Module 15 Protecting Information Flashcards
What does the Information Commissioner’s Office (ICO) enforce?
- Data Protection Act 2018
- the Freedom of Information Act 2000
- the Environmental Information Regulations 2004
- the Privacy and Electronic Communications Regulations 2003
- INSPIRE Regulations 2009
- the Re-use of Public Sector Information Regulations 2015.
What is the Scottish Information Commissioner’s Office resposible for?
- Freedom of Information (Scotland) Act 2002
- Environmental Information (Scotland) Regulations 2004
- Scotland also has complementary INSPIRE (Scotland) Regulations 2009
When did Britan leave the EU? When did the transition peiod end?
- Britain left - 1 January 2020
- Transition period until - 30 June 2020
Who does the DPA 2018 and GDPR apply to?
- any business or organisation which uses information for any business or “non-household purpose”
What constitutes personal data?
- name
- address
- other typically “personal” pieces of information
- IP address
How can organisations ensure that data is managed correctly?
- must have at least one Data Protection Officer within the business
Rights of EU citizens regarding their personal data?
- Access to data collected about them
- Ability and right to correct, erase, or block information
- Ability and right to object to all usages of data
- Ability and right to oppose automated decisions regarding them based on their data
- Judicial remedy and compensation
GDPR required that personal data be
- Processed in a manner that is fair and in accordance with all laws
- Collected and processed for a specific, clearly explained, legitimate purpose
- Recorded such that it is adequate, relevant and not excessive
- Recorded accurately
- Kept current
- Kept no longer than deemed necessary to fulfil the stated purpose
What happens if there is a data breach?
- £17 million or 4% of the company’s global turnover can be charged
- Must reveal if there has been a data leak, even if just one customer
- 72 hours following a breach to report this to ICO
Simple changes a business can implement to protect data?
- Passphrases not passwords - a pneumonic made up of letters from a phrase, lyric or sentence
- Lock all devices
- Access controls
- Update all software
- Personal/work information crossover
- Firewalls.
How can individuals protect their data?
- Anti-theft your devices
- Be careful when using a public WiFi
- Check web addresses for security
- Be careful what is shared on social media
- Turn off location settings
Denial of Service Attacks
- malicious attack on an organisation with the intent of restricting the operation of the server
- flood the communication ports
- prevent the receipt of legitimate messages
Virus Attacks
- piece of code that is loaded onto a computer without the knowledge
- can also replicate themselves
- can transmit themselves across networks and bypass security systems
- corrupt files on an infected computer
What should organistaions do to prevent virus attacks?
Virus software should:
- Be installed on every machine and run regularly
- Be updated often for new versions
- Scan all removable media before running applications
potential controls to prevent spam
- Email authentication solutions, for example, through digital signature recognition
- Policies and procedures that train staff to be vigilant as to whom they give their email addresses