TITLE

WHEN PERSONAL INFO BECOMES PERSONAL DATA

AUTHOR(S)
Temperton, Ellen; Shamsee, Khurram
PUB. DATE
October 2007
SOURCE
People Management;10/4/2007, Vol. 13 Issue 20, p21
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article reports that Information Commissioner's Office has issued new guidance that will help employers to determine what documents they need to disclose when responding to subject access requests submitted under section 7 of the Data Protection Act 1998. The guidance provides a clear framework for employers to follow when assessing information for the purposes of responding to a subject access request.
ACCESSION #
27106068

 

Related Articles

  • THE IMPORTANCE OF DATA PROTECTION PROCESS IN THE SMALL AND MEDIUM ENTERPRISES. Saeed, Omar Hassan Mohamed // International Journal of Research & Reviews in Applied Sciences;2011, Vol. 6 Issue 2, p193 

    This title paper has a relation in some ways to the topic of (Managing Information Resources).This paper describes the new factors that have increased data protection risks; then demonstrate the small and midsize business's Data Protection hurt Points. It introduces some situations that if they...

  • Behind the Scenes with RMS. Howie, John // Windows IT Pro;Feb2006, Vol. 12 Issue 2, p55 

    The article presents information on the Windows Rights Management Services (RMS), the solution of Microsoft Corp. for persistent data protection for business information. The features of the RMS are discussed. It explains how RMS can be used by business enterprises. Details of configuring and...

  • Acxiom launches trio of software products. Mutel, Glen // Data Strategy;Dec2005/Jan2006, Vol. 2 Issue 3, p6 

    The article reports on the launch of several data protection software by Acxiom. The InfoBase Lifestyle Universe software has a capability to contain 380 pieces of information on more than 20 million individuals. The Personicx Financial software segments individuals and households as one of 50...

  • Data consultation guide alerts firms to bogus agencies.  // Personnel Today;10/19/2004, p3 

    The article reports on the publishing of a data protection guide for small business by the Information Commissioner's Office (ICO), in an attempt to make compliance easier and alert companies of the ongoing scam involving bogus government agencies. The guide, "Getting it Right," aims to give...

  • Governing Data is First Step in Compliance. Ko, Judy // Database Trends & Applications;Oct2006, Vol. 20 Issue 10, p23 

    The article focuses on data governance which is referred to as the initial step in compliance. It is defined as the execution of strict standards, policies, processes and technologies which validate collection of data and recording the sources of data being reported. It deals with issues...

  • Post-release information privacy protection: A framework and next-generation privacy-enhanced operating system. Yanjun Zuo; O'Keefe, Timothy // Information Systems Frontiers;Nov2007, Vol. 9 Issue 5, p451 

    In today’s digital world, privacy issues have received widespread public attention. Current research on information privacy protection focuses on release control and subject identity obscurity. Little work has been done, however, to prevent a piece of private information from being...

  • CASE STUDY : Preventing the Ooops email.  // SC Magazine: For IT Security Professionals (15476693);May/Jun2014, Vol. 25 Issue 5, p22 

    The article describes a case concerning the launching by the North Wales Information Service Office (NWIS) of a security initiative in 2013. Topics discussed include the aim of the initiative to identify confidential data, the security of clinical messaging across a network, and the views of...

  • Setting up a Secure Information System Using Information Security Management. Issa-Salwe, Abdisalam M. // International Journal of Research & Reviews in Computer Science;Jan2011, Vol. 2 Issue 1, p138 

    The security attention in information systems has grown in recent years according to their diffusion, the growing role they have in contexts in which they operate and their increasing complexity and exposure to possible attacks. This leads Information security not to be any longer a...

  • The perils of outsourcing. Davies, Kerry // Computer Weekly;6/15/2004, p28 

    If personal details are held in a database in the Philippines, China has got NHS information and India controls the electricity supply, it may not be real life yet, but given the British government's willingness to place potentially critical, and certainly sensitive, information offshore, it is...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics