Managing data protection:
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | Undetermined |
Veröffentlicht: |
Oxford u.a.
Butterworth-Heinemann
1992
|
Ausgabe: | 2. ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | 458 S. |
ISBN: | 0750603550 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV008169782 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 930812s1992 |||| 00||| und d | ||
020 | |a 0750603550 |9 0-7506-0355-0 | ||
035 | |a (OCoLC)246720714 | ||
035 | |a (DE-599)BVBBV008169782 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | |a und | ||
049 | |a DE-355 |a DE-188 | ||
084 | |a QV 590 |0 (DE-625)142163: |2 rvk | ||
100 | 1 | |a Pounder, Chris |e Verfasser |4 aut | |
245 | 1 | 0 | |a Managing data protection |c Chris Pounder ; Freddy Kosten |
250 | |a 2. ed. | ||
264 | 1 | |a Oxford u.a. |b Butterworth-Heinemann |c 1992 | |
300 | |a 458 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Kosten, Freddy |e Verfasser |4 aut | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=005390551&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-005390551 |
Datensatz im Suchindex
_version_ | 1804122552896847872 |
---|---|
adam_text | Contents
Chapter One: Understanding the Act 1
1. The concept of Data Protection 1
2. A brief history of Data Protection in the UK 4
3. Part I of the Data Protection Act 12
3.4 Data 13
3.5 Personal Data 14
3.6 Data Subject 17
3.7 Data User 18
3.8 Computer Bureau 20
3.9 Processing 21
3.10 Not processing 23
3.11 Disclosing and transferring 24
4. Part II of the Data Protection Act 28
5. Part III of the Data Protection Act 34
6. Part IV of the Data Protection Act 36
7. Part V of the Data Protection Act 41
Chapter Two: Getting the Act together 42
1. Managing Data Protection 42
2. Outline of the work that needs to be done 47
3. Understanding and controlling the Registration process 52
3.1 Obtaining the information 52
3.2 The Register Entry format 54
3.3 The Part A form 57
3.4 The Part B form 59
3.5 Conclusion: general points and a Registration Map 64
Chapter Three: Registration: Policies, Problems and Pitfalls 68
1. The current requirement and its critics 68
2. Simple errors to avoid 71
3. The Register Entry and the facts it conveys 73
3.1 Checking accuracy and structure 73
3.2 The Entry and its message to Data Subjects 74
4. Amending or renewing a Register Entry: corrections; updates:
new systems coming on line 84
5. Amending a Register Entry: the basic structure 85
6. Criminal offences associated with Registration 86
Chapter Four: The Data Protection Principles 88
1. General 88
2. The Principles: their Interpretations; practical examples;
Procedural Review questions 92
2.1 The First Principle: 92
2.2 The Second Principle: 100
2.3 The Third Principle: 102
2.4 The Fourth Principle 105
2.5 The Fifth Principle: 107
2.6 The Sixth Principle: 110
2.7 The Seventh Principle 112
2.8 The Eighth Principle 113
3. The role of Auditors in ensuring compliance with the Principles 116
4. The role of the Registrar in ensuring compliance with the Principles 118
5. Prospects for change 119
Chapter Four(A): Subject Access 122
1. The legal basis 122
2. Experience of Subject Access 122
3. Subject Access: general considerations 123
4. Subject Access: detailed procedures 126
4.1 Receiving a Subject Access request 126
4.2 Identification of the type of enquiry 132
4.3 Identification of the Data Subject 134
4.4 Fee charged by the Data User 135
4.5 Information reasonably required to locate the data 137
4.6 Identifying and obtaining personal data held by the Data User 138
4.7 Preparing the personal data for dispatch 140
5. Challenges from the Data Subject 144
Chapter Four(B): Case Studies 149
1. First Principle: fair obtaining and fair processing 149
2. First, Third and Fourth Principles: statutory powers 154
3. Second and Third Principles: unlawful use or disclosure 158
4. Third Principle: unlawful disclosure 163
5. Fourth Principle: adequacy and relevance 170
6. Fifth Principle: accuracy 173
7. Fourth and Fifth Principles: vetting 178
8. Sixth Principle: retaining personal data 181
9. Seventh Principle: subject access, deletion and correction 184
10. Eighth Principle: security of personal data 188
Chapter Five: Codes of Practice; Council of Europe
Recommendations ig8
1. Introduction: Codes of Practice and Data Protection 198
1.1 Background 198
1.2 Policy of the Registrar 200
1.3 Forewords to Codes of Practice 202
1.4 Current activities 203
2. Employment records 205
2.1 Background 205
2.2 Council of Europe Recommendation 207
2.3 The IPM Code of Practice on Employee Data 209
3. Direct marketing 212
3.1 Background 212
3.2 Council of Europe Recommendation 213
3.3 The Advertising Association Code of Practice 214
4. Police sector 220
4.1 Council of Europe Recommendation 220
4.2 The ACPO Code of Practice 221
5. Research and Statistics 225
5.1 Background 225
5.2 Council of Europe Recommendation 226
5.3 The Government Statistical Service Code of Practice 228
6. The CSA Code of Practice for Computer Bureaux 230
7. Other Council of Europe Recommendations 232
Chapter Six: Staff Training 234
1. Introduction 234
2. Basic training for staff who use personal data 236
2.1 General 236
2.2 Text of a 75 minute basic training seminar 237
2.3 Text of a leaflet for employees 244
3. Specialist training 246
3.1 Emphasis on computer security (1 hour) 246
3.2 Emphasis on program design and data accuracy (1 hour) 247
3.3 Emphasis on management responsibilities (1 hour) 248
3.4 Responsibilities of Councillors or Board Members (1 hour) 249
3.5 Other specialist training requirements 250
4. Advanced training 253
4.1 Introduction 253
4.2 Training a Departmental Liaison Team / Data protection Officer 253
Chapter Seven: Exemptions Understood 261
1. Introduction 261
2. Section 27: National security 263
2.1 Text of Section 27: 263
2.2 Comment: 263
3. Section 28: Crime and taxation 265
3.1 Text of Section 28: 265
3.2 Comment: 266
4. Section 29: Health and Social Work 273
4.1 Text of Section 29: 273
4.2 Background 274
4.3 Comment: the Social Work Order 276
4.4 Comment: the Health Order 279
4.5 Health and Social Work personal data:
some problems in common 282
4.6 Other relevant statutes or guidelines 286
5. Section 30: Regulation of financial services, etc 289
5.1 Text of Section 30 of the Data Protection Act (1984) 289
5.2 Text of Section 190 of the Financial Services Act (1986) 289
5.3 Comment: 290
6. Section 31: Judicial appointments and legal professional privilege 291
6.1 Text of Section 31: 291
6.2 Comment: 291
7. Section 32: Payrolls and accounts 291
7.1 Text of Section 32: 291
7.2 Comment: 293
8. Section 33: Domestic or other limited purposes 297
8.1 Text of Section 33: 297
8.2 Comment: 299
9. Section 34: Other exemptions 302
9.1 Text of Section 34: 302
9.2 Comment: 304
10. Section 35: Examination marks 307
10.1 Text of Section 35: 307
10.2 Comment: 308
10.3 Student records held by schools in manual files 309
Chapter Eight: Computer Security 312
1. Introduction 312
2. Security implications in detail 314
3. Computer Bureaux security and the Data Protection Act 320
4. The Computer Misuse Act 1990: a security enforcement aid 323
5. The Police and Criminal Evidence Act 1984: Sections 68 and 69 325
6. Security training for staff 328
7. A draft Computer security statement for staff 328
8. A draft Computer security statement for managers 331
Chapter Nine: Need for a Change? 334
1. Data protection: why should I worry? 334
2. The Data Protection Act: a Data Subject s critique 339
3. Annual reports from the Data Protection Registrar 349
4. Proposals for change (European Commission) 354
5. Proposals for change (Home Office) 363
6. Proposals for change (Data Protection Registrar) 368
7. Proposals for change (Labour Party) 371
Appendix 1: DATA PROTECTION NEWS 373
Appendix 2: The Disclosure of Personal Data 393
Appendix 3: Data Protection and the Auditor 400
Appendix 4: Data Protection and Software Design 414
Appendix 5: Data Protection Census Form 426
Appendix 6: Transborder Data Flow 434
INDEX 441
|
any_adam_object | 1 |
author | Pounder, Chris Kosten, Freddy |
author_facet | Pounder, Chris Kosten, Freddy |
author_role | aut aut |
author_sort | Pounder, Chris |
author_variant | c p cp f k fk |
building | Verbundindex |
bvnumber | BV008169782 |
classification_rvk | QV 590 |
ctrlnum | (OCoLC)246720714 (DE-599)BVBBV008169782 |
discipline | Wirtschaftswissenschaften |
edition | 2. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01204nam a2200337 c 4500</leader><controlfield tag="001">BV008169782</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">930812s1992 |||| 00||| und d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0750603550</subfield><subfield code="9">0-7506-0355-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)246720714</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV008169782</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">und</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QV 590</subfield><subfield code="0">(DE-625)142163:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Pounder, Chris</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Managing data protection</subfield><subfield code="c">Chris Pounder ; Freddy Kosten</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Oxford u.a.</subfield><subfield code="b">Butterworth-Heinemann</subfield><subfield code="c">1992</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">458 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kosten, Freddy</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=005390551&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-005390551</subfield></datafield></record></collection> |
id | DE-604.BV008169782 |
illustrated | Not Illustrated |
indexdate | 2024-07-09T17:15:42Z |
institution | BVB |
isbn | 0750603550 |
language | Undetermined |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-005390551 |
oclc_num | 246720714 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-188 |
owner_facet | DE-355 DE-BY-UBR DE-188 |
physical | 458 S. |
publishDate | 1992 |
publishDateSearch | 1992 |
publishDateSort | 1992 |
publisher | Butterworth-Heinemann |
record_format | marc |
spelling | Pounder, Chris Verfasser aut Managing data protection Chris Pounder ; Freddy Kosten 2. ed. Oxford u.a. Butterworth-Heinemann 1992 458 S. txt rdacontent n rdamedia nc rdacarrier Datenschutz (DE-588)4011134-9 gnd rswk-swf Datenschutz (DE-588)4011134-9 s DE-604 Kosten, Freddy Verfasser aut HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=005390551&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Pounder, Chris Kosten, Freddy Managing data protection Datenschutz (DE-588)4011134-9 gnd |
subject_GND | (DE-588)4011134-9 |
title | Managing data protection |
title_auth | Managing data protection |
title_exact_search | Managing data protection |
title_full | Managing data protection Chris Pounder ; Freddy Kosten |
title_fullStr | Managing data protection Chris Pounder ; Freddy Kosten |
title_full_unstemmed | Managing data protection Chris Pounder ; Freddy Kosten |
title_short | Managing data protection |
title_sort | managing data protection |
topic | Datenschutz (DE-588)4011134-9 gnd |
topic_facet | Datenschutz |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=005390551&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT pounderchris managingdataprotection AT kostenfreddy managingdataprotection |