TITLE

WHEN PERSONAL INFO BECOMES PERSONAL DATA

AUTHOR(S)
Temperton, Ellen; Shamsee, Khurram
PUB. DATE
October 2007
SOURCE
People Management;10/4/2007, Vol. 13 Issue 20, p21
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article reports that Information Commissioner's Office has issued new guidance that will help employers to determine what documents they need to disclose when responding to subject access requests submitted under section 7 of the Data Protection Act 1998. The guidance provides a clear framework for employers to follow when assessing information for the purposes of responding to a subject access request.
ACCESSION #
27106068

 

Related Articles

  • THE IMPORTANCE OF DATA PROTECTION PROCESS IN THE SMALL AND MEDIUM ENTERPRISES. Saeed, Omar Hassan Mohamed // International Journal of Research & Reviews in Applied Sciences;2011, Vol. 6 Issue 2, p193 

    This title paper has a relation in some ways to the topic of (Managing Information Resources).This paper describes the new factors that have increased data protection risks; then demonstrate the small and midsize business's Data Protection hurt Points. It introduces some situations that if they...

  • Setting up a Secure Information System Using Information Security Management. Issa-Salwe, Abdisalam M. // International Journal of Research & Reviews in Computer Science;Jan2011, Vol. 2 Issue 1, p138 

    The security attention in information systems has grown in recent years according to their diffusion, the growing role they have in contexts in which they operate and their increasing complexity and exposure to possible attacks. This leads Information security not to be any longer a...

  • Behind the Scenes with RMS. Howie, John // Windows IT Pro;Feb2006, Vol. 12 Issue 2, p55 

    The article presents information on the Windows Rights Management Services (RMS), the solution of Microsoft Corp. for persistent data protection for business information. The features of the RMS are discussed. It explains how RMS can be used by business enterprises. Details of configuring and...

  • This intrusion is no test. Ollman, Gunter // SC Magazine: For IT Security Professionals (UK Edition);Apr2004, p29 

    This article presents the author's opinion on the need to focus attention on test environments, which are apparently considered a computer security weakness. When assessing the internal security of my clients, there is one area of their infrastructure and operational processes that continues to...

  • New Cabinet Office report highlights challenges facing government data handling procedures.  // IM@T.Online;Mar2010, p6 

    The article discusses a report titled Protecting Information in Government and challenges facing governmental data handling procedures in Great Britain. As stated, the Cabinet Office (CO) published the report which highlights future challenges in government data handling. Key sections of the...

  • Acxiom launches trio of software products. Mutel, Glen // Data Strategy;Dec2005/Jan2006, Vol. 2 Issue 3, p6 

    The article reports on the launch of several data protection software by Acxiom. The InfoBase Lifestyle Universe software has a capability to contain 380 pieces of information on more than 20 million individuals. The Personicx Financial software segments individuals and households as one of 50...

  • Post-release information privacy protection: A framework and next-generation privacy-enhanced operating system. Yanjun Zuo; O'Keefe, Timothy // Information Systems Frontiers;Nov2007, Vol. 9 Issue 5, p451 

    In today’s digital world, privacy issues have received widespread public attention. Current research on information privacy protection focuses on release control and subject identity obscurity. Little work has been done, however, to prevent a piece of private information from being...

  • Web hacker invasions continuing to threaten company computer data. Davis, Mary // Modern Bulk Transporter;Nov2004, Vol. 67 Issue 5, p41 

    The article presents information on web hacker invasions that is continuing to threaten company computer data. The Internet continues to evolve as an attack vector for hackers by employing tactics that trick both casual and corporate Web users into being victims of identity theft. According to...

  • An Optimized Program Analysis Based on Constraint Logic Programming. Xi Guo; Huanguo Zhang; Bo Zhao; Jing Li // Journal of Convergence Information Technology;May2012, Vol. 7 Issue 8, p177 

    Dynamic symbolic execution is the key technique in program security analysis. It has been widely used in the domain of test case generation, malware analysis, and vulnerability exploration. However, there are several problems in the process of dynamic symbolic execution, such as symbolic...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics