Data protection principles

Data protection principles

  • 1. Personal data shall be processed fairly and lawfully and, in particular, shall not be processed unless-
  • 1. at least one of the conditions in Schedule 2 is met, and
  • 2. in the case of sensitive personal data, at least one of the conditions in Schedule 3 is also met.
  • 2. Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes.
  • 3. Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed.
  • 4. Personal data shall be accurate and, where necessary, kept up to date.
  • 5. Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes.
  • 6. Personal data shall be processed in accordance with the rights of data subjects under this Act.
  • 7. Appropriate technical and organizational measures shall be taken against unauthorized or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.
  • 8. Personal data shall not be transferred to a country or territory outside the European Economic Area unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data.
(from http://en.wikipedia.org)





What does “fair processing” mean?


The first data protection principle requires you to process personal data fairly and lawfully. Ensuring fairness in everything you do with people’s personal details is, in our view, central to complying with your duties under the Data Protection Act. In practice, it means that you must:

* have legitimate reasons for collecting and using the personal data;
* not use the data in ways that have unjustified adverse effects on the individuals concerned;
* be open and honest about how you intend to use the data, and give individuals appropriate privacy notices when collecting their personal data;
* handle people’s personal data only in ways they would reasonably expect; and
* make sure you do not do anything unlawful with the data.

Fairness generally requires you to be transparent – clear and open with individuals about how their information will be used. Transparency is always important, but especially so in situations where individuals have a choice about whether they wish to enter into a relationship with you. Assessing whether information is being processed fairly depends partly on how it is obtained. In particular, if anyone is deceived or misled when the information is obtained, then this is unlikely to be fair.

Labels:


Read more!

What is data protection act?

Data Protection Act 1998

The Data Protection Act 1998 (DPA) is a United Kingdom Act of Parliament which defines UK law on the processing of data on identifiable living people. It is the main piece of legislation that governs the protection of personal data in the UK.

Although the Act itself does not mention privacy, it was enacted to bring UK law into line with the European Directive of 1995 which required Member States to protect people's fundamental rights and freedoms and in particular their right to privacy with respect to the processing of personal data.

In practice it provides a way for individuals to control information about themselves. Most of the Act does not apply to domestic use,[1] for example keeping a personal address book. Anyone holding personal data for other purposes is legally obliged to comply with this Act, subject to some exemptions. The Act defines eight data protection principles.

Labels:


Read more!

The Benefits of Continuous Data Protection (CDP)

The Benefits of Continuous Data Protection (CDP)
for IBM i5/OS and AIX Environments

Downtime and data loss pose intolerable risks to every business today. From IT departments to the Board Room, managers have seen the importance of business uptime and data protection to continued success, productivity and profitability.

For IT departments that are looking to take the next step in their data protection strategy, the technologies that offer continuous data protection (CDP) are becoming a regular consideration. it is important to provides a the most effective strategies and technologies to protect data and provide fast recovery and explains how CDP technologies benefit both IBM AIX and i5/OS environments.

The market for CDP products is expected to grow as businesses discover the advantages of maintaining a continuous journal of backups or archives generated over time. This is especially true for enterprises in which:

- Data changes often.
- The amount of stored data is large.
- Serious injury to the business could result from lost data, damaged files, or extended downtime.

Labels:


Read more!

Continuous data protection (CDP)

Continuous data protection (CDP), also called continuous backup, is a storage system in which all the data in an enterprise is backed up whenever any change is made. In effect, CDP creates an electronic journal of complete storage snapshots, one storage snapshot for every instant in time that data modification occurs.

A major advantage of CDP is the fact that it preserves a record of every transaction that takes place in the enterprise. In addition, if the system becomes infected with a virus or Trojan, or if a file becomes mutilated or corrupted and the problem is not discovered until some time later, it is always possible to recover the most recent clean copy of the affected file.

A CDP system with disk storage offers data recovery in a matter of seconds -- much less time than is the case with tape backups or archives. Installation of CDP hardware and programming is straightforward and simple and does not put existing data at risk.


IBM® Tivoli® Continuous Data Protection for Files is continuous backup software that protects your most important files.

This real-time, continuous data protection solution for file servers and user endpoints automatically backs up your most critical files the moment they are saved.

To help you capture every save of a file when it occurs and protect against corruption, file loss or system loss, you can specify as many as three target backup/replication ares for high-priority files.

To minimize the backup/recovery window, this continuous data backup software uses rapid disk-to-disk protection and restore capabilities.

To optimize recovery point objectives (RPO) and recovery time objectives (RTO).

It retains data files for predefined lengths of time, and version the separate copies of the files to facilitate date-based restore.

Easy to implement and manage, it runs transparently in the background with a light footprint.
Working with multiple backup/replication targets (local disk, web, file server, NAS device, Tivoli Storage Manager), you can specify a remote file server or Tivoli Storage Manager for off-machine protection when a user is connected, so real-time backup still occurs.

Labels: ,


Read more!
> Virtual Private Network
> ERP Software Implementation Best Practice
> Disk Defragmentation: All You Needed To Know
> Overclocking your Processor
> List of computer hardisk brand - which is better?
> Windows multi-touch mouse vs Apple Magic Mouse
> What is multi-touch technology?
> Google unveils Conversation Mode for Translate app
> Apple Planning 3-D Kinect-Like Interface?
> 5 Technologies That Just Might Be Extinct By the E...

> February 2008
> April 2008
> May 2008
> June 2008
> July 2008
> January 2009
> April 2009
> May 2009
> September 2009
> October 2009
> January 2010
> September 2010
> October 2010
> November 2010
> December 2010
> January 2011
> April 2011