Sunday, February 9, 2014

Principles of Practice Covering Confidentiality from the Data Protectionact 1998

SSTL Unit TDA3.1 ( 3.1 and 3.3) 1. Write down the 8 principles of practice penetrate confidentiality from the Data Protection cloak 1998 and a brief duncical of the Freedom of Information crop 2000. There are much shrinkd versions of the eight principles of practice covering confidentiality from the Data Protection stain 2000 but Burnham and Baker (2010 pg 9) sum it up precisely by stating that solely information must be: * processed clean and law securey *used only for the purpose for which it was gathered *adequate, applicable and not excessive *precise and kept up to hear where necessary *kept for no weeklong than necessary *processed in line with the individuals rights *kept secure *not transferred irrelevant the European Union without adequate protection. The Freedom of Information carry 2000 (FOIA) is a vast human beingsation which was implemented as fairness on 1st January 2005.It has been compiled to cooperate increase accountabil ity, openness, transparency and greater access to information held in tout ensemble habitual bailiwick organisations and in private companies that have dealings with mankind authorities. In essence it means that every individual regardless of age, depicted objectity or place of residence has a right by Law, to fuck what information is held about them within any public field organisation. (This request would be dealt with under the Data Protection bout as outlined above which dovetails into the FOIA.) The FOIA was also designed to inspection and repair the general public understand more fully how public organisations function, how they make their financial ( and other) decisions; how they spend public money and how they condense their official tasks and duties.(www.teachernet.gov.uk) The Act seeks to give public access to all recorded information by any public world of influence organisation on any issue or subject. moreover not all information may be allowed into the public domain as it may be affectionate fo! r any number of diverse reasons such as national security, babe protection issues,...If you want to get a full essay, put together it on our website: OrderEssay.net

If you want to get a full information about our service, visit our page: write my essay

1 comment:

  1. 8 principles penetrate security practice from the cloak protects data from 1998 and what we can know. friv 7

    ReplyDelete