Sunday, April 21, 2019
Ethics in computing or Data Protection Act Research Paper
Ethics in computing or Data Protection Act - Research Paper ExampleThis requires safeguarding entropy through viable planning. This whitethorn require info reliable data back up and protection. These protections required for data are set by the data protection Act (1998). While these Acts seemed comprehensive at the time of legislation, they have come to show that there are a number of loop holes that can be exploited by various interest groups to achieve their ends (Strobl, Cave, &, Walley, 2000).According to Strobl, Cave, &, Walley, (2000), data protection is a regulation that places me in an viscous position while doing my project on data bases. This act made it very important for me to verify I introduce structures geared at protecting the information of the data subjects. To ensure that I never contravened the data protection Act or anybody using the databases does not override the data protection act, I ensured that the available controls provided by the existing file sys tems are upgraded and if possible combined to improve the level of warrantor of the data (Per Arne Godejord, 2008).While this was not only focused on ensuring that the data inside were protected and that the data subjects rights are upheld, I had to ensure that I had in place proper structures for Access control and auditing. However, I had to come up with plans to ensure that the authentication and encryption processes are always up to date. Updating the programs helped me wield the integrity of the files.Though it is a requirement of the data protection act to ensure that, the personal data are delightfully touch on. I had to ensure that I carried out a vulnerability assessment and compliance. This is in line with the requirement of that Act that any personal data be processed in fair and lawful manners. Vulnerability assessment and compliance is important in ensuring that data are not processed against the wish of the data subject. After assessing vulnerability, I also config ured
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment