Chapter 12- Confidential Info Flashcards
What are the three characteristics of confidential info
Public data
Corporate data- relevant details of customers, suppliers, products etc
Personal data- name, address, occupation, medical history
What is a non disclosure agreement
Where an employee states they are aware they are working with confidential information and if a breach they can be dismissed
What are the 8 Data Protection Act 1998 principles
Personal data shall be processed fairly and lawfully
2 personal data shall be obtained for one or more specified and lawful purposes
3 personal data shall be adequate and relevant
4 personal data shall be accurate
- personal data shall not be kept longer than necessary
- personal data shall be processed in accordance with the right of data subject
- Appropriate technical and organisational measures will be taken out to protect said data
- Should not be transferred out of the EU
What are the 5 conditions to holding personal data
1 consent must have been given
- Processing must be necessary for the performance of a contract
3 Processing must be necessary to comply with a legal obligation
- Processing must be necessary for public interest
- Processing must be necessary for the pursuit of legitimate interests
For a breach of data protection act how much is the maximum fine
£500,000
What are the 6 significant changes between GRPR and the DAta protection act
1, any business that suffers a data breach must notify their DPA within 72 hours
2- individuals now have a right to erasure and a right to data portability
- Increased compliance burden
- Larger fines. Significant breaches can result in fines of £17million of 4% or a firms annual turnover
Technical breaches £7.5 million or 2% of the annual turnover
What are the 7 principles of storage for data
- Restricted access
- File saving and back up
- Source documentation retention- in the event of a severe fire all data kept on. The business premises may be destroyed so original source data should be in a separate building
- Protection against theft
5, copyright
- Use of passwords
- Secure storage and file disposal
What must corporate data be protected from
Malicious alteration
Deliberate destructive acts
Industrial espionage
Personal data must be protected from
Being used for blackmail
Unauthorised disclosure
What is the computer misuse act 1990
Computer hacking
Unauthorised access to a computer with intent to commit a serious crine
Unauthorised modulation is computer material
What is the internet if things
Involves communication and interferon between networked devices that relay info across the network (control temp, sense smoke, detect water from leaky pipes)