0% found this document useful (0 votes)
56 views2 pages

Hacking

The document discusses encryption and the Data Protection Act. It notes that without encryption, a hacker could intercept and read emails or steal personal details like credit card numbers. The Data Protection Act sets rules for how organizations collect and store personal data about individuals. It gives individuals rights over their data and requires that data be securely stored, only used for the purpose specified, and allows individuals to access and correct any inaccurate data. Organizations must comply with the Data Protection Act when collecting and handling individuals' personal information.

Uploaded by

api-267050797
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views2 pages

Hacking

The document discusses encryption and the Data Protection Act. It notes that without encryption, a hacker could intercept and read emails or steal personal details like credit card numbers. The Data Protection Act sets rules for how organizations collect and store personal data about individuals. It gives individuals rights over their data and requires that data be securely stored, only used for the purpose specified, and allows individuals to access and correct any inaccurate data. Organizations must comply with the Data Protection Act when collecting and handling individuals' personal information.

Uploaded by

api-267050797
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

More Encryption

Gaining unauthorised access to a computer system.


Gaining authorised access to a system but accessing area
without permission.
May lead to illegally coping / deleting / changing data from a
system.

What happens if you dont use encryption protection?


A hacker could simply intercept and read your emails.
A hacker could alter or collect personal details including credit card
numbers which could be used to commit fraud.
Drawbacks:
Data can still be deleted from the system.
Criminals can use encryption to keep incriminating material secure.

The Data Protection Act:


1)

It sets out rules for people who use or store data about living
people and gives rights to those people whose data has been
collected. The law applies to data held on computers or any
sort of storage system, even paper records. The law covers
personal data which are facts like your address, telephone
number, e-mail address, job history etc. People who use the
information are called data users. People who the data is about

2)

are called data providers.


The Data Protection Act (DPA) is a law passed by the British
government in 1984 and updated in 1998.

3)

The main points of the Data Protection Act are:

If you collect data about people for one reason, you must not use
it for a different reason;
You must not give people's data to other people or organizations
unless they agree;
People have the right to look at data that any organizations store
about them;
You must not keep the data for longer than you need to and it
must be kept up to date;
You must not send the data to places outside of the European
Economic Area unless adequate levels of protection exist;
Organizations that store data about people must register with
the Information Commissioners Office;
If you store data about people you must make sure that it is
secure and well protected;
If an organization has data about you that is wrong, then you have
a right to ask them to change it.

You might also like