StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Ethics in computing or Data Protection Act - Research Paper Example

Cite this document
Summary
To protect data stored in the database that I developed, I ensured that I incorporated are wide range of security controls to help protect the database against compromises of confidentiality and integrity. In the database projects, I incorporated technical and procedural…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.4% of users find it useful
Ethics in computing or Data Protection Act
Read Text Preview

Extract of sample "Ethics in computing or Data Protection Act"

Data projection and ethics Data Protection Overview To protect data stored in the database that I developed, I ensured that I incorporated are wide range of security controls to help protect the database against compromises of confidentiality and integrity. In the database projects, I incorporated technical and procedural controls to protects that data from unauthorized access, malware infections, systems overloads, design flaws and data corruptions. These activities were carried out with the data protection act in mindData protection requires that comprehensive solution be availed for organizations and individuals to collect and store information in real reliable systems.

This requires safeguarding data through viable planning. This may require data reliable data back up and protection. These protections required for data are regulated by the data protection Act (1998). While these Acts seemed comprehensive at the time of legislation, they have come to show that there are a number of loop holes that can be exploited by various interest groups to achieve their ends (Strobl, Cave, &, Walley, 2000).My input and considerations According to Strobl, Cave, &, Walley, (2000), data protection is a regulation that places me in an awkward position while doing my project on data bases.

This act made it very important for me to ensure I introduce structures geared at protecting the information of the data subjects. To ensure that I never contravened the data protection Act or anybody using the databases does not override the data protection act, I ensured that the available controls provided by the existing file systems are upgraded and if possible combined to improve the level of security of the data (Per Arne Godejord, 2008). While this was not only focused on ensuring that the data inside were protected and that the data subjects rights are upheld, I had to ensure that I had in place proper structures for Access control and auditing.

However, I had to come up with plans to ensure that the authentication and encryption processes are always up to date. Updating the programs helped me maintain the integrity of the files.Though it is a requirement of the data protection act to ensure that, the personal data are fairly processed. I had to ensure that I carried out a vulnerability assessment and compliance. This is in line with the requirement of that Act that any personal data be processed in fair and lawful manners. Vulnerability assessment and compliance is important in ensuring that data are not processed against the wish of the data subject.

After assessing vulnerability, I also configured the original single factor authentication into a two-factor authentication process based on the value of the data stored in the database. Further to this, I also made sure that sensitive data were held in a maximum security. I have also ut in place structures for processing personal data and the limits for each person accessing personal data stored in the database (Akeroyd, 1991)Application securityApplication security is one of the main areas that i put a lot of effort in to ensure that the application s used in connection with the database do not overwrite the command and only execute the command given to them.

This security is important for ensuring that the information are safe. I also achieved this by ensuring that i incorporate security into the database development process (Per Arne Godejord, 2008). CountermeasuresDatabases are also vulnerable to threats and attacks. However, I ensured that I incorporated countermeasures geared at mitigating the risks of such activities. Even the strongest database with the most up to data firewalls is vulnerable to attacks and threats.BibliographyAkeroyd, A. V. (1991) Personal information and qualitative research data: Some practical and ethical problems arising from data protection legislation, in N. G. Fielding and R. Lee (eds) Using Computers in Qualitative Research, London: Sage Publications Ltd, pp. 89-106. Strobl, J., Cave, E. and Walley, T. (2000) Data protection legislation: interpretation and barriers to research, British Medical Journal 321(7261): 890-892.

Per Arne Godejord, (2008)."Getting Involved: Perspectives on the Use of True Projects as Tools for Developing Ethical Thinking in Computer Science Students," International Journal of Technology and Human Interaction 4.2 22-34

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Ethics in computing or Data Protection Act Research Paper”, n.d.)
Ethics in computing or Data Protection Act Research Paper. Retrieved from https://studentshare.org/miscellaneous/1591732-ethics-in-computing-or-data-protection-act
(Ethics in Computing or Data Protection Act Research Paper)
Ethics in Computing or Data Protection Act Research Paper. https://studentshare.org/miscellaneous/1591732-ethics-in-computing-or-data-protection-act.
“Ethics in Computing or Data Protection Act Research Paper”, n.d. https://studentshare.org/miscellaneous/1591732-ethics-in-computing-or-data-protection-act.
  • Cited: 0 times

CHECK THESE SAMPLES OF Ethics in computing or Data Protection Act

Research Exercise 5

Please do not exceed the word Each answer must include references to each article you have used to answer each question: The data Management Forum of the Storage Networking Industry Association (SNIA) has defined ILM as “a new set of management practices based on aligning the business value of information to the most appropriate and cost effective infrastructure” (info world.... ILM is a need based focused approach to value based data management.... Stage 2: Define your ILM Strategy: the concept behind this stage is to determine the value of data....
4 Pages (1000 words) Essay

Advice for Handling Potential Breaches of the Data Protection Act

Though her immediate supervision has assured her that this is not a… nor a breach of ethical compliance standards, she is concerned about the activity and is considering reporting INF to the data protection Commissioner.... Joan, a hypothetical employee of INF Ltd.... has discovered that information is being collected about various corporate officers and public officials who are employed by different publicly listed companies....
7 Pages (1750 words) Essay

The World of Computing in the Last Decade

The high level of usage of the internet has resulted in the growing… However with the numerous users comes the responsibility of establishing computing ethics, data protection and establishing regulations that allow access to free information It is important to develop regulations that serve to monitor, regulate and advocate for the various aspects of the computing world.... Ethics can be deemed a vital factor in the computing world, especially because of the high level of internet usage and children having an increased level of access to the internet, exposing them to the various contents that are presented on the internet....
4 Pages (1000 words) Coursework

Copyright, Trade Secrecy, and Patents as They Relate to Software

The copyright act of 1976 proposes five basic rights owned by a copyright owner (Tavani, 2011).... As with software, the laws enforce many forms of protection but only a few are used with strong aims.... Trade secrecy is another form of software protection, which allows the owner to determine where he is willing to sell his software in the world.... The rights formed by the law are consistent in providing full authority and protection to the owner....
4 Pages (1000 words) Term Paper

Interim Report ( for me )

??My research will comply with the data protection act (1998).... ??8 With respect to human participants or stakeholders, involve any deliberate deception, covert data collection or data collection without informed consent?... ??2Involve individuals aged 16 years of age and over who lack capacity to consent and will therefore fall under the Mental Capacity act (2005)?... ll research projects, including pilot studies, must receive research ethical approval prior to approaching participants and/or commencing data collection....
1 Pages (250 words) Assignment

Data Protection Legislation and a Satisfactory Balance

The paper “data protection Legislation and a Satisfactory Balance” will review the current data protection legislation and determine whether it maintains a satisfactory balance between the individual right to privacy and the interests of security managers.... The current UK legislation on the individual right to privacy and data protection is modeled around the EU directive on privacy and data protection principles issued by Directive 95/46/EC (Harris 2007)....
15 Pages (3750 words) Research Paper

Computer-Assisted Career Decision Making

Given the fact that IT professionals have access to vital data in the databases they keep, and also by the virtue of the work they do, there is need to address these issues of ethics in the field of IT.... It could also be argues that it is right for Joe to be taught and use this system because he will act as a backup when the manager concerned is not present.... Every professional must be taught on how to address this serious issue of ethics....
6 Pages (1500 words) Essay

Information Security, Identity Theft and Identity Fraud

A breach of confidentiality may arise when such information or data is handled in a manner that may lead to the disclosure of information to unauthorized people either through word of mouth, copying emailing, or forming other data forms like printing.... Authentication: This refers to the act of confirming the originality and truth of an attribute of an entity.... Non- repudiation, therefore, offers protection against anyone falsely denying taking part in some form of action....
8 Pages (2000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us