SlideShare una empresa de Scribd logo
1 de 15
The Data Protection Act 1998
Why the Data Protection Act was developed? ,[object Object]
lay down rules about “how data about people can be used?”The Data Protection Act (1998) states that organizations which store personal information must register and state the purpose for which they need the information.
The data protection act covers: Information or data stored on a computer or an organized paper filing system about living people in different departments such as:  Tax Office Doctor / Dentist National Insurance DVLC(Driver and Vehicle Licensing Centre) Police etc
How the Act works (basics): by setting up rules that people have to follow having an Information Commissioner to enforce the rules It does not stop companies storing information about people. It just makes them follow rules.
Who's involved? The Information Commissioner ,  	the person (and her office) who has powers to  	enforce the Act. A data controller , a person or company  	that collects and keeps data about people. A data subjectis someone who has data about 	them stored somewhere, outside their direct control.
Registration with the Information Commissioner  Any organization or person who needs to store personal information must apply to register with the Information Commissioner. A register of data controllers is kept detailing the data that will be stored so they have to say in advance what information will be stored and how they will use it. Each register entry contains the following information: The data controller's name and address. A description of the information to be stored. What they are going to use the information for. Whether the data controller plans to pass on the information to other people or organizations. Whether the data controller will transfer the information outside the UK. Details of how the data controller will keep the information safe and secure.
Personal data and information Some data and information stored on computer disks is personal and needs to be kept confidential. Such as pay, bank details, and medical records. 	If someone who is not entitled to see these details can obtain access without permission it is unauthorized access.  The Data Protection Act sets up rules to prevent this  	kind of unauthorized access to personal data and  	information.
Types of Personal Data The Act sets up two types of personal data: Personal data is about living people and could be: their name address medical details or banking details 'Sensitive' personal data is also about living people, but it includes one or more details of a data subject's: racial or ethnic origin political opinions religion membership of a trade union health sexual life criminal activity 	There are more safeguards about sensitive data than ordinary personal data. Usually, a person must be asked specifically if sensitive data can be kept.
Responsibilities of data controllers All data controllers must keep to the Eight Principles of Data Protection. 	a data controller is the nominated person in a company who applies to the data commissioner for permission to store and use personal data.
The Eight Principles For the personal data that controllers store and process: Data must be kept secure;  Data stored must be relevant;  Data stored must be kept no longer than necessary;  Data stored must be kept accurate and up-to-date; Data must be obtained and processed lawfully; Data must be processed within the data subject rights; Data must be obtained and specified for lawful purposes; Data must not be transferred to countries without adequate data protection laws.
The rights of data subjects People whose personal data is stored are called data subjects.  The Act sets up rights for people who have data kept about them.
Peoples' rights A Right of Subject Access A data subject has a right to be supplied by a data controller with the personal data held about him or her. The data controller can charge for this: usually a few pounds. A Right of Correction A data subject may force a data controller to correct any mistakes in the data held about them. A Right to Prevent Distress 	A data subject may prevent the use of information if it would be likely to cause them distress. A Right to Prevent Direct Marketing 	A data subject may stop their data being used in attempts to sell them things (eg by junk mail or cold telephone calls.) A Right to Prevent Automatic Decisions A data subject may specify that they do not want a data user to make "automated" decisions about them where, through points scoring, a computer decides on, for example, a loan application. A Right of Complaint to the Information Commissioner A data subject can ask for the use of their personal data to be reviewed by the Information Commissioner who can enforce a ruling using the Act. The Commissioner may inspect a controller's computers to help in the investigation. A Right to Compensation The data subject is entitled to use the law to get compensation for damage caused ("damages") if personal data about them is inaccurate, lost, or disclosed.
What data is exempt from the Act? There are some complete exemptions and some partial exemptions where personal data is not covered by the 1998 Act.
Complete exemptions Any personal data that is held for a national security reason is not covered.  Personal data held for domestic purposes only at home, eg a list of your friends' names, birthdays and addresses does not have to keep to the rules.

Más contenido relacionado

La actualidad más candente

Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issues
Sagar Rahurkar
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_india
Altacit Global
 

La actualidad más candente (20)

Data protection
Data protectionData protection
Data protection
 
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104 Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104
Chapter 08 – Data Protection, Privacy and Freedom of Information - BIT IT5104
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issues
 
Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPR
 
GDPR Presentation
GDPR PresentationGDPR Presentation
GDPR Presentation
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
 
Privacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital WorldPrivacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital World
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slides
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
 
Digital personal data protection act, 2023.pptx
Digital personal data protection act, 2023.pptxDigital personal data protection act, 2023.pptx
Digital personal data protection act, 2023.pptx
 
GDPR
GDPRGDPR
GDPR
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
 
Gdpr presentation
Gdpr presentationGdpr presentation
Gdpr presentation
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
 
An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill An overview of the Indian Data Privacy Bill
An overview of the Indian Data Privacy Bill
 
Overview on data privacy
Overview on data privacy Overview on data privacy
Overview on data privacy
 
Personal Data Protection in Malaysia
Personal Data Protection in MalaysiaPersonal Data Protection in Malaysia
Personal Data Protection in Malaysia
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_india
 
The California Consumer Privacy Act (CCPA)
The California Consumer Privacy Act (CCPA)The California Consumer Privacy Act (CCPA)
The California Consumer Privacy Act (CCPA)
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 

Destacado

Data protection act
Data protection act Data protection act
Data protection act
Iqbal Bocus
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
mlw32785
 
5 Graphics Units
5 Graphics Units5 Graphics Units
5 Graphics Units
lees_ush
 
Computer Legislation2 T2
Computer Legislation2  T2Computer Legislation2  T2
Computer Legislation2 T2
lees_ush
 
Law-Exchange.co.uk Shared Resource
Law-Exchange.co.uk Shared ResourceLaw-Exchange.co.uk Shared Resource
Law-Exchange.co.uk Shared Resource
lawexchange.co.uk
 
ISACA Journal Data Protection Act (UK) and GAPP Alignment
ISACA Journal Data Protection Act (UK) and GAPP AlignmentISACA Journal Data Protection Act (UK) and GAPP Alignment
ISACA Journal Data Protection Act (UK) and GAPP Alignment
Mohammed J. Khan
 
Law-Exchange.co.uk Shared Resource
Law-Exchange.co.uk Shared ResourceLaw-Exchange.co.uk Shared Resource
Law-Exchange.co.uk Shared Resource
lawexchange.co.uk
 

Destacado (20)

Data protection act
Data protection act Data protection act
Data protection act
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information Security
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Data Protection (Download for slideshow)
Data Protection (Download for slideshow)
 
Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 
EU Medical Device Clinical Research under the General Data Protection Regulation
EU Medical Device Clinical Research under the General Data Protection RegulationEU Medical Device Clinical Research under the General Data Protection Regulation
EU Medical Device Clinical Research under the General Data Protection Regulation
 
What is Internet Monitoring?
What is Internet Monitoring?What is Internet Monitoring?
What is Internet Monitoring?
 
Using the Freedom of Information Act
Using the Freedom of Information ActUsing the Freedom of Information Act
Using the Freedom of Information Act
 
The principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - ukThe principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - uk
 
Internet Censorship at Linux Day 2013, Antonio Pescapè
Internet Censorship at Linux Day 2013, Antonio PescapèInternet Censorship at Linux Day 2013, Antonio Pescapè
Internet Censorship at Linux Day 2013, Antonio Pescapè
 
What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...
 
5 Graphics Units
5 Graphics Units5 Graphics Units
5 Graphics Units
 
Securing your azure web app with asp.net core data protection
Securing your azure web app with asp.net core data protectionSecuring your azure web app with asp.net core data protection
Securing your azure web app with asp.net core data protection
 
Regulations and Legislation for E-Commerce in the UK
Regulations and Legislation for E-Commerce in the UKRegulations and Legislation for E-Commerce in the UK
Regulations and Legislation for E-Commerce in the UK
 
Computer Legislation2 T2
Computer Legislation2  T2Computer Legislation2  T2
Computer Legislation2 T2
 
Law-Exchange.co.uk Shared Resource
Law-Exchange.co.uk Shared ResourceLaw-Exchange.co.uk Shared Resource
Law-Exchange.co.uk Shared Resource
 
Law for bloggers and journalists (UK)
Law for bloggers and journalists (UK)Law for bloggers and journalists (UK)
Law for bloggers and journalists (UK)
 
ISACA Journal Data Protection Act (UK) and GAPP Alignment
ISACA Journal Data Protection Act (UK) and GAPP AlignmentISACA Journal Data Protection Act (UK) and GAPP Alignment
ISACA Journal Data Protection Act (UK) and GAPP Alignment
 
Law-Exchange.co.uk Shared Resource
Law-Exchange.co.uk Shared ResourceLaw-Exchange.co.uk Shared Resource
Law-Exchange.co.uk Shared Resource
 

Similar a The Data Protection Act

3e - Data Protection
3e - Data Protection3e - Data Protection
3e - Data Protection
MISY
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11
mrmwood
 
Ch 17 data protections act
Ch 17 data protections actCh 17 data protections act
Ch 17 data protections act
Khan Yousafzai
 
What You Need To Know About Privacy Now!
What You Need To Know About Privacy   Now!What You Need To Know About Privacy   Now!
What You Need To Know About Privacy Now!
catherinecoulter
 
What You Need To Know About Privacy Now!
What You Need To Know About Privacy   Now!What You Need To Know About Privacy   Now!
What You Need To Know About Privacy Now!
catherinecoulter
 

Similar a The Data Protection Act (20)

Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)
 
GDPR Whitepaper
GDPR WhitepaperGDPR Whitepaper
GDPR Whitepaper
 
Safety And Security Of Data 4
Safety And Security Of Data 4Safety And Security Of Data 4
Safety And Security Of Data 4
 
3e - Data Protection
3e - Data Protection3e - Data Protection
3e - Data Protection
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11
 
Bahrain-Personal-Data-Protection-Law.pdf
Bahrain-Personal-Data-Protection-Law.pdfBahrain-Personal-Data-Protection-Law.pdf
Bahrain-Personal-Data-Protection-Law.pdf
 
Legislation
LegislationLegislation
Legislation
 
Ch 17 data protections act
Ch 17 data protections actCh 17 data protections act
Ch 17 data protections act
 
LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...
LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...
LAWYER IN VIETNAM DR OLIVER MASSMANN NEW DRAFT DECREE ON PERSONAL DATA PROTEC...
 
What You Need To Know About Privacy Now!
What You Need To Know About Privacy   Now!What You Need To Know About Privacy   Now!
What You Need To Know About Privacy Now!
 
What You Need To Know About Privacy Now!
What You Need To Know About Privacy   Now!What You Need To Know About Privacy   Now!
What You Need To Know About Privacy Now!
 
Privacy - USC 2005
Privacy - USC 2005Privacy - USC 2005
Privacy - USC 2005
 
GDPR: Are you EU Compliant?
GDPR: Are you EU Compliant? GDPR: Are you EU Compliant?
GDPR: Are you EU Compliant?
 
Gdpr in a nutshell
Gdpr in a nutshellGdpr in a nutshell
Gdpr in a nutshell
 
Asia Counsel Insights May 2023
Asia Counsel Insights May 2023Asia Counsel Insights May 2023
Asia Counsel Insights May 2023
 
POPI Seminar FINAL
POPI Seminar FINALPOPI Seminar FINAL
POPI Seminar FINAL
 
NEW DECREE ON PERSONAL DATA PROTECTION AND CROSS-BORDER PROVISION OF DATA THE...
NEW DECREE ON PERSONAL DATA PROTECTION AND CROSS-BORDER PROVISION OF DATA THE...NEW DECREE ON PERSONAL DATA PROTECTION AND CROSS-BORDER PROVISION OF DATA THE...
NEW DECREE ON PERSONAL DATA PROTECTION AND CROSS-BORDER PROVISION OF DATA THE...
 
CHINA PIP LAW ppt.pptx
CHINA PIP LAW ppt.pptxCHINA PIP LAW ppt.pptx
CHINA PIP LAW ppt.pptx
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
Complete Guide to General Data Protection Regulation (GDPR)
Complete Guide to General Data Protection Regulation (GDPR)Complete Guide to General Data Protection Regulation (GDPR)
Complete Guide to General Data Protection Regulation (GDPR)
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 

The Data Protection Act

  • 2.
  • 3. lay down rules about “how data about people can be used?”The Data Protection Act (1998) states that organizations which store personal information must register and state the purpose for which they need the information.
  • 4. The data protection act covers: Information or data stored on a computer or an organized paper filing system about living people in different departments such as: Tax Office Doctor / Dentist National Insurance DVLC(Driver and Vehicle Licensing Centre) Police etc
  • 5. How the Act works (basics): by setting up rules that people have to follow having an Information Commissioner to enforce the rules It does not stop companies storing information about people. It just makes them follow rules.
  • 6. Who's involved? The Information Commissioner , the person (and her office) who has powers to enforce the Act. A data controller , a person or company that collects and keeps data about people. A data subjectis someone who has data about them stored somewhere, outside their direct control.
  • 7. Registration with the Information Commissioner Any organization or person who needs to store personal information must apply to register with the Information Commissioner. A register of data controllers is kept detailing the data that will be stored so they have to say in advance what information will be stored and how they will use it. Each register entry contains the following information: The data controller's name and address. A description of the information to be stored. What they are going to use the information for. Whether the data controller plans to pass on the information to other people or organizations. Whether the data controller will transfer the information outside the UK. Details of how the data controller will keep the information safe and secure.
  • 8. Personal data and information Some data and information stored on computer disks is personal and needs to be kept confidential. Such as pay, bank details, and medical records. If someone who is not entitled to see these details can obtain access without permission it is unauthorized access. The Data Protection Act sets up rules to prevent this kind of unauthorized access to personal data and information.
  • 9. Types of Personal Data The Act sets up two types of personal data: Personal data is about living people and could be: their name address medical details or banking details 'Sensitive' personal data is also about living people, but it includes one or more details of a data subject's: racial or ethnic origin political opinions religion membership of a trade union health sexual life criminal activity There are more safeguards about sensitive data than ordinary personal data. Usually, a person must be asked specifically if sensitive data can be kept.
  • 10. Responsibilities of data controllers All data controllers must keep to the Eight Principles of Data Protection. a data controller is the nominated person in a company who applies to the data commissioner for permission to store and use personal data.
  • 11. The Eight Principles For the personal data that controllers store and process: Data must be kept secure; Data stored must be relevant; Data stored must be kept no longer than necessary; Data stored must be kept accurate and up-to-date; Data must be obtained and processed lawfully; Data must be processed within the data subject rights; Data must be obtained and specified for lawful purposes; Data must not be transferred to countries without adequate data protection laws.
  • 12. The rights of data subjects People whose personal data is stored are called data subjects. The Act sets up rights for people who have data kept about them.
  • 13. Peoples' rights A Right of Subject Access A data subject has a right to be supplied by a data controller with the personal data held about him or her. The data controller can charge for this: usually a few pounds. A Right of Correction A data subject may force a data controller to correct any mistakes in the data held about them. A Right to Prevent Distress A data subject may prevent the use of information if it would be likely to cause them distress. A Right to Prevent Direct Marketing A data subject may stop their data being used in attempts to sell them things (eg by junk mail or cold telephone calls.) A Right to Prevent Automatic Decisions A data subject may specify that they do not want a data user to make "automated" decisions about them where, through points scoring, a computer decides on, for example, a loan application. A Right of Complaint to the Information Commissioner A data subject can ask for the use of their personal data to be reviewed by the Information Commissioner who can enforce a ruling using the Act. The Commissioner may inspect a controller's computers to help in the investigation. A Right to Compensation The data subject is entitled to use the law to get compensation for damage caused ("damages") if personal data about them is inaccurate, lost, or disclosed.
  • 14. What data is exempt from the Act? There are some complete exemptions and some partial exemptions where personal data is not covered by the 1998 Act.
  • 15. Complete exemptions Any personal data that is held for a national security reason is not covered. Personal data held for domestic purposes only at home, eg a list of your friends' names, birthdays and addresses does not have to keep to the rules.
  • 16. Partial exemptions Some personal data has partial exemption from the rules of the Act. The main examples of this are: The taxman or police do not have to disclose information held or processed to prevent crime or taxation fraud. Criminals cannot see their police files. Tax or VAT investigators do not have to show people their files. A data subject has no right to see information stored about him if it is to do with his/her health. This allows doctors to keep information from patients if they think it is in their best interests. A school pupil has no right of access to personal files, or to exam results before publication. A data controller can keep data for any length of time if it is being used for statistical, historical or research purposes. Some research by journalists and academics is exempt if it is in the public interest or does not identify individuals. Employment references written by a previous employer are exempt. Planning information about staff in a company is exempt, as it may damage the business to disclose it.