EssaysForStudent.com - Free Essays, Term Papers & Book Notes
Search

The Data Protection Act Is Not Worth the Paper It Is Written on

By:   •  Essay  •  1,336 Words  •  December 10, 2009  •  1,027 Views

Page 1 of 6

Essay title: The Data Protection Act Is Not Worth the Paper It Is Written on

What is data protection and why is it important?

The increasing popularity of Internet brings us to a world of dilemmas. Pros of using it are well known, but there are many cons that diminish them. Some problems appeared in the last few decades and there is an urgent need to introduce legislation devoted to law and social issues taking into consideration this powerful medium. The times when hackers where breaching security systems of large corporations and government institutions just for their personal satisfaction faded into the past. Not only the reasons changed. Despite this, the awareness of utmost importance of this matter, people still don’t seam to realise what it brings. Their beliefs in system reliability combined with producers assurance make it even worse.

The new area with development of computer technology appeared to leadership of illegal activity. The majority of essential information e.g. such which are the trade secret of firm, are kept in electronic figure. In such case the safety of informative system can decide about overall opinion of institution, the position on market, or even about financial fluency. Information can be very attractive for competitive firms, or everyone who is able to use it in order to take advantage of them. Interest allows criminal groups to broaden areas of activity. It is noticeable that information system can not only improve company's operating, but it may become a serious threat.

We can safely estimate that nowadays every company, no matter how big it is, uses internet for marketing or communication purposes. It is closely related with our mentality. Even the best protected software and hardware will not do any good if several basic principles are not followed. Those rules are included in Data Protection Act 1998:

1. Personal data shall be processed fairly and lawfully

2. Personal data shall be obtained only for one or more specified and lawful purposes and shall not be further processed in any manner incompatible with those purposes

3. Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed

4. Personal data shall be accurate and, where necessary, kept up to date

5. Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes

6. Personal data shall be processed in accordance with the rights of data subjects under the act

7. Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.

8. Personal data shall not be transferred to a country or territory outside the European Economic Area, unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data

Data Protection policies are extremely important, but also subjective due to the fact that every company has different needs and collects data essential (usually) only to provide the most accurate services. Apart from the problem of variety of data which can be collected, it is impossible to develop one perfect solution, panacea, to fix all the issues as the system and hardware configurations can differ. On one side, professional security systems are expensive and not all companies opt for it - on the other side, losses could be even worse especially when customers decide to claim their rights in court.

Classification of the most often stolen data according to Kaspersky Report

Data Internet banking (Citibank, Bank of America, Washington Mutual, Wells Fargo, etc)

Credit/debit card services

Electronic transfers (E*TRADE, Schwab, TD AMERITRADE, PayPal)

Passwords Communicators (ICQ, MSN,)

WebPages (eBay, Amazon.com)

e-mail contact books

Game passwords (World of Warcraft)

In terms of cyber crime we can only take penetration into consideration, as Distributed Denial of Service (DDoS) is not aimed to gain any valuable piece of information, but to result in system unavailability or destruction.

Apocalypse Now?

Anticipated increase in cyber crimes

According to Computer Security Institute only

Download as (for upgraded members)  txt (8.4 Kb)   pdf (116.8 Kb)   docx (13.9 Kb)  
Continue for 5 more pages »