Data Protection Act
For assignment help please contact at help@hndassignmenthelp.co.uk or hndassignmenthelp@gmail.com
Address line |
Phone number |
Email address |
Objective | An entry-level Programming or Systems Analyst position with a small business. |
Education | Bachelor of Science, Software Technology Napier University, Edinburgh Major: Java Programming Related course work: Software Engineering, Professional Studies, SQL, JavaScript HND, Software Technology Ayr College, Ayr Major: Systems Development: Object Orientated Design Related course work: Computer Operating Systems 2, Project Management, Professional issues in computing HNC Software Technology Ayr College, Ayr Related course work: Computer Operating Systems 1, Applications Development, Event Driven Programming, Relational Database Systems, working within a project team, Computer Architecture Computing : Planning NC Computing Ayr College, Ayr Major: Higher Computing Related course work: Computer Systems, Software Development, Computer Networking, Computer Application Software Microsoft 70-271, Supporting users and Troubleshooting a Microsoft Windows Xp operating system - Qualification | Expected: June 2008 |
Skills/Abilities | Technical Skills |
|
Personal Qualities |
| |
Section B
Breach 1
The Software Developer has breached the Data Protection Act by accessing the data held by the Sports Company and using it to test his database. “While the data is not actually made available to the contractor, he finds it fairly straightforward to access it.” He has without authority accessed the data held by the company.
The Software Developer should be held liable in this case as it was him who accessed the data without any authority.
The part of the act to be breached is:
Part vimiscellaneous and general
55 Unlawful obtaining etc. of personal data
(1) A person must not knowingly or recklessly, without the consent of the data controller-
(a) Obtain or disclose personal data or the information contained in personal data
Breach 2
The Sports Company has also breached the Data Protection Act by using the database that was compiled by the DIY chain and not having the authority to use it. “This database was previously compiled by the DIY chain itself”. The Sports Company has used the data without permission from the DIY chain and the customers on the database would receive unwanted promotions from the Sports Company.
The Sports Company would be held liable in this case as they have used data which belongs to another company.
The part of the act to be breached is:
Part vimiscellaneous and general
55 Unlawful obtaining etc. of personal data
(1) A person must not knowingly or recklessly, without the consent of the data controller-
(a) Obtain or disclose personal data or the information contained in personal data
Breach 3
By sharing the details of the database with his friends the Software Developer has again breached the Data Protection Act. “Amused at some of the stated family interests, and he has a good laugh about some of these with his friends.”
The software developer would be held liable in this case as he is sharing the details of data that is registered under the Data Protection Act.
The part of the act to be breached is:
Part vimiscellaneous and general
55 Unlawful obtaining etc. of personal data
(1) A person must not knowingly or recklessly, without the consent of the data controller—
(b) Procure the disclosure to another person of the information contained in personal data.
Breach 4
Taking a copy of the system he created while under contract with the sports company would be classed as a breach of contract and in violation of the Intellectual Property Law, as anything he produces while under contract with a company will belong to that company. Taking the test data is in breach of the Data Protection Act as he has no authority to take the data and he is also planning on using the data for other contracts and employers.
The Software Developer would be held liable in this case as he has taken the data without authority and is planning on using it in further employment/contracts.
The apart of the act to be breached is:
Part vimiscellaneous and general
55 Unlawful obtaining etc. of personal data
(1) A person must not knowingly or recklessly, without the consent of the data controller—
(a) Obtain or disclose personal data or the information contained in personal data
Section C
Email Guidelines
All Uppercase
Don't use all uppercase! It's the e-mail equivalent of Shouting.
Illegal Activities
These include libel (defamatory statements), discrimination (racial, sexual, religious, ageist etc), and pornographic material.
Clean Up Emails Before Forwarding Them
Forwarding emails is a great way of sharing ideas, but make sure the original idea is not hidden in obfuscation.
Quote Original Messages Properly in Replies
Make your email replies easy to read and understand by quoting in a smart and useful manner.
Ask Before You Send Huge Attachments
Don't clog email systems without permission.
Not Everyone Needs To Be Included
Limit ccs to those with a need to know. Watch cc's when replying. Don't continue to include people if the messages have become a two-way conversation.
Subject Heading
Mail should have a subject heading that reflects the content of the message.
Think twice before sending HTML Mail
If you are sending an important message to somebody, don't use "HTML" code in your message unless you are sure that their email program can understand "HTML" correctly.
Don't over quote
If you're quoting somebody's message in your reply, try to quote only the relevant portions of the message and not the whole thing
The case that I am going to refer to involved workers distributing pornographic material via the agency's corporate email and web systems.
The Software Developer should be held liable in this case as it was him who accessed the data without any authority.
The part of the act to be breached is:
Part vimiscellaneous and general
55 Unlawful obtaining etc. of personal data
(1) A person must not knowingly or recklessly, without the consent of the data controller-
(a) Obtain or disclose personal data or the information contained in personal data
Breach 2
The Sports Company has also breached the Data Protection Act by using the database that was compiled by the DIY chain and not having the authority to use it. “This database was previously compiled by the DIY chain itself”. The Sports Company has used the data without permission from the DIY chain and the customers on the database would receive unwanted promotions from the Sports Company.
The Sports Company would be held liable in this case as they have used data which belongs to another company.
The part of the act to be breached is:
Part vimiscellaneous and general
55 Unlawful obtaining etc. of personal data
(1) A person must not knowingly or recklessly, without the consent of the data controller-
(a) Obtain or disclose personal data or the information contained in personal data
Breach 3
By sharing the details of the database with his friends the Software Developer has again breached the Data Protection Act. “Amused at some of the stated family interests, and he has a good laugh about some of these with his friends.”
The software developer would be held liable in this case as he is sharing the details of data that is registered under the Data Protection Act.
The part of the act to be breached is:
Part vimiscellaneous and general
55 Unlawful obtaining etc. of personal data
(1) A person must not knowingly or recklessly, without the consent of the data controller—
(b) Procure the disclosure to another person of the information contained in personal data.
Breach 4
Taking a copy of the system he created while under contract with the sports company would be classed as a breach of contract and in violation of the Intellectual Property Law, as anything he produces while under contract with a company will belong to that company. Taking the test data is in breach of the Data Protection Act as he has no authority to take the data and he is also planning on using the data for other contracts and employers.
The Software Developer would be held liable in this case as he has taken the data without authority and is planning on using it in further employment/contracts.
The apart of the act to be breached is:
Part vimiscellaneous and general
55 Unlawful obtaining etc. of personal data
(1) A person must not knowingly or recklessly, without the consent of the data controller—
(a) Obtain or disclose personal data or the information contained in personal data
Section C
Email Guidelines
All Uppercase
Don't use all uppercase! It's the e-mail equivalent of Shouting.
Illegal Activities
These include libel (defamatory statements), discrimination (racial, sexual, religious, ageist etc), and pornographic material.
Clean Up Emails Before Forwarding Them
Forwarding emails is a great way of sharing ideas, but make sure the original idea is not hidden in obfuscation.
Quote Original Messages Properly in Replies
Make your email replies easy to read and understand by quoting in a smart and useful manner.
Ask Before You Send Huge Attachments
Don't clog email systems without permission.
Not Everyone Needs To Be Included
Limit ccs to those with a need to know. Watch cc's when replying. Don't continue to include people if the messages have become a two-way conversation.
Subject Heading
Mail should have a subject heading that reflects the content of the message.
Think twice before sending HTML Mail
If you are sending an important message to somebody, don't use "HTML" code in your message unless you are sure that their email program can understand "HTML" correctly.
Don't over quote
If you're quoting somebody's message in your reply, try to quote only the relevant portions of the message and not the whole thing
The case that I am going to refer to involved workers distributing pornographic material via the agency's corporate email and web systems.
No comments:
Post a Comment