Nobody downloaded yet

Law in relation to Data Protection - Essay Example

Comments (0) Cite this document
Summary
Handling of different Data is a complicated issue. Perhaps, one would say that data exist for references and similar functions. In dealing with data, there are a lot of factors to consider. The classification of it perhaps should not be taken for granted as there are data that are vital to everybody's knowledge which is called public data and there are data that should be kept confidential as they do contain delicate information that could harm or malign those who own it if someone manages to secure such information…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.9% of users find it useful
Law in relation to Data Protection
Read TextPreview

Extract of sample "Law in relation to Data Protection"

Download file to see previous pages In the present set-up of the society, a lot of people's data are misused by others for money laundering, loans, misrepresentations and other similar occurrences which sometimes creates unfavorable scenario those who owns such data. In doing such, the people who handle data must realize that they are the ones who are being trusted to keep such variables and their primary concern is to keep those as confidential as possible.
The case of Creative is no different from the aforementioned premise as they deal with numerous data from the people who in one way or the other factors for them to generate income. In this case, they must bear in mind that they should be responsible in storing and keeping such entries. Also, the awareness of Creative that they are accountable to the law should there be cases of leakage and mishandlings of data.
In dealing with similar occurrences, the example of Creative computers suggests that this company has the freehand of access of data from both the buyers and sellers of the computers. Upon reviewing their process of data, one might say that Creative Computers is organized in sorting the information of data from the buyer and seller which is a practical way of referencing. In this case, the data would help Creative computers track transactions that entered the company and therefore it is very crucial to have these kinds of data. Also, several factors including the profile of the person who sells the computer unit is a vital data for Creative Computers as this kind of practice assures them that the quality and the origin of the computer units to be sold. It is a common thought that computers do not have serial numbers and they are not subject for registration like vehicles in which in case of loss and similar instances could be traced down because of its plate numbers.
The move of creative company to obtain details from the two parties would also help them locate the sellers if in case there are problems that would arise-instances such as warranty concerns, theft and other related phenomenon are of big help in resolving these kinds of problems. The sorting out of data is indeed a good step for the sake of classification which would prevent confusion in the future should there be changes in the company or with these two parties.







However, in handling these data, there are a lot of queries that are in need of answers. There are things that are needed to be clarified in order to ensure that the data that are being obtained are kept within the prescribed bounds of law. On the second thought, Creative Computers must be aware that there would come a time that problems might arise with regards to handling of data.
There are scenarios that might confuse Creative Computers with regards to handling of Data. For example, a certain customer who bought the computer from the seller wishes to obtain the information from the seller as police authorities accused the latter as involved in fencing as it was known to them that the computer set was stolen. The problem is, does creative computers owns the right of divulging the information to the buyer
Another scenario would be there is a mistake committed by the seller as he sold the other item rather than the intended one. To be able to obtain the computer set ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Law in relation to Data Protection Essay Example | Topics and Well Written Essays - 1250 words”, n.d.)
Law in relation to Data Protection Essay Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/miscellaneous/1530730-law-in-relation-to-data-protection
(Law in Relation to Data Protection Essay Example | Topics and Well Written Essays - 1250 Words)
Law in Relation to Data Protection Essay Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/miscellaneous/1530730-law-in-relation-to-data-protection.
“Law in Relation to Data Protection Essay Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/miscellaneous/1530730-law-in-relation-to-data-protection.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Law in relation to Data Protection

Protection of data

...? Protection of Data in Email Communication TASK ONE IFICATION OF EXPLOITING EMAIL SYSTEMS To protect any information technology infrastructure it is necessary to have proper and sufficient security measures such as installation of security devices, configuration of firewall software, implementation of security protocols, and practices of safe and sound procedures. The content of emails and the path through which they travel to reach the destined address are one the most common security threats nowadays (Voltage 2011) Appendix 1 illustrates the interaction amongst various devices used in infrastructure to move emails from place to place around the world. There are number of organizers and...
10 Pages(2500 words)Essay

Information Sensitivity and Data Protection

...?TRICARE - Information Sensitivity and Data Protection Military Health System (MHS) maintains the highest standard of information assurance (IA) for TRICARE. The network and information systems’ security measures and patient’s data and info protection efforts, are in compliance with the information IA policies, standards and guidance, issued by the Department of Defense (DoD) (Department of Defense, 2009). All TRICARE operations of information collection, storage, transmission and processing are in accordance with DoD Information Technology System Certification and Accreditation Process (DITSCA). Thus, TRICARE operates in a standardized secure environment that offers...
1 Pages(250 words)Essay

Personal Data Protection

...to Canada as the European community does protect data received from other countries. The European commission decided to take a comprehensive view during the drafting of the personal data protection laws rather than focusing on certain selective issues (Fromholz, 2000, 1-6). However, much has been done to protect personal data from whichever source, especially when considering the new provisions in the Privacy Commissioner’s Guidelines. Other countries, especially in Africa have weaker legislations on personal data as compared to that of Canada, although; much is currently being done to control that,...
3 Pages(750 words)Assignment

The Data Protection Act

...Health taking and the Data protection Act The Data Protection Act defines a legal basis for the handling in the UK of information relating to living people. Recording data is just as necessary and important as gathering data. Significant facts should be so recorded that they can be used when and where they are needed. Records must be cumulative, accurate, complete and reliable; there must be space for additional information from time to time. The cumulative record has information concerned with the appraisal of the individual pupil usually kept on a card, sheet, folder, cards in an envelop, or a combination of...
4 Pages(1000 words)Essay

Data Protection

...Intervention in Private Spheres of Activity for their Intended Public Interest January 18, Data Protection is one of the primary issues in the information society where new technologies have emerged posing new threats to privacy. However, with new technology, advanced ways of facilitating protection have also helped Governments of different countries carefully design explicit legislation to control privacy protection. Surely maintaining the balance between the need for privacy and data protection, on the one hand, and law enforcement, on the other, is no easy task. The tension between the right to privacy,...
12 Pages(3000 words)Essay

Principles of Data Privacy & Protection

...Is genetic profiling changing the scope of Data Privacy and Protection 26 February 2006 The of this paper questions whether genetic profiling is changing the scope of data privacy and protection. This is an important question, as current privacy and protection laws with regards to personal and private data, are not sufficient to cover genetic data. Data privacy and protection laws are broad and can be contradictory when it comes to protecting our rights with regards to genetic material. The argument is centred on the fact that genetic...
20 Pages(5000 words)Essay

Data Protection Regulation and control

...Introduction Data protection has become very important and relevant in the face of increased global rates of fraud and cyber crime. To counter the negative effects of fraud, it is imperative that, organizations come up with data protection policies aimed at curbing data misuse. By establishing a well crafted data protection policy, a company must bear in mind the nature of data, the nature of threat at hand, as well as the resources at its disposal. Data protection refers to the concept, which deals with sharing of data related to...
2 Pages(500 words)Essay

LAW OF CONSUMER PROTECTION

...Law of Consumer Protection Introduction The agreements between Vic and Funky Furniture and Friendly Finance all turn on the questions of contracts for the sale of goods, misrepresentation and the legal consequences of the sale of goods under a hire purchase agreement. The legal consequences of each of these elements determine the extent to which Vic may expect consumer protection and the measure of remedial action she can expect to take for the loss and damages incurred pursuant to each of these agreements. Vic will be advised in two parts. First the possibility of and consequences of misrepresentation will be evaluated and discussed. Then the consequences for recovering and claiming...
10 Pages(2500 words)Essay

Data Protection and privacy

...an institution be called of breach in giving a person’s pertinent data if ever they are liable. People have really grown out of their freedom shell as human right propagators and enthusiasts have culminated for the right of a person to data protection and privacy. What is data protection? It is the area of the law that governs what may, and what may not, be done with confidential information obtained. Personal information is in various forms, it may be in electronic form such as the ones stored on a computer hard drive or in manual form or the written forms. Furthermore data protection...
4 Pages(1000 words)Essay

Cryptology and Data Protection

...in the position should be held accountable (Olzak, 2006). References Akdeniz, Y., Oram, A., Kelman, A., & Clarke, O. (2015). Electronic Law Journals - JILT 1997 (2) - Akdeniz et al.. Www2.warwick.ac.uk. Retrieved 26 April 2015, from http://www2.warwick.ac.uk/fac/soc/law/elj/jilt/1997_2/akdeniz/ Burgess, M. (2008). Analytical network and system administration: managing human-computer networks: John Wiley and Sons Chandra, D. V. (2009). Principles of Computer Systems and Network Management: Springer Chida, K., Kobayashi, T., Fujioka, A., Fuji, H., Miyazawa, T., & Hoshino, F. (2015). Cryptographic Techniques that Combine Data Protection and Ease of Utilization in the Cloud...
5 Pages(1250 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Law in relation to Data Protection for FREE!

Contact Us