Crimeangbeelee
 
What is Linux SecuritySolutionLinux Security is a module in.pdf
What is Linux SecuritySolutionLinux Security is a module in.pdfWhat is Linux SecuritySolutionLinux Security is a module in.pdf
What is Linux SecuritySolutionLinux Security is a module in.pdffederaleyecare
 
CIA = Confidentiality of information, Integrity of information, Avai.pdf
CIA = Confidentiality of information, Integrity of information, Avai.pdfCIA = Confidentiality of information, Integrity of information, Avai.pdf
CIA = Confidentiality of information, Integrity of information, Avai.pdfannaielectronicsvill
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to securityMukesh Chinta
 

Similar to Data Protection and Privacy laws class 11 (20)

Data Security
Data SecurityData Security
Data Security
 
12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Ethical Dimension and understanding Ethical Foundation of IT
Ethical Dimension and understanding Ethical Foundation of ITEthical Dimension and understanding Ethical Foundation of IT
Ethical Dimension and understanding Ethical Foundation of IT
 
Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing Informatics
 
Fundamentals of Information Security..pdf
Fundamentals of Information Security..pdfFundamentals of Information Security..pdf
Fundamentals of Information Security..pdf
 
Goals of security
Goals of securityGoals of security
Goals of security
 
Security and privacy in web
Security and privacy in webSecurity and privacy in web
Security and privacy in web
 
IT Policy
IT PolicyIT Policy
IT Policy
 
Information System Security Policy Studies as a Form of Company Privacy Prote...
Information System Security Policy Studies as a Form of Company Privacy Prote...Information System Security Policy Studies as a Form of Company Privacy Prote...
Information System Security Policy Studies as a Form of Company Privacy Prote...
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdf
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptx
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
COB4 Computer Crime
COB4 Computer CrimeCOB4 Computer Crime
COB4 Computer Crime
 
What is Linux SecuritySolutionLinux Security is a module in.pdf
What is Linux SecuritySolutionLinux Security is a module in.pdfWhat is Linux SecuritySolutionLinux Security is a module in.pdf
What is Linux SecuritySolutionLinux Security is a module in.pdf
 
Encrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdfEncrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdf
 
Internet safety
Internet safetyInternet safety
Internet safety
 
CIA = Confidentiality of information, Integrity of information, Avai.pdf
CIA = Confidentiality of information, Integrity of information, Avai.pdfCIA = Confidentiality of information, Integrity of information, Avai.pdf
CIA = Confidentiality of information, Integrity of information, Avai.pdf
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 

Recently uploaded

Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....kzayra69
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 

Recently uploaded (20)

Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 

Data Protection and Privacy laws class 11

  • 2. What is data protection Data protection is the process of safeguarding important data from corruption, compromise or loss and providing the capability to restore the data to a functional state
  • 3.
  • 4. Data protectionis the process ofsafeguarding important data from corruption,compromise or loss and providingthcapability to restorethedata to a functional state
  • 5. Methods of Data Protection Encryption of data Conversion of plain Text into cipher text is called encryptions Decryption means to translate convert cipher text into plain text. Even if hacker obtain the encrypted data, he cannot understand the information.
  • 6. SSL Secure Sockets Layer 1. Secure sockets layer is the standard security technology for establishing an encrypted link between a web server and a browser. 2. This link ensures that all data passed between the web server and browsers remain private and integral.
  • 7. 3. Firewall Packet Filter: Looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules Proxy Server: Intercepts all messages entering and leaving the network. Application -Layer Firewalls: Recognize when certain applications and protocol such as HTTP, FTP and DNS -- are being misused. A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
  • 8. Antivirus & antispyware Anti spyware software is a type of program designed to prevent and detect unwanted spyware program installations Anti-virus software is a software utility detects prevents and remove viruses worms and other malware from the computer
  • 9. Other necessary steps 1. Other necessary steps 2. Do a background checks 3. At least two reference for new employee 4. Use strong password and change the password frequently 5. Stopping usage of cracked and hacked applications
  • 10.
  • 11. what is privacy? Privacy is the aspect of information technology which deals with the ability of an organization or individual to determine what data in a computer system can be shared with third parties.
  • 12. Privacy Laws Regulations that protects a person's/organization’s data private and governs collection, storage, and release of his or her financial, medical, and other personal information to third party.
  • 13. Classification of privacy laws • General privacy laws that have an overall bearing on the personal information of individuals • Specific privacy laws that are designed to regulate specific types of information. E.g. Communication privacy laws, Financial privacy laws, Health privacy laws, Information privacy laws ,Online privacy laws ,Privacy in one’s home.
  • 14. Why Privacy Matters 1. To limit on Power- of company who hold data. 2. To respect for Individuals 3. To maintain Appropriate Social Boundaries 4. To maintain Freedom of Thought and Speech of person whom data belong 5. To maintain Freedom of Social and Political Activities of person whom data belong
  • 15. Privacy threats 1. Web Tracking 2. Data collection 3. Lack of security 4. Connected everything 5. Public Wi-Fi 6. Government spying 7. Social networking
  • 16. The (Indian) Information Technology Act, 2000 section 43A Under section 72A of the (Indian) Information Technology Act, 2000, disclosure of information, knowingly and intentionally, without the consent of the person concerned and in breach of the lawful contract is punishable with imprisonment for a term extending to three years and fine extending to Rs 5,00,000