SlideShare a Scribd company logo
Data Protection Act
Mohammad Iqbal Dilmahomed Bocus ID: 1102196
Gulshan Gunputh ID: 1102191
Legallant Dony ID:1102193
Bsc(Hons) IT Upgrade PT
Data Protection Act
Privacy of data in the age
of TECHNOLOGY
Information privacy, or data privacy is the relationship between collection
and dissemination of data, technology, the public expectation of privacy,
and the legal and political issues surrounding them
Reference from Wikipedia
What is Personal Data?
This can be defined as information that can identify a
living person and allow an opinion to be expressed
about that person.
Examples of sensitive personal data:
 Political and religious belief
 Racial and ethnic origin
 Membership of trade unions
 Details of sexual life
 Physical and mental health
Data Protection Act
Is a Law designed to protect
personal data
It applies to all data storage
media
Definition of Data Protection Act as a Law
Create RIGHTS:
for those who have their data stored
Make RESPONSIBLE:
for those who store and process the
data
Why we need Data Protection Act?
In this era of technology, the importance of having
our personal data at hand is fundamental.
At any time or anywhere, we need our personal data
to do transactions.
These sensitive data are stored on servers where
anybody can have access to it.
In order to protect ourselves and our data, the DPA
was passed to protect our privacy.
Purpose of the Data Protection Act
To control the way information
is handled and to give legal rights
to people who have information
stored about them.
Data Protection Principles
1. Personal data shall be processed fairly and
lawfully
• identity of the data controller must be known
• purpose for which the information is to be
processed should be clear
• Other information relevant in the circumstances
whereby the information pertaining to an individual
might be disclosed
Principles of Data Protection Act
2. Personal information shall be obtained only for one or
more specified purposes.
 What is meant by that is that the processing must not be
unsuited with the purpose it was originally intended for.
Principles of Data Protection Act (cont)
3. Personal data shall be Adequate, relevant and not excessive
The data controller should capture only the minimum amount
of personal information that is needed to fulfill the purpose of
the processing properly.
Principles of Data Protection Act (cont)
4. Personal Data shall be accurate and kept up-to-date
 This principle of the data protection act states that data which are out-
of-date are most likely to be regarded as excessive and irrelevant for
their purpose
 There are certain exceptions for this particular principle which include
the following:
 The data controller has taken reasonable steps to ensure privacy
 The information while inaccurate constitutes an accurate recorded
obtained from the person concerned
Principles of Data Protection Act (cont)
5. Personal Information shall not to be retained for more time than it
is required for processing
 In order for this principle to be successfully implemented, there is a
need for continuous appraisal of the information, as well as the
purpose of its collection. In some special circumstances, the data can
be retained after its processing based on the requirement of the
business needs.
Principles of Data Protection Act (cont)
6. Processing should be carried out in accordance to the right of
the data subjects
Here is a list of the rights of the data subjects:
 Right to access personal information
 Right to object to automated decision making
 Right to object to direct marketing
 Right to object to certain processing likely to cause damage
Principles of Data Protection Act (cont)
7. Personal data shall be kept secured
 The data controller takes the necessary precautions to safeguard data
against unauthorized access, processing, disclosure, damage or loss. The
data protection act takes into consideration two important factors:
1. Cost of the security measure with regards to the nature of the information
and the perceived harm that a security breach could cause
2. The state of the technological development at this time
Principles of Data Protection Act (cont)
8. Transfer of data to another country
The data protection act prevents private information to be
transferred to another country unless that country ensures an
adequate level of protection for the rights and freedom of data of
the subjects in relation to the processing of information of
personal data.
Definition of key words
 Data Subject
Data subjects, are the people who have data held about
them. Nowadays this includes you, me, everyone.
 Data Controller
A Data controller is the person, business or organization controlling the
collection, contents and use of personal data.
Definition of key words (cont)
 Data User
This is an authorized user within the organization or business
who is given an ID and password that enables them to access
data.
 Data processor
The data processor is a person, other than an employee of the
data controller, who has a written contract with the data
controller and who processes personal data on behalf of the data
controller.
Definition of key words (cont)
Commissioner
Mrs. Madhub is presently the commissioner in Mauritius. Her job is to:
 register all data controllers in Mauritius
 exercise control over all data processing activities in Mauritius
 investigate complaints
 undertake research in data processing and computer technology,
amongst others.
More information at http://dataprotection.gov.mu/
Data Protection Office [PMO]
The Data Protection Office runs under the aegis of the
Prime Minister's Office
The Data Protection Office is to safeguard the privacy
rights of all individuals with regard to the processing of
their personal data, in Mauritius.
During 2009 and 2010, the office has concentrated on the
registration of about 10000-15000 data controllers in
Mauritius
Statistics
With the growing awareness of the
existence of data protection laws, the
Investigation Unit has received 11
complaints as at end of December
2011.The Investigators have successfully
investigated 4 suspected cases of data
breach.
Case where the DPA has been breached in Mauritius
cont
 On 26th June 2010, Dr Richard L Munisamy made a statement to the
police at Point aux Canonniers station accusing Mr Sahrat Dutt Lallh, CEO
of Mauritius Telecom of contravening Section 29 of the Data Protection
Act
 According to a Mauritius Telecom employee, the private database of
Orange customers’ phone numbers had been released to the alliance de
l’avenir who had requested that Mauritius Telecom send a message to
subscribers soliciting their support in the general elections of may 2010.
Apparently, Mauritius telecom made no charge for this service. It is
understood that the case, OB732/10, has recently been transferred to
regional headquarters at Piton where the decision to prosecute will be
taken.
Data Protection Act in Mauritius
Data Protection Act 2004 came
into operation in February 2009.
Enforcement is through the
Data Protection Office.
Our Rights
 DPA gives everyone the right to see data that is held about them on a
computer system and to have it changed if it is wrong!
Offences and Penalties
Any person who contravenes the DPA shall commit
an offence.
Where no specific penalty is provided for an offence,
the person shall, on conviction, be liable to a fine not
exceeding 200,000 rupees and to imprisonment for a
term not exceeding 5 years.
Exceptions to the Law
There is some data you can't see.
If the data is held by the
police,
the security forces or the
Inland Revenue then access is denied.
Data protection act

More Related Content

What's hot

Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Data Protection (Download for slideshow)
Data Protection (Download for slideshow)
Andrew Sharpe
 
Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)
Russell_Kennedy
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
Tushar Rajput
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
Vertex Holdings
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacy
himanshu jain
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
Priyab Satoshi
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theft
Amber Gupta
 
Gdpr presentation
Gdpr presentationGdpr presentation
Gdpr presentation
Sudarsan Reddy
 
GDPR and Personal Data Transfers 1.1.pdf
GDPR and Personal Data Transfers 1.1.pdfGDPR and Personal Data Transfers 1.1.pdf
GDPR and Personal Data Transfers 1.1.pdf
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
 
Data protection regulations in Nigeria
Data protection regulations in NigeriaData protection regulations in Nigeria
Data protection regulations in Nigeria
Mercy Akinseinde
 
GDPR infographic
GDPR infographicGDPR infographic
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
IT Governance Ltd
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
WilmerHale
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
Eryk Budi Pratama
 
General Data Protection Regulation (GDPR) - Cross-Border Data Transfers
General Data Protection Regulation (GDPR) - Cross-Border Data TransfersGeneral Data Protection Regulation (GDPR) - Cross-Border Data Transfers
General Data Protection Regulation (GDPR) - Cross-Border Data Transfers
pi
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
sp_krishna
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
BCC - Solutions for IBM Collaboration Software
 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
Aurora Computer Studies
 
Gdpr presentation
Gdpr presentationGdpr presentation
Gdpr presentation
Iain Wicks MCIPR
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
Qualsys Ltd
 

What's hot (20)

Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Data Protection (Download for slideshow)
Data Protection (Download for slideshow)
 
Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacy
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theft
 
Gdpr presentation
Gdpr presentationGdpr presentation
Gdpr presentation
 
GDPR and Personal Data Transfers 1.1.pdf
GDPR and Personal Data Transfers 1.1.pdfGDPR and Personal Data Transfers 1.1.pdf
GDPR and Personal Data Transfers 1.1.pdf
 
Data protection regulations in Nigeria
Data protection regulations in NigeriaData protection regulations in Nigeria
Data protection regulations in Nigeria
 
GDPR infographic
GDPR infographicGDPR infographic
GDPR infographic
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
 
General Data Protection Regulation (GDPR) - Cross-Border Data Transfers
General Data Protection Regulation (GDPR) - Cross-Border Data TransfersGeneral Data Protection Regulation (GDPR) - Cross-Border Data Transfers
General Data Protection Regulation (GDPR) - Cross-Border Data Transfers
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
 
Gdpr presentation
Gdpr presentationGdpr presentation
Gdpr presentation
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
 

Viewers also liked

Industrial design [compatibility mode]
Industrial design [compatibility mode]Industrial design [compatibility mode]
Industrial design [compatibility mode]Delwin Arikatt
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issuesSagar Rahurkar
 
IPR AND SOFTWARE PROTECTION
IPR AND SOFTWARE PROTECTIONIPR AND SOFTWARE PROTECTION
IPR AND SOFTWARE PROTECTION
R KUMARAVENKATESAN
 
Intellectual Property Rights (IPR)
Intellectual Property Rights (IPR)Intellectual Property Rights (IPR)
Intellectual Property Rights (IPR)
Madhusudan Rao Datrika
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rightsharshhanu
 

Viewers also liked (6)

Industrial design [compatibility mode]
Industrial design [compatibility mode]Industrial design [compatibility mode]
Industrial design [compatibility mode]
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issues
 
IPR AND SOFTWARE PROTECTION
IPR AND SOFTWARE PROTECTIONIPR AND SOFTWARE PROTECTION
IPR AND SOFTWARE PROTECTION
 
Design act 2000
Design act 2000Design act 2000
Design act 2000
 
Intellectual Property Rights (IPR)
Intellectual Property Rights (IPR)Intellectual Property Rights (IPR)
Intellectual Property Rights (IPR)
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
 

Similar to Data protection act

Managing Data Protection guide powerpoint presentation
Managing Data Protection guide powerpoint presentationManaging Data Protection guide powerpoint presentation
Managing Data Protection guide powerpoint presentation
silvereyez11
 
Data privacy Legislation in India
Data privacy Legislation in IndiaData privacy Legislation in India
Data privacy Legislation in India
LATHA H C
 
My presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPRMy presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPR
zayadeen2003
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11mrmwood
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_indiaAltacit Global
 
Bahrain-Personal-Data-Protection-Law.pdf
Bahrain-Personal-Data-Protection-Law.pdfBahrain-Personal-Data-Protection-Law.pdf
Bahrain-Personal-Data-Protection-Law.pdf
DaviesParker
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
sidra batool
 
Safety And Security Of Data 4
Safety And Security Of Data 4Safety And Security Of Data 4
Safety And Security Of Data 4
Wynthorpe
 
Data protection Act - Key Terms
Data protection Act -  Key TermsData protection Act -  Key Terms
Data protection Act - Key Terms
Douglas Nderitu
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law
Owako Rodah
 
How does GDPR Regulation help in Data Protection and Data Privacy?
How does GDPR Regulation help in Data Protection and Data Privacy?How does GDPR Regulation help in Data Protection and Data Privacy?
How does GDPR Regulation help in Data Protection and Data Privacy?
TobyRobinson13
 
Uchi data local presentation 2020
Uchi data local presentation 2020Uchi data local presentation 2020
Uchi data local presentation 2020
Christo W. Meyer
 
General data protection regulation - European union
General data protection regulation  - European unionGeneral data protection regulation  - European union
General data protection regulation - European union
Rohana K Amarakoon
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
BenjaminShalevSalovi
 
Personal Data Protection in Malaysia
Personal Data Protection in MalaysiaPersonal Data Protection in Malaysia
Personal Data Protection in Malaysia
MSC Malaysia Cybercentre @ Bangsar South City
 
iSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for IndiaiSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for India
ProductNation/iSPIRT
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
Symantec
 
DATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptxDATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptx
JaeKim165097
 

Similar to Data protection act (20)

Managing Data Protection guide powerpoint presentation
Managing Data Protection guide powerpoint presentationManaging Data Protection guide powerpoint presentation
Managing Data Protection guide powerpoint presentation
 
Data privacy Legislation in India
Data privacy Legislation in IndiaData privacy Legislation in India
Data privacy Legislation in India
 
My presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPRMy presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPR
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_india
 
Bahrain-Personal-Data-Protection-Law.pdf
Bahrain-Personal-Data-Protection-Law.pdfBahrain-Personal-Data-Protection-Law.pdf
Bahrain-Personal-Data-Protection-Law.pdf
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
Safety And Security Of Data 4
Safety And Security Of Data 4Safety And Security Of Data 4
Safety And Security Of Data 4
 
Data protection Act - Key Terms
Data protection Act -  Key TermsData protection Act -  Key Terms
Data protection Act - Key Terms
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law
 
1307 Privacy Act
1307 Privacy Act1307 Privacy Act
1307 Privacy Act
 
How does GDPR Regulation help in Data Protection and Data Privacy?
How does GDPR Regulation help in Data Protection and Data Privacy?How does GDPR Regulation help in Data Protection and Data Privacy?
How does GDPR Regulation help in Data Protection and Data Privacy?
 
Uchi data local presentation 2020
Uchi data local presentation 2020Uchi data local presentation 2020
Uchi data local presentation 2020
 
General data protection regulation - European union
General data protection regulation  - European unionGeneral data protection regulation  - European union
General data protection regulation - European union
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Personal Data Protection in Malaysia
Personal Data Protection in MalaysiaPersonal Data Protection in Malaysia
Personal Data Protection in Malaysia
 
iSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for IndiaiSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for India
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
 
POPI Seminar FINAL
POPI Seminar FINALPOPI Seminar FINAL
POPI Seminar FINAL
 
DATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptxDATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptx
 

Recently uploaded

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 

Data protection act

  • 1. Data Protection Act Mohammad Iqbal Dilmahomed Bocus ID: 1102196 Gulshan Gunputh ID: 1102191 Legallant Dony ID:1102193 Bsc(Hons) IT Upgrade PT
  • 2. Data Protection Act Privacy of data in the age of TECHNOLOGY Information privacy, or data privacy is the relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them Reference from Wikipedia
  • 3. What is Personal Data? This can be defined as information that can identify a living person and allow an opinion to be expressed about that person. Examples of sensitive personal data:  Political and religious belief  Racial and ethnic origin  Membership of trade unions  Details of sexual life  Physical and mental health
  • 4. Data Protection Act Is a Law designed to protect personal data It applies to all data storage media
  • 5. Definition of Data Protection Act as a Law Create RIGHTS: for those who have their data stored Make RESPONSIBLE: for those who store and process the data
  • 6. Why we need Data Protection Act? In this era of technology, the importance of having our personal data at hand is fundamental. At any time or anywhere, we need our personal data to do transactions. These sensitive data are stored on servers where anybody can have access to it. In order to protect ourselves and our data, the DPA was passed to protect our privacy.
  • 7. Purpose of the Data Protection Act To control the way information is handled and to give legal rights to people who have information stored about them.
  • 8. Data Protection Principles 1. Personal data shall be processed fairly and lawfully • identity of the data controller must be known • purpose for which the information is to be processed should be clear • Other information relevant in the circumstances whereby the information pertaining to an individual might be disclosed
  • 9. Principles of Data Protection Act 2. Personal information shall be obtained only for one or more specified purposes.  What is meant by that is that the processing must not be unsuited with the purpose it was originally intended for.
  • 10. Principles of Data Protection Act (cont) 3. Personal data shall be Adequate, relevant and not excessive The data controller should capture only the minimum amount of personal information that is needed to fulfill the purpose of the processing properly.
  • 11. Principles of Data Protection Act (cont) 4. Personal Data shall be accurate and kept up-to-date  This principle of the data protection act states that data which are out- of-date are most likely to be regarded as excessive and irrelevant for their purpose  There are certain exceptions for this particular principle which include the following:  The data controller has taken reasonable steps to ensure privacy  The information while inaccurate constitutes an accurate recorded obtained from the person concerned
  • 12. Principles of Data Protection Act (cont) 5. Personal Information shall not to be retained for more time than it is required for processing  In order for this principle to be successfully implemented, there is a need for continuous appraisal of the information, as well as the purpose of its collection. In some special circumstances, the data can be retained after its processing based on the requirement of the business needs.
  • 13. Principles of Data Protection Act (cont) 6. Processing should be carried out in accordance to the right of the data subjects Here is a list of the rights of the data subjects:  Right to access personal information  Right to object to automated decision making  Right to object to direct marketing  Right to object to certain processing likely to cause damage
  • 14. Principles of Data Protection Act (cont) 7. Personal data shall be kept secured  The data controller takes the necessary precautions to safeguard data against unauthorized access, processing, disclosure, damage or loss. The data protection act takes into consideration two important factors: 1. Cost of the security measure with regards to the nature of the information and the perceived harm that a security breach could cause 2. The state of the technological development at this time
  • 15. Principles of Data Protection Act (cont) 8. Transfer of data to another country The data protection act prevents private information to be transferred to another country unless that country ensures an adequate level of protection for the rights and freedom of data of the subjects in relation to the processing of information of personal data.
  • 16. Definition of key words  Data Subject Data subjects, are the people who have data held about them. Nowadays this includes you, me, everyone.  Data Controller A Data controller is the person, business or organization controlling the collection, contents and use of personal data.
  • 17. Definition of key words (cont)  Data User This is an authorized user within the organization or business who is given an ID and password that enables them to access data.  Data processor The data processor is a person, other than an employee of the data controller, who has a written contract with the data controller and who processes personal data on behalf of the data controller.
  • 18. Definition of key words (cont) Commissioner Mrs. Madhub is presently the commissioner in Mauritius. Her job is to:  register all data controllers in Mauritius  exercise control over all data processing activities in Mauritius  investigate complaints  undertake research in data processing and computer technology, amongst others. More information at http://dataprotection.gov.mu/
  • 19. Data Protection Office [PMO] The Data Protection Office runs under the aegis of the Prime Minister's Office The Data Protection Office is to safeguard the privacy rights of all individuals with regard to the processing of their personal data, in Mauritius. During 2009 and 2010, the office has concentrated on the registration of about 10000-15000 data controllers in Mauritius
  • 20. Statistics With the growing awareness of the existence of data protection laws, the Investigation Unit has received 11 complaints as at end of December 2011.The Investigators have successfully investigated 4 suspected cases of data breach.
  • 21. Case where the DPA has been breached in Mauritius
  • 22. cont  On 26th June 2010, Dr Richard L Munisamy made a statement to the police at Point aux Canonniers station accusing Mr Sahrat Dutt Lallh, CEO of Mauritius Telecom of contravening Section 29 of the Data Protection Act  According to a Mauritius Telecom employee, the private database of Orange customers’ phone numbers had been released to the alliance de l’avenir who had requested that Mauritius Telecom send a message to subscribers soliciting their support in the general elections of may 2010. Apparently, Mauritius telecom made no charge for this service. It is understood that the case, OB732/10, has recently been transferred to regional headquarters at Piton where the decision to prosecute will be taken.
  • 23. Data Protection Act in Mauritius Data Protection Act 2004 came into operation in February 2009. Enforcement is through the Data Protection Office.
  • 24. Our Rights  DPA gives everyone the right to see data that is held about them on a computer system and to have it changed if it is wrong!
  • 25. Offences and Penalties Any person who contravenes the DPA shall commit an offence. Where no specific penalty is provided for an offence, the person shall, on conviction, be liable to a fine not exceeding 200,000 rupees and to imprisonment for a term not exceeding 5 years.
  • 26. Exceptions to the Law There is some data you can't see. If the data is held by the police, the security forces or the Inland Revenue then access is denied.