- this is used to stop data getting into the wrong hands as it travels over the internet
- encryption works by scrambling data as its transferred from one place to another
- this results in data which is not understandable/readerable
it requires an encryption key/ software to encrypt and decryption key to decrypt and read it
- encryption works by scrambling data as its transferred from one place to another
- this results in data which is not understandable/readerable
it requires an encryption key/ software to encrypt and decryption key to decrypt and read it
when encryption should be used
- sending credit card details such as card numbers,expiry date ect ,over the internet
- on-line banking
- sending payment details (bank details such as sort code numbers,account number
- confidential emails( personal or medical details)
- sending data between computers on a network where confidentiality is essential (legal or medical)
-storing sensitive personal information on laptops and portable devices and media
- sending credit card details such as card numbers,expiry date ect ,over the internet
- on-line banking
- sending payment details (bank details such as sort code numbers,account number
- confidential emails( personal or medical details)
- sending data between computers on a network where confidentiality is essential (legal or medical)
-storing sensitive personal information on laptops and portable devices and media
why bother
hacking
-gaining unauthorised access to a computer systems
- gaining authorised access to a system but accessing areas without permission
may lead to illegally copying/deleting/changing data from a system
protection against hacker accessing your personal data
- a hacker could simply intercept and read your email
- a hacker could alter or collect personal details including credit card numbers which could be used to commit fraud
hacking
-gaining unauthorised access to a computer systems
- gaining authorised access to a system but accessing areas without permission
may lead to illegally copying/deleting/changing data from a system
protection against hacker accessing your personal data
- a hacker could simply intercept and read your email
- a hacker could alter or collect personal details including credit card numbers which could be used to commit fraud
drawbacks
- data can still be deleted from the system
- criminals can use encryption to keep incriminating material secure
- data can still be deleted from the system
- criminals can use encryption to keep incriminating material secure
so it cannot be shared by anyone
when was the latest version of the data protection act released ?
in 1998
in 1998
main points
If you collect data about people for one reason, you must not use it for a different reasons
You must not give people's data to other people or organizations unless they agree
People have the right to look at data that any organizations store about them
If you collect data about people for one reason, you must not use it for a different reasons
You must not give people's data to other people or organizations unless they agree
People have the right to look at data that any organizations store about them