COMPUTER THREATS SECURITY
COMPUTER SECURITY POLICIES EXAMPLES
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Computer Misuse Act
|
|
Data Protection Act
|
|
Health and Safety at Work
|
|
Copyright
|
Detailed explanation-1: -The GDPR further states that the organization collecting data should ensure it’s accurate and updated as necessary. Under GDPR, companies can’t legally process any person’s personally identifiable information (PII) without meeting at least one of the following six conditions. express consent of the data subject.
Detailed explanation-2: -Under the Data Protection Act 2018, you have the right to find out what information the government and other organisations store about you. These include the right to: be informed about how your data is being used. access personal data.
Detailed explanation-3: -The Data Protection Act 1998 (’the Act’) regulates how and when information relating to individuals may be obtained, used and disclosed. The Act also allows individuals access to personal data relating to them, to challenge misuse of it and to seek redress.
Detailed explanation-4: -Information Technology Act, 2000 (’the IT Act’), Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 (’the SPDI Rules’);
Detailed explanation-5: -On 18 November 2022, the Government of India released the long awaited fourth draft of India’s proposed privacy law, now renamed as the Digital Personal Data Protection Bill (’Bill’). The Government has sought for feedback on the draft Bill by 17 December 2022. At first glance, the Bill is quite a surprise.