Contact Us

Wednesday, September 23, 2015

Data Protection Act

Data Protection Act

For assignment help please contact at help@hndassignmenthelp.co.uk or hndassignmenthelp@gmail.com

Address line
Phone number
Email address
ObjectiveAn entry-level Programming or Systems Analyst position with a small business.
EducationBachelor of Science, Software Technology
Napier University, Edinburgh
Major: Java Programming
Related course work: Software Engineering, Professional Studies,
SQL, JavaScript
HND, Software Technology
Ayr College, Ayr
Major: Systems Development: Object Orientated Design
Related course work: Computer Operating Systems 2, Project Management, Professional issues in computing
HNC Software Technology
Ayr College, Ayr
Related course work: Computer Operating Systems 1, Applications Development, Event Driven Programming, Relational Database Systems, working within a project team, Computer Architecture Computing : Planning
NC Computing
Ayr College, Ayr
Major: Higher Computing
Related course work: Computer Systems, Software Development, Computer Networking, Computer Application Software
Microsoft 70-271, Supporting users and Troubleshooting a Microsoft Windows Xp operating system - Qualification
Expected: June 2008
Skills/AbilitiesTechnical Skills 
 
  • Good knowledge and understanding of four programming languages including Java
  • Understanding of Relational Database Systems including using SQL
  • Able to Analyse, Design, Implement and Manage a Project
  • Highly proficient in Microsoft Office suite
  • Good Understanding of Unix Scripting
 Personal Qualities 
 
  • Able to work very effectively within a project team
  • Able to communicate effectively with all levels of personnel
  • Excellent Presentation, Report Writing and Organisational skills
  • Excellent time management
  
Section B
Breach 1
The Software Developer has breached the Data Protection Act by accessing the data held by the Sports Company and using it to test his database. “While the data is not actually made available to the contractor, he finds it fairly straightforward to access it.” He has without authority accessed the data held by the company.

The Software Developer should be held liable in this case as it was him who accessed the data without any authority.
The part of the act to be breached is:
Part vimiscellaneous and general
55 Unlawful obtaining etc. of personal data
(1) A person must not knowingly or recklessly, without the consent of the data controller-
(a) Obtain or disclose personal data or the information contained in personal data 
Breach 2
The Sports Company has also breached the Data Protection Act by using the database that was compiled by the DIY chain and not having the authority to use it. “This database was previously compiled by the DIY chain itself”. The Sports Company has used the data without permission from the DIY chain and the customers on the database would receive unwanted promotions from the Sports Company.
The Sports Company would be held liable in this case as they have used data which belongs to another company.
The part of the act to be breached is:
Part vimiscellaneous and general
55 Unlawful obtaining etc. of personal data
(1) A person must not knowingly or recklessly, without the consent of the data controller-
(a) Obtain or disclose personal data or the information contained in personal data
Breach 3
By sharing the details of the database with his friends the Software Developer has again breached the Data Protection Act. “Amused at some of the stated family interests, and he has a good laugh about some of these with his friends.”
The software developer would be held liable in this case as he is sharing the details of data that is registered under the Data Protection Act.
The part of the act to be breached is:
Part vimiscellaneous and general
55 Unlawful obtaining etc. of personal data
(1) A person must not knowingly or recklessly, without the consent of the data controller—
(b) Procure the disclosure to another person of the information contained in personal data.
Breach 4
Taking a copy of the system he created while under contract with the sports company would be classed as a breach of contract and in violation of the Intellectual Property Law, as anything he produces while under contract with a company will belong to that company. Taking the test data is in breach of the Data Protection Act as he has no authority to take the data and he is also planning on using the data for other contracts and employers.
The Software Developer would be held liable in this case as he has taken the data without authority and is planning on using it in further employment/contracts.
The apart of the act to be breached is:
Part vimiscellaneous and general
55 Unlawful obtaining etc. of personal data
(1) A person must not knowingly or recklessly, without the consent of the data controller—
(a) Obtain or disclose personal data or the information contained in personal data
Section C
Email Guidelines
All Uppercase
Don't use all uppercase! It's the e-mail equivalent of Shouting.
Illegal Activities
These include libel (defamatory statements), discrimination (racial, sexual, religious, ageist etc), and pornographic material.
Clean Up Emails Before Forwarding Them
Forwarding emails is a great way of sharing ideas, but make sure the original idea is not hidden in obfuscation.
Quote Original Messages Properly in Replies
Make your email replies easy to read and understand by quoting in a smart and useful manner.
Ask Before You Send Huge Attachments
Don't clog email systems without permission.
Not Everyone Needs To Be Included
Limit ccs to those with a need to know. Watch cc's when replying. Don't continue to include people if the messages have become a two-way conversation.
Subject Heading
Mail should have a subject heading that reflects the content of the message.
Think twice before sending HTML Mail
If you are sending an important message to somebody, don't use "HTML" code in your message unless you are sure that their email program can understand "HTML" correctly.
Don't over quote
If you're quoting somebody's message in your reply, try to quote only the relevant portions of the message and not the whole thing
The case that I am going to refer to involved workers distributing pornographic material via the agency's corporate email and web systems.
The Software Developer should be held liable in this case as it was him who accessed the data without any authority.
The part of the act to be breached is:
Part vimiscellaneous and general
55 Unlawful obtaining etc. of personal data
(1) A person must not knowingly or recklessly, without the consent of the data controller-
(a) Obtain or disclose personal data or the information contained in personal data 
Breach 2
The Sports Company has also breached the Data Protection Act by using the database that was compiled by the DIY chain and not having the authority to use it. “This database was previously compiled by the DIY chain itself”. The Sports Company has used the data without permission from the DIY chain and the customers on the database would receive unwanted promotions from the Sports Company.
The Sports Company would be held liable in this case as they have used data which belongs to another company.
The part of the act to be breached is:
Part vimiscellaneous and general
55 Unlawful obtaining etc. of personal data
(1) A person must not knowingly or recklessly, without the consent of the data controller-
(a) Obtain or disclose personal data or the information contained in personal data
Breach 3
By sharing the details of the database with his friends the Software Developer has again breached the Data Protection Act. “Amused at some of the stated family interests, and he has a good laugh about some of these with his friends.”
The software developer would be held liable in this case as he is sharing the details of data that is registered under the Data Protection Act.
The part of the act to be breached is:
Part vimiscellaneous and general
55 Unlawful obtaining etc. of personal data
(1) A person must not knowingly or recklessly, without the consent of the data controller—
(b) Procure the disclosure to another person of the information contained in personal data.
Breach 4
Taking a copy of the system he created while under contract with the sports company would be classed as a breach of contract and in violation of the Intellectual Property Law, as anything he produces while under contract with a company will belong to that company. Taking the test data is in breach of the Data Protection Act as he has no authority to take the data and he is also planning on using the data for other contracts and employers.
The Software Developer would be held liable in this case as he has taken the data without authority and is planning on using it in further employment/contracts.
The apart of the act to be breached is:
Part vimiscellaneous and general
55 Unlawful obtaining etc. of personal data
(1) A person must not knowingly or recklessly, without the consent of the data controller—
(a) Obtain or disclose personal data or the information contained in personal data
Section C
Email Guidelines
All Uppercase
Don't use all uppercase! It's the e-mail equivalent of Shouting.
Illegal Activities
These include libel (defamatory statements), discrimination (racial, sexual, religious, ageist etc), and pornographic material.
Clean Up Emails Before Forwarding Them
Forwarding emails is a great way of sharing ideas, but make sure the original idea is not hidden in obfuscation.
Quote Original Messages Properly in Replies
Make your email replies easy to read and understand by quoting in a smart and useful manner.
Ask Before You Send Huge Attachments
Don't clog email systems without permission.
Not Everyone Needs To Be Included
Limit ccs to those with a need to know. Watch cc's when replying. Don't continue to include people if the messages have become a two-way conversation.
Subject Heading
Mail should have a subject heading that reflects the content of the message.
Think twice before sending HTML Mail
If you are sending an important message to somebody, don't use "HTML" code in your message unless you are sure that their email program can understand "HTML" correctly.
Don't over quote
If you're quoting somebody's message in your reply, try to quote only the relevant portions of the message and not the whole thing
The case that I am going to refer to involved workers distributing pornographic material via the agency's corporate email and web systems.

No comments:

Post a Comment