Unit 4 P6 Report

Submitted By cr96
Words: 773
Pages: 4

Unit 4 - P6

I am writing a report on the different forms of information that the college will keep on students and their staff, I will also look into what precautions the college takes to keep the information secure.
The Sheffield College protect student and staff data in many different ways. It has to follow the data protection act which 8 principles are as follows.
1. Personal data shall be processed fairly and lawfully and, in particular, shall not be processed unless

(a) at least one of the conditions in Schedule 2 is met, and

(b) in the case of sensitive personal data, at least one of the conditions in Schedule 3 is also met.
2. Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes.
3. Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed.
4. Personal data shall be accurate and, where necessary, kept up to date.
5. Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes.
6. Personal data shall be processed in accordance with the rights of data subjects under this Act.
7. Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.
8. Personal data shall not be transferred to a country or territory outside the European Economic Area unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data.
The college will also follow the computer misuse act which is in place to protect online data. This act is in place to prosecute offenders.
The Computer Misuse Act 1990 is an Act of the Parliament of the United Kingdom, introduced partly in response to the decision in R v Gold & Schifreen (1988) 1 AC 1063 (see below). Critics of the bill complained that it was introduced hastly and was poorly thought out.[who?] Intention, they said, was often difficult to prove, and that the bill inadequately differentiated "joyriding" hackers like Gold and Schifreen from serious computer criminals. The Act has nonetheless become a model from which several other countries, including Canada and the Republic of Ireland, have drawn inspiration when subsequently drafting their own information security laws, as it is seen "as a robust and flexible piece of legislation in terms of dealing with cybercrime”.
Staff members will be trained correctly to ensure data is processed correctly. This will include ensuring data is processed and stored safely.
Electronic information needs to be secure, college make all computer use secure by using passwords as well as limiting access to students. This ends misuse of information, once the information is printed onto paper based it is then stored in locked filing