Saturday, May 11, 2019
The Data Protection Act and Role of the Information Commissioner in Coursework
The Data Protection Act and Role of the Information Commissioner in this Act - Coursework prototypeMoving with the information that belongs to the University in a personal purse especially in a banding is another(prenominal) offense apart from leaving it behind in a bar since the information satiate which is of high value to the University would be compromised (Van, 2005). When not on official duty, it is adept to leave behind whatsoever information and materials that belong to the college. This information does not only apply to college situation but also another place of work since at one moment an individual would either lose all selective information due to ignorance and malice. Since ignorance has got no defense, Susan should not be proud of backing up information when she just walks with the replacement files anyhow, back up should be protected and kept at the most preferred place (Bell, 2001). affect the entropy outside the rights of info subject under the act is wron g. For instance, Susan processed the data for Peter to consumption outside the organizational act for his business purpose. This is unlawful and both Susan and Peter should face the law for infringing the 6th principle law of personal data act (Bainbridge, 2001). Susan should be penalized she went against the seventh principle which states that organizational measures shall be taken against unauthorized processing of personal data. Hence, on admitting to pocket the 1000, she already compromised organizations data wholeness (Miller, 2011). As the president, everyone had to blame Susan for the fault is that she was the sole authority responsible for data security and integrity within the organization. Since she breached the second principle law that governs personal data, nobody should alter the sole purpose of the data (Bell, 2001). In addition, confirming the second and third principles of data protection which Susan did not adhere to stresses on the habituate of personal data, which should be in a manner compatible with the purpose and reasons as to why the data was stored in the database system.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.