SlideShare a Scribd company logo
1 of 27
Data Protection Act
Mohammad Iqbal Dilmahomed Bocus ID: 1102196
Gulshan Gunputh ID: 1102191
Legallant Dony ID:1102193
Bsc(Hons) IT Upgrade PT
Data Protection Act
Privacy of data in the age
of TECHNOLOGY
Information privacy, or data privacy is the relationship between collection
and dissemination of data, technology, the public expectation of privacy,
and the legal and political issues surrounding them
Reference from Wikipedia
What is Personal Data?
This can be defined as information that can identify a
living person and allow an opinion to be expressed
about that person.
Examples of sensitive personal data:
 Political and religious belief
 Racial and ethnic origin
 Membership of trade unions
 Details of sexual life
 Physical and mental health
Data Protection Act
Is a Law designed to protect
personal data
It applies to all data storage
media
Definition of Data Protection Act as a Law
Create RIGHTS:
for those who have their data stored
Make RESPONSIBLE:
for those who store and process the
data
Why we need Data Protection Act?
In this era of technology, the importance of having
our personal data at hand is fundamental.
At any time or anywhere, we need our personal data
to do transactions.
These sensitive data are stored on servers where
anybody can have access to it.
In order to protect ourselves and our data, the DPA
was passed to protect our privacy.
Purpose of the Data Protection Act
To control the way information
is handled and to give legal rights
to people who have information
stored about them.
Data Protection Principles
1. Personal data shall be processed fairly and
lawfully
• identity of the data controller must be known
• purpose for which the information is to be
processed should be clear
• Other information relevant in the circumstances
whereby the information pertaining to an individual
might be disclosed
Principles of Data Protection Act
2. Personal information shall be obtained only for one or
more specified purposes.
 What is meant by that is that the processing must not be
unsuited with the purpose it was originally intended for.
Principles of Data Protection Act (cont)
3. Personal data shall be Adequate, relevant and not excessive
The data controller should capture only the minimum amount
of personal information that is needed to fulfill the purpose of
the processing properly.
Principles of Data Protection Act (cont)
4. Personal Data shall be accurate and kept up-to-date
 This principle of the data protection act states that data which are out-
of-date are most likely to be regarded as excessive and irrelevant for
their purpose
 There are certain exceptions for this particular principle which include
the following:
 The data controller has taken reasonable steps to ensure privacy
 The information while inaccurate constitutes an accurate recorded
obtained from the person concerned
Principles of Data Protection Act (cont)
5. Personal Information shall not to be retained for more time than it
is required for processing
 In order for this principle to be successfully implemented, there is a
need for continuous appraisal of the information, as well as the
purpose of its collection. In some special circumstances, the data can
be retained after its processing based on the requirement of the
business needs.
Principles of Data Protection Act (cont)
6. Processing should be carried out in accordance to the right of
the data subjects
Here is a list of the rights of the data subjects:
 Right to access personal information
 Right to object to automated decision making
 Right to object to direct marketing
 Right to object to certain processing likely to cause damage
Principles of Data Protection Act (cont)
7. Personal data shall be kept secured
 The data controller takes the necessary precautions to safeguard data
against unauthorized access, processing, disclosure, damage or loss. The
data protection act takes into consideration two important factors:
1. Cost of the security measure with regards to the nature of the information
and the perceived harm that a security breach could cause
2. The state of the technological development at this time
Principles of Data Protection Act (cont)
8. Transfer of data to another country
The data protection act prevents private information to be
transferred to another country unless that country ensures an
adequate level of protection for the rights and freedom of data of
the subjects in relation to the processing of information of
personal data.
Definition of key words
 Data Subject
Data subjects, are the people who have data held about
them. Nowadays this includes you, me, everyone.
 Data Controller
A Data controller is the person, business or organization controlling the
collection, contents and use of personal data.
Definition of key words (cont)
 Data User
This is an authorized user within the organization or business
who is given an ID and password that enables them to access
data.
 Data processor
The data processor is a person, other than an employee of the
data controller, who has a written contract with the data
controller and who processes personal data on behalf of the data
controller.
Definition of key words (cont)
Commissioner
Mrs. Madhub is presently the commissioner in Mauritius. Her job is to:
 register all data controllers in Mauritius
 exercise control over all data processing activities in Mauritius
 investigate complaints
 undertake research in data processing and computer technology,
amongst others.
More information at http://dataprotection.gov.mu/
Data Protection Office [PMO]
The Data Protection Office runs under the aegis of the
Prime Minister's Office
The Data Protection Office is to safeguard the privacy
rights of all individuals with regard to the processing of
their personal data, in Mauritius.
During 2009 and 2010, the office has concentrated on the
registration of about 10000-15000 data controllers in
Mauritius
Statistics
With the growing awareness of the
existence of data protection laws, the
Investigation Unit has received 11
complaints as at end of December
2011.The Investigators have successfully
investigated 4 suspected cases of data
breach.
Case where the DPA has been breached in Mauritius
cont
 On 26th June 2010, Dr Richard L Munisamy made a statement to the
police at Point aux Canonniers station accusing Mr Sahrat Dutt Lallh, CEO
of Mauritius Telecom of contravening Section 29 of the Data Protection
Act
 According to a Mauritius Telecom employee, the private database of
Orange customers’ phone numbers had been released to the alliance de
l’avenir who had requested that Mauritius Telecom send a message to
subscribers soliciting their support in the general elections of may 2010.
Apparently, Mauritius telecom made no charge for this service. It is
understood that the case, OB732/10, has recently been transferred to
regional headquarters at Piton where the decision to prosecute will be
taken.
Data Protection Act in Mauritius
Data Protection Act 2004 came
into operation in February 2009.
Enforcement is through the
Data Protection Office.
Our Rights
 DPA gives everyone the right to see data that is held about them on a
computer system and to have it changed if it is wrong!
Offences and Penalties
Any person who contravenes the DPA shall commit
an offence.
Where no specific penalty is provided for an offence,
the person shall, on conviction, be liable to a fine not
exceeding 200,000 rupees and to imprisonment for a
term not exceeding 5 years.
Exceptions to the Law
There is some data you can't see.
If the data is held by the
police,
the security forces or the
Inland Revenue then access is denied.
Data protection act

More Related Content

What's hot

Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data SecurityWilmerHale
 
Kebijakan Perlindungan Data Pribadi Melalui RUU PDP
Kebijakan Perlindungan Data Pribadi Melalui RUU PDPKebijakan Perlindungan Data Pribadi Melalui RUU PDP
Kebijakan Perlindungan Data Pribadi Melalui RUU PDPUnggul Sagena
 
The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...
The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...
The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...ioannis iglezakis
 
Personal data protection bill
Personal data protection bill Personal data protection bill
Personal data protection bill Mathew Chacko
 
Urgensi RUU Perlindungan Data Pribadi
Urgensi RUU Perlindungan Data PribadiUrgensi RUU Perlindungan Data Pribadi
Urgensi RUU Perlindungan Data PribadiEryk Budi Pratama
 
Data protection ppt
Data protection pptData protection ppt
Data protection pptgrahamwell
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection ActSaimaRafiq
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologiessidra batool
 
Introduction to Information Management Chapter 1
Introduction toInformation Management Chapter 1Introduction toInformation Management Chapter 1
Introduction to Information Management Chapter 1KaleemSarwar2
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Qualsys Ltd
 

What's hot (20)

Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Data protection
Data protectionData protection
Data protection
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
 
An Overview of GDPR
An Overview of GDPR An Overview of GDPR
An Overview of GDPR
 
Kebijakan Perlindungan Data Pribadi Melalui RUU PDP
Kebijakan Perlindungan Data Pribadi Melalui RUU PDPKebijakan Perlindungan Data Pribadi Melalui RUU PDP
Kebijakan Perlindungan Data Pribadi Melalui RUU PDP
 
The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...
The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...
The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...
 
Personal data protection bill
Personal data protection bill Personal data protection bill
Personal data protection bill
 
Urgensi RUU Perlindungan Data Pribadi
Urgensi RUU Perlindungan Data PribadiUrgensi RUU Perlindungan Data Pribadi
Urgensi RUU Perlindungan Data Pribadi
 
GDPR infographic
GDPR infographicGDPR infographic
GDPR infographic
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
 
GDPR and Personal Data Transfers 1.1.pdf
GDPR and Personal Data Transfers 1.1.pdfGDPR and Personal Data Transfers 1.1.pdf
GDPR and Personal Data Transfers 1.1.pdf
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
 
GDPR
GDPRGDPR
GDPR
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
Introduction to Information Management Chapter 1
Introduction toInformation Management Chapter 1Introduction toInformation Management Chapter 1
Introduction to Information Management Chapter 1
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
E business fundamentals
E  business fundamentalsE  business fundamentals
E business fundamentals
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 

Viewers also liked

Industrial design [compatibility mode]
Industrial design [compatibility mode]Industrial design [compatibility mode]
Industrial design [compatibility mode]Delwin Arikatt
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theftAmber Gupta
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rightsharshhanu
 

Viewers also liked (6)

Industrial design [compatibility mode]
Industrial design [compatibility mode]Industrial design [compatibility mode]
Industrial design [compatibility mode]
 
IPR AND SOFTWARE PROTECTION
IPR AND SOFTWARE PROTECTIONIPR AND SOFTWARE PROTECTION
IPR AND SOFTWARE PROTECTION
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theft
 
Design act 2000
Design act 2000Design act 2000
Design act 2000
 
Intellectual Property Rights (IPR)
Intellectual Property Rights (IPR)Intellectual Property Rights (IPR)
Intellectual Property Rights (IPR)
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
 

Similar to Data protection act

Managing Data Protection guide powerpoint presentation
Managing Data Protection guide powerpoint presentationManaging Data Protection guide powerpoint presentation
Managing Data Protection guide powerpoint presentationsilvereyez11
 
Data privacy Legislation in India
Data privacy Legislation in IndiaData privacy Legislation in India
Data privacy Legislation in IndiaLATHA H C
 
My presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPRMy presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPRzayadeen2003
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11mrmwood
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_indiaAltacit Global
 
Bahrain-Personal-Data-Protection-Law.pdf
Bahrain-Personal-Data-Protection-Law.pdfBahrain-Personal-Data-Protection-Law.pdf
Bahrain-Personal-Data-Protection-Law.pdfDaviesParker
 
Safety And Security Of Data 4
Safety And Security Of Data 4Safety And Security Of Data 4
Safety And Security Of Data 4Wynthorpe
 
Data protection Act - Key Terms
Data protection Act -  Key TermsData protection Act -  Key Terms
Data protection Act - Key TermsDouglas Nderitu
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law Owako Rodah
 
How does GDPR Regulation help in Data Protection and Data Privacy?
How does GDPR Regulation help in Data Protection and Data Privacy?How does GDPR Regulation help in Data Protection and Data Privacy?
How does GDPR Regulation help in Data Protection and Data Privacy?TobyRobinson13
 
Uchi data local presentation 2020
Uchi data local presentation 2020Uchi data local presentation 2020
Uchi data local presentation 2020Christo W. Meyer
 
General data protection regulation - European union
General data protection regulation  - European unionGeneral data protection regulation  - European union
General data protection regulation - European unionRohana K Amarakoon
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)BenjaminShalevSalovi
 
iSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for IndiaiSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for IndiaProductNation/iSPIRT
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...Symantec
 
DATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptxDATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptxJaeKim165097
 

Similar to Data protection act (20)

Managing Data Protection guide powerpoint presentation
Managing Data Protection guide powerpoint presentationManaging Data Protection guide powerpoint presentation
Managing Data Protection guide powerpoint presentation
 
Data privacy Legislation in India
Data privacy Legislation in IndiaData privacy Legislation in India
Data privacy Legislation in India
 
My presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPRMy presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPR
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_india
 
Data protection
Data protectionData protection
Data protection
 
Bahrain-Personal-Data-Protection-Law.pdf
Bahrain-Personal-Data-Protection-Law.pdfBahrain-Personal-Data-Protection-Law.pdf
Bahrain-Personal-Data-Protection-Law.pdf
 
Safety And Security Of Data 4
Safety And Security Of Data 4Safety And Security Of Data 4
Safety And Security Of Data 4
 
Data protection Act - Key Terms
Data protection Act -  Key TermsData protection Act -  Key Terms
Data protection Act - Key Terms
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law
 
1307 Privacy Act
1307 Privacy Act1307 Privacy Act
1307 Privacy Act
 
How does GDPR Regulation help in Data Protection and Data Privacy?
How does GDPR Regulation help in Data Protection and Data Privacy?How does GDPR Regulation help in Data Protection and Data Privacy?
How does GDPR Regulation help in Data Protection and Data Privacy?
 
Uchi data local presentation 2020
Uchi data local presentation 2020Uchi data local presentation 2020
Uchi data local presentation 2020
 
General data protection regulation - European union
General data protection regulation  - European unionGeneral data protection regulation  - European union
General data protection regulation - European union
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Personal Data Protection in Malaysia
Personal Data Protection in MalaysiaPersonal Data Protection in Malaysia
Personal Data Protection in Malaysia
 
iSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for IndiaiSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for India
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
 
POPI Seminar FINAL
POPI Seminar FINALPOPI Seminar FINAL
POPI Seminar FINAL
 
DATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptxDATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptx
 

Recently uploaded

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Recently uploaded (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Data protection act

  • 1. Data Protection Act Mohammad Iqbal Dilmahomed Bocus ID: 1102196 Gulshan Gunputh ID: 1102191 Legallant Dony ID:1102193 Bsc(Hons) IT Upgrade PT
  • 2. Data Protection Act Privacy of data in the age of TECHNOLOGY Information privacy, or data privacy is the relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them Reference from Wikipedia
  • 3. What is Personal Data? This can be defined as information that can identify a living person and allow an opinion to be expressed about that person. Examples of sensitive personal data:  Political and religious belief  Racial and ethnic origin  Membership of trade unions  Details of sexual life  Physical and mental health
  • 4. Data Protection Act Is a Law designed to protect personal data It applies to all data storage media
  • 5. Definition of Data Protection Act as a Law Create RIGHTS: for those who have their data stored Make RESPONSIBLE: for those who store and process the data
  • 6. Why we need Data Protection Act? In this era of technology, the importance of having our personal data at hand is fundamental. At any time or anywhere, we need our personal data to do transactions. These sensitive data are stored on servers where anybody can have access to it. In order to protect ourselves and our data, the DPA was passed to protect our privacy.
  • 7. Purpose of the Data Protection Act To control the way information is handled and to give legal rights to people who have information stored about them.
  • 8. Data Protection Principles 1. Personal data shall be processed fairly and lawfully • identity of the data controller must be known • purpose for which the information is to be processed should be clear • Other information relevant in the circumstances whereby the information pertaining to an individual might be disclosed
  • 9. Principles of Data Protection Act 2. Personal information shall be obtained only for one or more specified purposes.  What is meant by that is that the processing must not be unsuited with the purpose it was originally intended for.
  • 10. Principles of Data Protection Act (cont) 3. Personal data shall be Adequate, relevant and not excessive The data controller should capture only the minimum amount of personal information that is needed to fulfill the purpose of the processing properly.
  • 11. Principles of Data Protection Act (cont) 4. Personal Data shall be accurate and kept up-to-date  This principle of the data protection act states that data which are out- of-date are most likely to be regarded as excessive and irrelevant for their purpose  There are certain exceptions for this particular principle which include the following:  The data controller has taken reasonable steps to ensure privacy  The information while inaccurate constitutes an accurate recorded obtained from the person concerned
  • 12. Principles of Data Protection Act (cont) 5. Personal Information shall not to be retained for more time than it is required for processing  In order for this principle to be successfully implemented, there is a need for continuous appraisal of the information, as well as the purpose of its collection. In some special circumstances, the data can be retained after its processing based on the requirement of the business needs.
  • 13. Principles of Data Protection Act (cont) 6. Processing should be carried out in accordance to the right of the data subjects Here is a list of the rights of the data subjects:  Right to access personal information  Right to object to automated decision making  Right to object to direct marketing  Right to object to certain processing likely to cause damage
  • 14. Principles of Data Protection Act (cont) 7. Personal data shall be kept secured  The data controller takes the necessary precautions to safeguard data against unauthorized access, processing, disclosure, damage or loss. The data protection act takes into consideration two important factors: 1. Cost of the security measure with regards to the nature of the information and the perceived harm that a security breach could cause 2. The state of the technological development at this time
  • 15. Principles of Data Protection Act (cont) 8. Transfer of data to another country The data protection act prevents private information to be transferred to another country unless that country ensures an adequate level of protection for the rights and freedom of data of the subjects in relation to the processing of information of personal data.
  • 16. Definition of key words  Data Subject Data subjects, are the people who have data held about them. Nowadays this includes you, me, everyone.  Data Controller A Data controller is the person, business or organization controlling the collection, contents and use of personal data.
  • 17. Definition of key words (cont)  Data User This is an authorized user within the organization or business who is given an ID and password that enables them to access data.  Data processor The data processor is a person, other than an employee of the data controller, who has a written contract with the data controller and who processes personal data on behalf of the data controller.
  • 18. Definition of key words (cont) Commissioner Mrs. Madhub is presently the commissioner in Mauritius. Her job is to:  register all data controllers in Mauritius  exercise control over all data processing activities in Mauritius  investigate complaints  undertake research in data processing and computer technology, amongst others. More information at http://dataprotection.gov.mu/
  • 19. Data Protection Office [PMO] The Data Protection Office runs under the aegis of the Prime Minister's Office The Data Protection Office is to safeguard the privacy rights of all individuals with regard to the processing of their personal data, in Mauritius. During 2009 and 2010, the office has concentrated on the registration of about 10000-15000 data controllers in Mauritius
  • 20. Statistics With the growing awareness of the existence of data protection laws, the Investigation Unit has received 11 complaints as at end of December 2011.The Investigators have successfully investigated 4 suspected cases of data breach.
  • 21. Case where the DPA has been breached in Mauritius
  • 22. cont  On 26th June 2010, Dr Richard L Munisamy made a statement to the police at Point aux Canonniers station accusing Mr Sahrat Dutt Lallh, CEO of Mauritius Telecom of contravening Section 29 of the Data Protection Act  According to a Mauritius Telecom employee, the private database of Orange customers’ phone numbers had been released to the alliance de l’avenir who had requested that Mauritius Telecom send a message to subscribers soliciting their support in the general elections of may 2010. Apparently, Mauritius telecom made no charge for this service. It is understood that the case, OB732/10, has recently been transferred to regional headquarters at Piton where the decision to prosecute will be taken.
  • 23. Data Protection Act in Mauritius Data Protection Act 2004 came into operation in February 2009. Enforcement is through the Data Protection Office.
  • 24. Our Rights  DPA gives everyone the right to see data that is held about them on a computer system and to have it changed if it is wrong!
  • 25. Offences and Penalties Any person who contravenes the DPA shall commit an offence. Where no specific penalty is provided for an offence, the person shall, on conviction, be liable to a fine not exceeding 200,000 rupees and to imprisonment for a term not exceeding 5 years.
  • 26. Exceptions to the Law There is some data you can't see. If the data is held by the police, the security forces or the Inland Revenue then access is denied.