The document discusses the Data Protection Act, which is designed to protect personal data by creating rights for individuals to control how their data is collected and used, making organizations responsible for securely storing and processing data in accordance with certain principles, and establishing penalties for violations. It outlines the main provisions of the Act, including what is considered personal data, the rights it provides to data subjects, and exceptions to the law.
Presented at: 2nd Annual Gulf Cooperation Council e-Participation & e-Governance Forum – Organised by: Abu Dhabi University Knowledge Group and UAE Telecommunications Regulatory Authority.
9 – 11 September 2013 | Dusit Thani Hotel | Abu Dhabi | UAE.
An Overview of the new GDPR regulations including:
• Data Protection Frame Work
• GDPR – Responsibilities
• GDPR – Changes
• GDPR - Exemptions
• GDPR – Rights
• Penalty
• Ten High Level Steps
Presented at: 2nd Annual Gulf Cooperation Council e-Participation & e-Governance Forum – Organised by: Abu Dhabi University Knowledge Group and UAE Telecommunications Regulatory Authority.
9 – 11 September 2013 | Dusit Thani Hotel | Abu Dhabi | UAE.
An Overview of the new GDPR regulations including:
• Data Protection Frame Work
• GDPR – Responsibilities
• GDPR – Changes
• GDPR - Exemptions
• GDPR – Rights
• Penalty
• Ten High Level Steps
An In House Counsel and Privacy Practitioners update on the changed regulatory landscape.
The Privacy and Data Protection Act 2014 received Royal Assent on 2 September 2014.
The new legislation replaces the Information Privacy Act 2000, and the Commissioner for Law Enforcement Data Security Act 2005, with a unified scheme governing the handling of personal information and data by Victorian Public sector agencies.
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
Right to Privacy and its Legal Framework, The Concept of Privacy, National Legal
Framework for Protecting Privacy, International Legal Framework for Protecting Privacy, Privacy Related Wrongs and Remedies, Data Security, The Concept of Security in Cyberspace, Technological Vulnerabilities, Legal Response to Technological
Vulnerabilities, Security Audit (VA/PT), Data Protection, Data Protection Position in
India, Privacy Policy, Emerging Issues in Data Protection and Privacy, BPOs and
Legal Regime in India, Protect Kids' Privacy Online, Evolving Trends in Data Protection and Information Security
25th May 2018 marks the enforcement date of EU’s General Data Protection Regulation. This new regulation strives to increase privacy for individuals and penalize businesses in breach. The complexity organizations face in managing consumer data is driving the growth of privacy tech solutions that decisively address a slew of privacy compliance challenges.
This Presentation explains what GDPR is and the impact it'll have for Companies who process data of EU Citizens.
This Guide explains the principles of GDPR, Consent, User Rights and also explains how to implement GDPR in your organization.
Originally appeared at
http://backlinkme.net/definitive-guide-for-general-data-protection-regulation-gdpr-compliance/
This Slide is based on a presentation on Nigeria Data Protection Regulation to management of Cavidel Limited presented during management meeting held in the company office in Nigeria. It gives a summary and details of the key essentials of the data protection regulation released by NITDA for Nigeria.
The presentation aims to educate management on the Nigerian Data Protection Regulation, its direct and indirect impacts on businesses, legal and financial implications, punishment for failure to comply, steps to compliance and data security.
Legal obligations and responsibilities of data processors and controllers und...IT Governance Ltd
This webinar covers:
-The definitions of ‘data controller’ and ‘data processor’ under the GDPR.
-The responsibilities and obligations of controllers and processors.
-The data breach reporting responsibilities of controllers and processors.
-The liability of, and penalties that may be imposed on, data processors and controllers.
-The appointment of joint controllers and subcontracting processors
The webinar can be found here https://www.youtube.com/watch?v=cyUPGGD3iVg&t=8s
Explores:
1. Introduction to Privacy Regimes in the United States and Abroad
2. Mobile Applications and Devices
3. Lawful Collection and Use of “Big Data”
4. International Privacy and Cross-Border Data Transfers
5. Data Security Requirements and Data Breach Response
6. IT Outsourcing and the Cloud
7. Recent Developments and Emerging Issues
General Data Protection Regulation (GDPR) - Cross-Border Data Transferspi
The General Data Protection Regulation will Impact all health data processing companies because of the growing importance of customer and patient data to the manufacturer’s business. All companies have to be compliant by 25th May 2018.
This presentation gives an overview of all the possibilities included in the GDPR to allow Cross-Border Data Transfers to third countries.
MWLUG - 2017
Tim Clark & Stephanie Heit
Tim & Steph explain the basics of GDPR and give some recommendations about what you can do to be ready.
Data sources are in the final slides.
For more information about how BCC can help you get your Domino data ready for GDPR please contact us here.
http://bcchub.com/bcc-domino-protect/
Full GDPR toolkit: https://quality.eqms.co.uk/gdpr-general-data-protection-regulation-eu-toolkit
This free online training presentation provides you with information about how to comply with the General Data Protection Regulation, managing breaches, engaging employees, key requirements and more.
An In House Counsel and Privacy Practitioners update on the changed regulatory landscape.
The Privacy and Data Protection Act 2014 received Royal Assent on 2 September 2014.
The new legislation replaces the Information Privacy Act 2000, and the Commissioner for Law Enforcement Data Security Act 2005, with a unified scheme governing the handling of personal information and data by Victorian Public sector agencies.
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
Right to Privacy and its Legal Framework, The Concept of Privacy, National Legal
Framework for Protecting Privacy, International Legal Framework for Protecting Privacy, Privacy Related Wrongs and Remedies, Data Security, The Concept of Security in Cyberspace, Technological Vulnerabilities, Legal Response to Technological
Vulnerabilities, Security Audit (VA/PT), Data Protection, Data Protection Position in
India, Privacy Policy, Emerging Issues in Data Protection and Privacy, BPOs and
Legal Regime in India, Protect Kids' Privacy Online, Evolving Trends in Data Protection and Information Security
25th May 2018 marks the enforcement date of EU’s General Data Protection Regulation. This new regulation strives to increase privacy for individuals and penalize businesses in breach. The complexity organizations face in managing consumer data is driving the growth of privacy tech solutions that decisively address a slew of privacy compliance challenges.
This Presentation explains what GDPR is and the impact it'll have for Companies who process data of EU Citizens.
This Guide explains the principles of GDPR, Consent, User Rights and also explains how to implement GDPR in your organization.
Originally appeared at
http://backlinkme.net/definitive-guide-for-general-data-protection-regulation-gdpr-compliance/
This Slide is based on a presentation on Nigeria Data Protection Regulation to management of Cavidel Limited presented during management meeting held in the company office in Nigeria. It gives a summary and details of the key essentials of the data protection regulation released by NITDA for Nigeria.
The presentation aims to educate management on the Nigerian Data Protection Regulation, its direct and indirect impacts on businesses, legal and financial implications, punishment for failure to comply, steps to compliance and data security.
Legal obligations and responsibilities of data processors and controllers und...IT Governance Ltd
This webinar covers:
-The definitions of ‘data controller’ and ‘data processor’ under the GDPR.
-The responsibilities and obligations of controllers and processors.
-The data breach reporting responsibilities of controllers and processors.
-The liability of, and penalties that may be imposed on, data processors and controllers.
-The appointment of joint controllers and subcontracting processors
The webinar can be found here https://www.youtube.com/watch?v=cyUPGGD3iVg&t=8s
Explores:
1. Introduction to Privacy Regimes in the United States and Abroad
2. Mobile Applications and Devices
3. Lawful Collection and Use of “Big Data”
4. International Privacy and Cross-Border Data Transfers
5. Data Security Requirements and Data Breach Response
6. IT Outsourcing and the Cloud
7. Recent Developments and Emerging Issues
General Data Protection Regulation (GDPR) - Cross-Border Data Transferspi
The General Data Protection Regulation will Impact all health data processing companies because of the growing importance of customer and patient data to the manufacturer’s business. All companies have to be compliant by 25th May 2018.
This presentation gives an overview of all the possibilities included in the GDPR to allow Cross-Border Data Transfers to third countries.
MWLUG - 2017
Tim Clark & Stephanie Heit
Tim & Steph explain the basics of GDPR and give some recommendations about what you can do to be ready.
Data sources are in the final slides.
For more information about how BCC can help you get your Domino data ready for GDPR please contact us here.
http://bcchub.com/bcc-domino-protect/
Full GDPR toolkit: https://quality.eqms.co.uk/gdpr-general-data-protection-regulation-eu-toolkit
This free online training presentation provides you with information about how to comply with the General Data Protection Regulation, managing breaches, engaging employees, key requirements and more.
FUNAMENTALS OF INTELLECTUAL PROPERTY IN SPECIFIC TO PATENTS AND PROTECTION OF SOFTWARE BASED INVENTIONS AND THE LEGAL POSITION IN SOFTWARE PROTECTION AS AN EDUCATIVE APPROACH WERE DISCUSSED.
Data protection law in India is currently facing many problem and resentments due the absence of proper legislative framework. There is an ongoing explosion of cyber crimes on a global scale. The theft and sale of stolen data is happening across vast continents where physical boundaries pose no restriction or seem non-existent in this technological era. India being the largest host of outsourced data processing in the world could become the epicentre of cyber crimes this is mainly due absence of the appropriate legislation
The Summary Guide to Compliance with the Kenya Data Protection Law Owako Rodah
The Data Protection Act 2019, was enacted on November 8th, 2019, ushering a new era of accountability and responsibility with regard to processing of personal data and information. Naturally, there has been a resurrection of the chatter around data protection in increasingly data-driven social and economic settings. The question on everyone’s mind being what does this mean for me?
How does GDPR Regulation help in Data Protection and Data Privacy?TobyRobinson13
General Data Protection Regulation Act is a popular and widely accepted EU law that is concerned with
the data protection and privacy of citizens of the EU. It is said to be the most stringent data security and
privacy law enforced by the EU enforcement directives. Organizations that are subjected to the
Regulation needs to understand the significance of the two broad categories of compliance, namely Data
Protection and Data Privacy for its successful implementation. Today’s article covers details on how the
GDPR Regulation facilitates data protection and data privacy of citizens of the EU. The article will briefly
shed a light on the regulation and explain how Data Protection and Data Privacy are interrelated.
“Data localisation or data residency laws require data about a nations' citizens or residents be collected, processed, and/or stored inside the country, often before being transferred internationally, and usually transferred only after meeting local privacy or data protection laws, such as giving the user notice of how the information will be used and obtaining their consent.” - Wikipedia
This week, Europe's data protection rules will undergo their largest reform in several decades. The General Data Protection Regulation (GDPR) is set to replace the Data Protection Directive, effective as of May 25, 2018.
iSPIRT’s Response- White Paper on Data Protection Framework for IndiaProductNation/iSPIRT
It is widely known that the amount of data generated daily worldwide is rising at an incredibly exponential rate. Yet, what remains shrouded is how this data, particularly those data types concerning or generated by us, as individuals, are being used and stored by both the public and private sector. As we move into a data-driven world, it is crucial that the laws developed around Data center on the premise of both empowering and protecting the individual. In fact, the main purpose of the 4th layer of India Stack, the “consent layer”, is just this: to provide for a set of tools and utilities, as part of the Data Empowerment and Protection Architecture (DEPA), that empower citizens to assert control over their data.
The Justice Srikrishna led committee of experts has released a White Paper articulating their provisional thoughts on the Data Protection Framework, and are seeking public comments on the subject. iSPIRT has submitted a formal response to the White Paper. You can also read the blog post lays out our current views regarding Data Protection here: http://pn.ispirt.in/india-in-a-digital-world/
The Evolution of Data Privacy - A Symantec Information Security Perspective o...Symantec
The European Union’s proposed General Data Protection Regulation (GDPR) has left even the most informed confused. This new regulation is designed to update the current legislation which was drafted in a time that was in technology terms, prehistoric.
The Data Protection Directive, drafted back in 1995, harks back to a time when data processing was more about filing
cabinets than data rack enclosures. It’s time to evolve.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Data protection act
1. Data Protection Act
Mohammad Iqbal Dilmahomed Bocus ID: 1102196
Gulshan Gunputh ID: 1102191
Legallant Dony ID:1102193
Bsc(Hons) IT Upgrade PT
2. Data Protection Act
Privacy of data in the age
of TECHNOLOGY
Information privacy, or data privacy is the relationship between collection
and dissemination of data, technology, the public expectation of privacy,
and the legal and political issues surrounding them
Reference from Wikipedia
3. What is Personal Data?
This can be defined as information that can identify a
living person and allow an opinion to be expressed
about that person.
Examples of sensitive personal data:
Political and religious belief
Racial and ethnic origin
Membership of trade unions
Details of sexual life
Physical and mental health
4. Data Protection Act
Is a Law designed to protect
personal data
It applies to all data storage
media
5. Definition of Data Protection Act as a Law
Create RIGHTS:
for those who have their data stored
Make RESPONSIBLE:
for those who store and process the
data
6. Why we need Data Protection Act?
In this era of technology, the importance of having
our personal data at hand is fundamental.
At any time or anywhere, we need our personal data
to do transactions.
These sensitive data are stored on servers where
anybody can have access to it.
In order to protect ourselves and our data, the DPA
was passed to protect our privacy.
7. Purpose of the Data Protection Act
To control the way information
is handled and to give legal rights
to people who have information
stored about them.
8. Data Protection Principles
1. Personal data shall be processed fairly and
lawfully
• identity of the data controller must be known
• purpose for which the information is to be
processed should be clear
• Other information relevant in the circumstances
whereby the information pertaining to an individual
might be disclosed
9. Principles of Data Protection Act
2. Personal information shall be obtained only for one or
more specified purposes.
What is meant by that is that the processing must not be
unsuited with the purpose it was originally intended for.
10. Principles of Data Protection Act (cont)
3. Personal data shall be Adequate, relevant and not excessive
The data controller should capture only the minimum amount
of personal information that is needed to fulfill the purpose of
the processing properly.
11. Principles of Data Protection Act (cont)
4. Personal Data shall be accurate and kept up-to-date
This principle of the data protection act states that data which are out-
of-date are most likely to be regarded as excessive and irrelevant for
their purpose
There are certain exceptions for this particular principle which include
the following:
The data controller has taken reasonable steps to ensure privacy
The information while inaccurate constitutes an accurate recorded
obtained from the person concerned
12. Principles of Data Protection Act (cont)
5. Personal Information shall not to be retained for more time than it
is required for processing
In order for this principle to be successfully implemented, there is a
need for continuous appraisal of the information, as well as the
purpose of its collection. In some special circumstances, the data can
be retained after its processing based on the requirement of the
business needs.
13. Principles of Data Protection Act (cont)
6. Processing should be carried out in accordance to the right of
the data subjects
Here is a list of the rights of the data subjects:
Right to access personal information
Right to object to automated decision making
Right to object to direct marketing
Right to object to certain processing likely to cause damage
14. Principles of Data Protection Act (cont)
7. Personal data shall be kept secured
The data controller takes the necessary precautions to safeguard data
against unauthorized access, processing, disclosure, damage or loss. The
data protection act takes into consideration two important factors:
1. Cost of the security measure with regards to the nature of the information
and the perceived harm that a security breach could cause
2. The state of the technological development at this time
15. Principles of Data Protection Act (cont)
8. Transfer of data to another country
The data protection act prevents private information to be
transferred to another country unless that country ensures an
adequate level of protection for the rights and freedom of data of
the subjects in relation to the processing of information of
personal data.
16. Definition of key words
Data Subject
Data subjects, are the people who have data held about
them. Nowadays this includes you, me, everyone.
Data Controller
A Data controller is the person, business or organization controlling the
collection, contents and use of personal data.
17. Definition of key words (cont)
Data User
This is an authorized user within the organization or business
who is given an ID and password that enables them to access
data.
Data processor
The data processor is a person, other than an employee of the
data controller, who has a written contract with the data
controller and who processes personal data on behalf of the data
controller.
18. Definition of key words (cont)
Commissioner
Mrs. Madhub is presently the commissioner in Mauritius. Her job is to:
register all data controllers in Mauritius
exercise control over all data processing activities in Mauritius
investigate complaints
undertake research in data processing and computer technology,
amongst others.
More information at http://dataprotection.gov.mu/
19. Data Protection Office [PMO]
The Data Protection Office runs under the aegis of the
Prime Minister's Office
The Data Protection Office is to safeguard the privacy
rights of all individuals with regard to the processing of
their personal data, in Mauritius.
During 2009 and 2010, the office has concentrated on the
registration of about 10000-15000 data controllers in
Mauritius
20. Statistics
With the growing awareness of the
existence of data protection laws, the
Investigation Unit has received 11
complaints as at end of December
2011.The Investigators have successfully
investigated 4 suspected cases of data
breach.
22. cont
On 26th June 2010, Dr Richard L Munisamy made a statement to the
police at Point aux Canonniers station accusing Mr Sahrat Dutt Lallh, CEO
of Mauritius Telecom of contravening Section 29 of the Data Protection
Act
According to a Mauritius Telecom employee, the private database of
Orange customers’ phone numbers had been released to the alliance de
l’avenir who had requested that Mauritius Telecom send a message to
subscribers soliciting their support in the general elections of may 2010.
Apparently, Mauritius telecom made no charge for this service. It is
understood that the case, OB732/10, has recently been transferred to
regional headquarters at Piton where the decision to prosecute will be
taken.
23. Data Protection Act in Mauritius
Data Protection Act 2004 came
into operation in February 2009.
Enforcement is through the
Data Protection Office.
24. Our Rights
DPA gives everyone the right to see data that is held about them on a
computer system and to have it changed if it is wrong!
25. Offences and Penalties
Any person who contravenes the DPA shall commit
an offence.
Where no specific penalty is provided for an offence,
the person shall, on conviction, be liable to a fine not
exceeding 200,000 rupees and to imprisonment for a
term not exceeding 5 years.
26. Exceptions to the Law
There is some data you can't see.
If the data is held by the
police,
the security forces or the
Inland Revenue then access is denied.