StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Data Protection and privacy - Essay Example

Cite this document
Summary
In this world of fast phased technology where there is a vast array of data that can now be easily accessed by the use of high technology devices such as computers, mobile phones, wireless GPS devices and applications such as social networking sites, the issue of data protection…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.5% of users find it useful
Data Protection and privacy
Read Text Preview

Extract of sample "Data Protection and privacy"

Download file to see previous pages

ormation given to schools, workplaces, banks, healthcare facilities and even in any local government firm are handled and kept securely and to what grounds can an institution be called of breach in giving a person’s pertinent data if ever they are liable. People have really grown out of their freedom shell as human right propagators and enthusiasts have culminated for the right of a person to data protection and privacy. What is data protection? It is the area of the law that governs what may, and what may not, be done with confidential information obtained.

Personal information is in various forms, it may be in electronic form such as the ones stored on a computer hard drive or in manual form or the written forms. Furthermore data protection law, coming from the word protect, sets out rules about the methods by which personal information may be obtained from people, the ways that organisations may and may not use personal information, when organisations may and may not transfer personal information to other organisations, and provides security obligations for the storage and transfer of personal information.

Data protection law also regulates the use of personal data for marketing purposes, and restricts the sending of personal information across the borders where there is no equal protection to data deemed (Carey, 2009). Personal data as discussed in an article by Carey (2009), for better conceptualization, is defined as any information which identifies a living individual may it be in electronic or manual form. Examples of information capable of amounting to personal data include a person’s name, address, email address, DNA sample, image, and even records of transactions such as use of credit cards.

Obtaining, storing, copying, filing, transferring or anything and everything that can be done to such data is called data processing (Carey, 2009). Data protection law requires three things—registration, compliance with data protection rules and attention to

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Data Protection and privacy Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Data Protection and privacy Essay Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/law/1587482-data-protection-and-privacy
(Data Protection and Privacy Essay Example | Topics and Well Written Essays - 1000 Words)
Data Protection and Privacy Essay Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/law/1587482-data-protection-and-privacy.
“Data Protection and Privacy Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/law/1587482-data-protection-and-privacy.
  • Cited: 0 times

CHECK THESE SAMPLES OF Data Protection and privacy

Relevance of Current UK IT Law as Applied to Cloud Computing

A swift increase in the use of PC and internet has seen the rise to new forms of crimes like publishing sexually overt materials in electronic type, video voyeurism and violation of privacy and leak of information by agent, e-commerce frauds like impersonation commonly known as phishing, identity stealing and unpleasant posts through the use of communication services.... hellip; In addition, the act was also made to prevent computer crimes and ensure security practises in all the usage of technology With the increase in information technology services such as e-governance and e-commerce, protection of personal or corporate data has become a necessity and implementation of security practises and procedures relating to application of electronic communication which have increased in their levels of importance, therefore the need to harmonise these with previously existing laws regarding the same....
3 Pages (750 words) Literature review

Protection of Private Information

A stricter law sometimes paved way for hindrance for multinational companies that operated in European Union countries but in the broader sense, all member nations could exchange private information in the private and public segment (Data Protection and privacy.... The paper “Protection of Private Information” analyses the data protection Directive, which was conceded in the European Union in 1995 and the non-implementation by member nations before 1998 attracted European Court action....
3 Pages (750 words) Assignment

In-house Photography and Outsourced Photography - Kudler Fine Foods

In this paper, the author has presented the advantages & disadvantages of outsourcing photography pertaining to the case study of Kudler Fine Foods.... The author has presented the arguments in a structured format that helps in concluding whether photography of a small food store should be outsourced to a third party photographer....
8 Pages (2000 words) Essay

Surveillant Assemblage

In recent years, the perception and viewpoint about the privacy and surveillance have seen a drastic change.... The process of surveillance involves the acquisition of data, which includes transactions data, biometric and biographical data (Squire, 2010, p....
6 Pages (1500 words) Essay

Legal and Regulatory Considerations in IT Security

Data privacy and encryption regulations in Washington State are covered under chapter 19, section 255 of the state's laws.... Similarly, individual states have the autonomy to legislate and pass In the US, data laws used in one state are not necessarily similar to those used in an independent state.... Correspondingly, data laws used in the US states are not exactly similar to those used in other nations like Britain or Canada.... Succeeding sections of this paper contains a comparative analysis of data laws in Washington State, the EU, and Canada....
5 Pages (1250 words) Research Paper

Europe vs. America: different approaches to privacy

America: different approaches to privacy A good example is that where a company has been incorporated within a nation that is offshore, this company could not be under obligation to adhere to whatever data protection laws.... The key component for the EU law for data protection happens to be the data protection Directive 1995/46/ EC.... In its place, regulation of data protection is done through many federal and state laws....
10 Pages (2500 words) Essay

Information Management and Governance of UK Government

These gold plating specifications may seem to work well in the protection of the data and resources, but if in excess, they will disable the government with the emerging technologies that allow for secure information sharing.... hellip; This research will begin with the statement that the Government being a very important part of a nation has very high-security standards that govern how data is shared and stored.... Some Governments have initiatives that allow for data sharing with others....
8 Pages (2000 words) Assignment

Internet of Things

However, these processes have to consider the issues of data privacy and security since the internet is considered a delicate medium of data transfer.... The Internet of Things enables the development of these smart entities, which act as a source of the trigger to the development of novel technologies that are most needed in addressing the common challenges emerging in areas of public health, environmental protection/climate change, energy conservation, enhancement of security and enhancement of economic growth among others....
5 Pages (1250 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us