SlideShare a Scribd company logo
1 of 14
What & Why
A lot of information has little or no long term value, suchas lunchinvites, post-it
notes, leaflets advertising particular events etc.
YES NO
in every organisation there willbe a core of
records that make upthe corporate memory of
that organisation.
Within this core of records is the smaller subset of
Vital Records. These are the records without which
the organisation cannot function.
So what’s the
difference?
Information ought to be managed efficiently but records must
be managed efficiently and effectively. When we understand the
value of the information we hold, its value to us, to the
University and other people, then it is easier to understand why
we need to treat it carefully. Take an interest in its welfare!
Because the University owns the information with which we work, we are
merely the custodians for the duration of our employment. It is our
collective responsibility to ensure that, wherever we work, records are
being organised and processed correctly.
We are not the owners of the information with which we work. Even if you
are an academic with an exemption clause in your contract, this only relates
to a small, predefined part of your work. The rest remains the property of the
University and the
University has a legal obligation to manage its information and records
in accordance with the legal and regulatory framework in which it
operates.
Records share a certain set of
characteristics. They are authentic, reliable,
have integrity and usability.Pneumonic =
GANDALF
Genuine
Accurate
Necessary
Durable
Auditable
Legally Admissible
Findable
It is our responsibility to ensure that the University’s
records retain these characteristics, regardless of
format. Records are no longer just paper files, on dusty
shelves… they are not even restricted to corporate
databases, MS Office documents or PDFs… records can
be emails, chat messages, tape cassettes, DVDs, social
media posts, website content and even
tweets. Applying records management principles to
records in all these formats and more is the growing
challenge of the 21st Century.
Technology is now an essential part of
our lives – buttechnology has a dark side
– cyber-crime, identitytheft, phishing,
denial of service, these all resultin ‘data
leakage’.
Data leakage means the loss of privacy,
identity, money, intellectual property or
reputation. The most common cause of
data leakage is human error (e.g. laptops
left in taxis, weak passwords, hard drive
bought on EBay).
Data Protection
The Universityprocesses many differenttypes of informationandwe need to
knowwhichtype we aredealingwith. The Data ProtectionAct 1998defines
two types ofinformation...
This the data we hold about individuals, whether
applicants, students, graduates or members of
staff (past and present).
Not only does personal data relate to facts, but
also to opinions, so we should all take care to
write in a professional and neutral way,
regardless of how informal the communication
medium (emails, chat etc.) may appear.
Sensitive Personal Data
This is further data about these same individuals, but relating to certain defined
categories of sensitive data, that is:
Physical and mental health conditions
Religious beliefs or beliefs of a similar nature
Racial or ethnic origin
Sexual life
Political opinions
Whether or not a person is a member of a trade union
The commission or alleged commission of any offence
Or Any sentences from that offence
The Data Protection Act 1998 (DPA) only allows us to process this data in
certain circumstances, in order to protect the data and the individuals to
whom it applies. This means that we only ask for the minimum amount of
information for our needs on collection, that we keep that data even more
securely than personal data, and only use it in specific circumstances.
When we are collecting data, we need to consider what personal and
sensitive personal data we are collecting. If we think of this before we
collect it, then we only collect what we need. The Data Protection Act
requires us to only collect the data we need to carry out our jobs. We also
need to think about the data we hold as the work progresses over the years,
as we may need to collect new data, or we may no longer need some of the
data we originally collected.
When we collect data from individuals, the DPA requires us to tell people what we’re going to
do with their data [data protectionstatements
http://www.port.ac.uk/accesstoinformation/policies/information/]. We can’t then, use that
data foranything new without first asking the individuals, whether staff or students for
theirconsent. So its best to think about what you need the data for when first collecting it.
There are other types of restricted data, not covered by the DPA, such as
commercially confidential records or intellectual property that also need
to be given suitable protection and/or extra thought when we collect,
hold and use it.
The HE sector faces a growing challenge from cyber threats - targeted at our
Intellectual Property (IP). IP is vital to innovation and our economic development as a
nation.
Remember to hold, use and store restricted data on secure UoP computers only.
For most otherorganisations theconsequences are less
terminal in a humansense, butcould well cause big
problems in a businesssense. There has recently beena
lot of publicityover a University that didn’t keep
accurate records of its international students. As a
result it had its sponsor status temporarily suspended,
had to make arrangements for all of its international
students currently in thecountry and could notaccept
any new students for at least a term. This has had a
massive effect on its reputation as a University.
So longas we have a goodreason for whywe are
collectinginformation,whether personaland
sensitive personal data, ordata relatingto the
University, then we can collect it. However,just
because we thinkit might be useful orwe might
want itinthe future is not a goodenough reason
for processingthe information.
When thinking about the data we need to process, it helps to
think about why we need it. There may be legal or funding
requirements outside of our control that mean we have to
collect data, or we may need the information for our own
reasons. We need to know the details of a student's
qualifications, to know that they are capable of getting on their
course, and we have to provide this qualification information to
HEFCE. We also need to collect for our own purposes though,
student and staff emergency contact details, in case we need to
contact someone if something happens to you.

More Related Content

What's hot

Challenges facing Information and Records Management Professionals
Challenges facing Information and Records Management  ProfessionalsChallenges facing Information and Records Management  Professionals
Challenges facing Information and Records Management ProfessionalsCollabor8now Ltd
 
How the Cloud Can Make Government Archiving More Secure and Less Expensive
How the Cloud Can Make Government Archiving More Secure and Less ExpensiveHow the Cloud Can Make Government Archiving More Secure and Less Expensive
How the Cloud Can Make Government Archiving More Secure and Less ExpensiveOsterman Research, Inc.
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation Data-Set
 
Legal & ethical issues
Legal & ethical issuesLegal & ethical issues
Legal & ethical issuesmiajay414
 
Governance & Ediscovery
Governance & EdiscoveryGovernance & Ediscovery
Governance & EdiscoveryLouise Spiteri
 

What's hot (7)

Challenges facing Information and Records Management Professionals
Challenges facing Information and Records Management  ProfessionalsChallenges facing Information and Records Management  Professionals
Challenges facing Information and Records Management Professionals
 
How the Cloud Can Make Government Archiving More Secure and Less Expensive
How the Cloud Can Make Government Archiving More Secure and Less ExpensiveHow the Cloud Can Make Government Archiving More Secure and Less Expensive
How the Cloud Can Make Government Archiving More Secure and Less Expensive
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
 
Legal & ethical issues
Legal & ethical issuesLegal & ethical issues
Legal & ethical issues
 
Common ethical issues
Common ethical issuesCommon ethical issues
Common ethical issues
 
Governance & Ediscovery
Governance & EdiscoveryGovernance & Ediscovery
Governance & Ediscovery
 
Information age
Information ageInformation age
Information age
 

Viewers also liked

Is student induction 2011 Dentistry
Is student induction 2011 DentistryIs student induction 2011 Dentistry
Is student induction 2011 DentistryUOPITtraining
 
Is student induction 2013 instructor final
Is student induction 2013 instructor finalIs student induction 2013 instructor final
Is student induction 2013 instructor finalUOPITtraining
 
Ketrampilan dasar mangajar 1-2
Ketrampilan dasar mangajar 1-2Ketrampilan dasar mangajar 1-2
Ketrampilan dasar mangajar 1-2rangkaleuh
 
Is student induction 2013 instructor final
Is student induction 2013 instructor finalIs student induction 2013 instructor final
Is student induction 2013 instructor finalUOPITtraining
 
Jup03 maintenance v3
Jup03 maintenance v3Jup03 maintenance v3
Jup03 maintenance v3UOPITtraining
 
IS student induction 2012 web
IS student induction 2012 webIS student induction 2012 web
IS student induction 2012 webUOPITtraining
 
тема 3. розвиток критичного креативного мислення
тема 3. розвиток критичного креативного мисленнятема 3. розвиток критичного креативного мислення
тема 3. розвиток критичного креативного мисленняnatalia0803
 
Cмольська л.м. путівник самоменеджера
Cмольська л.м. путівник самоменеджераCмольська л.м. путівник самоменеджера
Cмольська л.м. путівник самоменеджераnatalia0803
 
тема 16. основні аспекти вирішення проблеми перспективності та наступності у ...
тема 16. основні аспекти вирішення проблеми перспективності та наступності у ...тема 16. основні аспекти вирішення проблеми перспективності та наступності у ...
тема 16. основні аспекти вирішення проблеми перспективності та наступності у ...natalia0803
 
Навчально-методичне забезпечення
Навчально-методичне забезпеченняНавчально-методичне забезпечення
Навчально-методичне забезпеченняnatalia0803
 
корекційна робота логопеда з урахуванням півкульної домінанти роботи мозку
корекційна робота логопеда з урахуванням півкульної домінанти роботи мозкукорекційна робота логопеда з урахуванням півкульної домінанти роботи мозку
корекційна робота логопеда з урахуванням півкульної домінанти роботи мозкуnatalia0803
 
тема 15. гендерний підхід до організації виховання
тема 15. гендерний підхід до організації вихованнятема 15. гендерний підхід до організації виховання
тема 15. гендерний підхід до організації вихованняnatalia0803
 
виправлення вимови звука [р]
виправлення вимови  звука [р]виправлення вимови  звука [р]
виправлення вимови звука [р]natalia0803
 
D.tumen ulzii tsahim test 2
D.tumen ulzii tsahim test 2D.tumen ulzii tsahim test 2
D.tumen ulzii tsahim test 2olzii555
 
D. tumen ulzii tsahim uzuulen
D. tumen ulzii tsahim uzuulenD. tumen ulzii tsahim uzuulen
D. tumen ulzii tsahim uzuulenolzii555
 

Viewers also liked (16)

Is student induction 2011 Dentistry
Is student induction 2011 DentistryIs student induction 2011 Dentistry
Is student induction 2011 Dentistry
 
Is student induction 2013 instructor final
Is student induction 2013 instructor finalIs student induction 2013 instructor final
Is student induction 2013 instructor final
 
Ketrampilan dasar mangajar 1-2
Ketrampilan dasar mangajar 1-2Ketrampilan dasar mangajar 1-2
Ketrampilan dasar mangajar 1-2
 
Is student induction 2013 instructor final
Is student induction 2013 instructor finalIs student induction 2013 instructor final
Is student induction 2013 instructor final
 
Jup03 maintenance v3
Jup03 maintenance v3Jup03 maintenance v3
Jup03 maintenance v3
 
IS student induction 2012 web
IS student induction 2012 webIS student induction 2012 web
IS student induction 2012 web
 
IS Staff Induction
IS Staff InductionIS Staff Induction
IS Staff Induction
 
тема 3. розвиток критичного креативного мислення
тема 3. розвиток критичного креативного мисленнятема 3. розвиток критичного креативного мислення
тема 3. розвиток критичного креативного мислення
 
Cмольська л.м. путівник самоменеджера
Cмольська л.м. путівник самоменеджераCмольська л.м. путівник самоменеджера
Cмольська л.м. путівник самоменеджера
 
тема 16. основні аспекти вирішення проблеми перспективності та наступності у ...
тема 16. основні аспекти вирішення проблеми перспективності та наступності у ...тема 16. основні аспекти вирішення проблеми перспективності та наступності у ...
тема 16. основні аспекти вирішення проблеми перспективності та наступності у ...
 
Навчально-методичне забезпечення
Навчально-методичне забезпеченняНавчально-методичне забезпечення
Навчально-методичне забезпечення
 
корекційна робота логопеда з урахуванням півкульної домінанти роботи мозку
корекційна робота логопеда з урахуванням півкульної домінанти роботи мозкукорекційна робота логопеда з урахуванням півкульної домінанти роботи мозку
корекційна робота логопеда з урахуванням півкульної домінанти роботи мозку
 
тема 15. гендерний підхід до організації виховання
тема 15. гендерний підхід до організації вихованнятема 15. гендерний підхід до організації виховання
тема 15. гендерний підхід до організації виховання
 
виправлення вимови звука [р]
виправлення вимови  звука [р]виправлення вимови  звука [р]
виправлення вимови звука [р]
 
D.tumen ulzii tsahim test 2
D.tumen ulzii tsahim test 2D.tumen ulzii tsahim test 2
D.tumen ulzii tsahim test 2
 
D. tumen ulzii tsahim uzuulen
D. tumen ulzii tsahim uzuulenD. tumen ulzii tsahim uzuulen
D. tumen ulzii tsahim uzuulen
 

Similar to Ig what&why

Information Management best_practice_guide
Information Management best_practice_guideInformation Management best_practice_guide
Information Management best_practice_guideChristopher Bradley
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAgeFriendlyEconomy
 
Training for managers and supervisors presentation
Training for managers and supervisors presentationTraining for managers and supervisors presentation
Training for managers and supervisors presentationbrentcarey
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationcaniceconsulting
 
Tomorrow's IT Professional
Tomorrow's IT ProfessionalTomorrow's IT Professional
Tomorrow's IT ProfessionalDataGravity
 
Information Privacy?! (GDPR)
Information Privacy?! (GDPR)Information Privacy?! (GDPR)
Information Privacy?! (GDPR)Michel Bitter
 
GDPR READY SOLUTION FOR UNSTRUCTURED DATA
GDPR READY SOLUTION FOR UNSTRUCTURED DATAGDPR READY SOLUTION FOR UNSTRUCTURED DATA
GDPR READY SOLUTION FOR UNSTRUCTURED DATAXeniT Solutions nv
 
Vint big data research privacy technology and the law
Vint big data research privacy technology and the lawVint big data research privacy technology and the law
Vint big data research privacy technology and the lawKarlos Svoboda
 
Big data 3 4- vint-big-data-research-privacy-technology-and-the-law - big dat...
Big data 3 4- vint-big-data-research-privacy-technology-and-the-law - big dat...Big data 3 4- vint-big-data-research-privacy-technology-and-the-law - big dat...
Big data 3 4- vint-big-data-research-privacy-technology-and-the-law - big dat...Rick Bouter
 
Sogeti big data research privacy technology and the law
Sogeti big data research privacy technology and the lawSogeti big data research privacy technology and the law
Sogeti big data research privacy technology and the lawYann SESE
 
Enhancing Employee Productivity and Qualtiy of Life with Big Data
Enhancing Employee Productivity and Qualtiy of Life with Big DataEnhancing Employee Productivity and Qualtiy of Life with Big Data
Enhancing Employee Productivity and Qualtiy of Life with Big DataInnovations2Solutions
 
Governing the Chaos
Governing the ChaosGoverning the Chaos
Governing the ChaosJohn Hansen
 
Data Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveData Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveTargetX
 
Potential Advantages Of An Insider Attack
Potential Advantages Of An Insider AttackPotential Advantages Of An Insider Attack
Potential Advantages Of An Insider AttackSusan Kennedy
 

Similar to Ig what&why (19)

IT class I - ICAB PS-KL
IT class I - ICAB PS-KL IT class I - ICAB PS-KL
IT class I - ICAB PS-KL
 
Information Management best_practice_guide
Information Management best_practice_guideInformation Management best_practice_guide
Information Management best_practice_guide
 
Role of CAs in cyber world
Role of CAs in cyber worldRole of CAs in cyber world
Role of CAs in cyber world
 
Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?
 
Responsible for information
Responsible for informationResponsible for information
Responsible for information
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data Use
 
Frankston
FrankstonFrankston
Frankston
 
Training for managers and supervisors presentation
Training for managers and supervisors presentationTraining for managers and supervisors presentation
Training for managers and supervisors presentation
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
 
Tomorrow's IT Professional
Tomorrow's IT ProfessionalTomorrow's IT Professional
Tomorrow's IT Professional
 
Information Privacy?! (GDPR)
Information Privacy?! (GDPR)Information Privacy?! (GDPR)
Information Privacy?! (GDPR)
 
GDPR READY SOLUTION FOR UNSTRUCTURED DATA
GDPR READY SOLUTION FOR UNSTRUCTURED DATAGDPR READY SOLUTION FOR UNSTRUCTURED DATA
GDPR READY SOLUTION FOR UNSTRUCTURED DATA
 
Vint big data research privacy technology and the law
Vint big data research privacy technology and the lawVint big data research privacy technology and the law
Vint big data research privacy technology and the law
 
Big data 3 4- vint-big-data-research-privacy-technology-and-the-law - big dat...
Big data 3 4- vint-big-data-research-privacy-technology-and-the-law - big dat...Big data 3 4- vint-big-data-research-privacy-technology-and-the-law - big dat...
Big data 3 4- vint-big-data-research-privacy-technology-and-the-law - big dat...
 
Sogeti big data research privacy technology and the law
Sogeti big data research privacy technology and the lawSogeti big data research privacy technology and the law
Sogeti big data research privacy technology and the law
 
Enhancing Employee Productivity and Qualtiy of Life with Big Data
Enhancing Employee Productivity and Qualtiy of Life with Big DataEnhancing Employee Productivity and Qualtiy of Life with Big Data
Enhancing Employee Productivity and Qualtiy of Life with Big Data
 
Governing the Chaos
Governing the ChaosGoverning the Chaos
Governing the Chaos
 
Data Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveData Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a Positive
 
Potential Advantages Of An Insider Attack
Potential Advantages Of An Insider AttackPotential Advantages Of An Insider Attack
Potential Advantages Of An Insider Attack
 

Recently uploaded

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 

Recently uploaded (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 

Ig what&why

  • 1. What & Why A lot of information has little or no long term value, suchas lunchinvites, post-it notes, leaflets advertising particular events etc. YES NO
  • 2. in every organisation there willbe a core of records that make upthe corporate memory of that organisation. Within this core of records is the smaller subset of Vital Records. These are the records without which the organisation cannot function.
  • 3. So what’s the difference? Information ought to be managed efficiently but records must be managed efficiently and effectively. When we understand the value of the information we hold, its value to us, to the University and other people, then it is easier to understand why we need to treat it carefully. Take an interest in its welfare!
  • 4. Because the University owns the information with which we work, we are merely the custodians for the duration of our employment. It is our collective responsibility to ensure that, wherever we work, records are being organised and processed correctly. We are not the owners of the information with which we work. Even if you are an academic with an exemption clause in your contract, this only relates to a small, predefined part of your work. The rest remains the property of the University and the University has a legal obligation to manage its information and records in accordance with the legal and regulatory framework in which it operates.
  • 5. Records share a certain set of characteristics. They are authentic, reliable, have integrity and usability.Pneumonic = GANDALF Genuine Accurate Necessary Durable Auditable Legally Admissible Findable
  • 6. It is our responsibility to ensure that the University’s records retain these characteristics, regardless of format. Records are no longer just paper files, on dusty shelves… they are not even restricted to corporate databases, MS Office documents or PDFs… records can be emails, chat messages, tape cassettes, DVDs, social media posts, website content and even tweets. Applying records management principles to records in all these formats and more is the growing challenge of the 21st Century.
  • 7. Technology is now an essential part of our lives – buttechnology has a dark side – cyber-crime, identitytheft, phishing, denial of service, these all resultin ‘data leakage’. Data leakage means the loss of privacy, identity, money, intellectual property or reputation. The most common cause of data leakage is human error (e.g. laptops left in taxis, weak passwords, hard drive bought on EBay).
  • 8. Data Protection The Universityprocesses many differenttypes of informationandwe need to knowwhichtype we aredealingwith. The Data ProtectionAct 1998defines two types ofinformation...
  • 9. This the data we hold about individuals, whether applicants, students, graduates or members of staff (past and present). Not only does personal data relate to facts, but also to opinions, so we should all take care to write in a professional and neutral way, regardless of how informal the communication medium (emails, chat etc.) may appear.
  • 10. Sensitive Personal Data This is further data about these same individuals, but relating to certain defined categories of sensitive data, that is: Physical and mental health conditions Religious beliefs or beliefs of a similar nature Racial or ethnic origin Sexual life Political opinions Whether or not a person is a member of a trade union The commission or alleged commission of any offence Or Any sentences from that offence The Data Protection Act 1998 (DPA) only allows us to process this data in certain circumstances, in order to protect the data and the individuals to whom it applies. This means that we only ask for the minimum amount of information for our needs on collection, that we keep that data even more securely than personal data, and only use it in specific circumstances.
  • 11. When we are collecting data, we need to consider what personal and sensitive personal data we are collecting. If we think of this before we collect it, then we only collect what we need. The Data Protection Act requires us to only collect the data we need to carry out our jobs. We also need to think about the data we hold as the work progresses over the years, as we may need to collect new data, or we may no longer need some of the data we originally collected. When we collect data from individuals, the DPA requires us to tell people what we’re going to do with their data [data protectionstatements http://www.port.ac.uk/accesstoinformation/policies/information/]. We can’t then, use that data foranything new without first asking the individuals, whether staff or students for theirconsent. So its best to think about what you need the data for when first collecting it.
  • 12. There are other types of restricted data, not covered by the DPA, such as commercially confidential records or intellectual property that also need to be given suitable protection and/or extra thought when we collect, hold and use it. The HE sector faces a growing challenge from cyber threats - targeted at our Intellectual Property (IP). IP is vital to innovation and our economic development as a nation. Remember to hold, use and store restricted data on secure UoP computers only.
  • 13. For most otherorganisations theconsequences are less terminal in a humansense, butcould well cause big problems in a businesssense. There has recently beena lot of publicityover a University that didn’t keep accurate records of its international students. As a result it had its sponsor status temporarily suspended, had to make arrangements for all of its international students currently in thecountry and could notaccept any new students for at least a term. This has had a massive effect on its reputation as a University.
  • 14. So longas we have a goodreason for whywe are collectinginformation,whether personaland sensitive personal data, ordata relatingto the University, then we can collect it. However,just because we thinkit might be useful orwe might want itinthe future is not a goodenough reason for processingthe information. When thinking about the data we need to process, it helps to think about why we need it. There may be legal or funding requirements outside of our control that mean we have to collect data, or we may need the information for our own reasons. We need to know the details of a student's qualifications, to know that they are capable of getting on their course, and we have to provide this qualification information to HEFCE. We also need to collect for our own purposes though, student and staff emergency contact details, in case we need to contact someone if something happens to you.