Data Management Flashcards
What is a non-disclosure agreement?
A contract by which parties agree not to disclose information to other parties/people that they have shared.
What is included within an NDA?
- Identification of parties
- Definitions
- Obligations
- Scope
- Time Frame
- Return of information
- Exclusions
- Remedies
What are the types of NDA?
Two main types:
- Unilateral NDA - one party agrees not to reveal confidential info
- Mutual NDA - both sides agree that they will not share confidential info
What is The Data Protection Act 2018?
The Data Protection Act controls how your personal information is used by organisations, business or the government. It is the UK implementation of the General Data Protection Regs (GDPR)
What are the data protection principles?
Everyone using personal data must following the following rules, ensuring information is:
- used fairly, lawfully and transparently
- used for specified, explicit purposes
- used in a way that is adequate, relevant and limited to only what is necessary
- accurate and kept up to date (where necessary)
- kept for no longer than is necessary
- handled in a way that ensures appropriate security, including protection against unlawful or unauthorised processing, access, loss, destruction or damage.
What classifies as sensitive info under the Data Protection Act 2018?
- race
- ethnic background
- political opinions
- religioues beleifs
- trade union memberships
- genetics
- biometrics
- health
- sex life orientation
What are consumers rights under the DPA 2018?
- be informed about how your data is being used
- access personal data
- have incorrect data updated
- have data erased
- stop or restruct the processing of your data
- data portability
-object to how your data is processed in certain circumstances
Who polices the data proection act?
Information Commissioners office
What should you do if you find out data may have been breached?
ICO states a 7 step process
1. Don’t panic
2. Start the timer - if reportible it needs reporting without delay and definitately within 72 hours
3. Find out whats happened - log the facts i.e. what happened and why
4. Try to contain the breach - remote wiping of laptops or change passwords etc
5. Assess the risk i.e. identity theft, safeguarding or in some instances it may not have any lasting effect
6. Act to protect those affected
7. If reportable -Submit a report to ICO (self assessment tool if you are unsure if it is reportable.