SlideShare una empresa de Scribd logo
1 de 23
DATA PROTECTION AND
PRIVACY
TEAM MEMBERS
KINJAL METHA
KARNITA SHAH
HIMANSHU JAIN
AAYuSH ADUkIA
CHINTAN SANGHAVI
CONTENTS
1. DEFINITIONS...................................................................................................................................3
2. DATA PROTECTION V/S PRIVACY..............................................................................................4
3. NEED OF DATA PROTECTION.....................................................................................................5
4. CYBER SECURITY...........................................................................................................................7
CLASSIFICATION OF CYBER SECURITY
PREVENTIVE MEASURES
CASE STUDY
5. METHODS OF DATA PROTECTION............................................................................................11
ENCRYPTION OF DATA
SSL
FIREWALL
ANTISPYWARE AND ANTIVIRUS
OTHER MEASURES
6. SPDI RULES....................................................................................................................................16
7.HOW TO LOGDE A COMPLAINT IN CASE OF CYBER CRIME....................................................17
8.Penal Provisions Relating To Data Protection Laws In India.................................................18
Definitions
• Data protection
It is the process of safeguarding important
information from corruption and loss.
• Privacy
It is the ability of an individual or organization to
determine what data in a communication
system can be shared with third party.
Data protection v/s privacy
Data protection
• Securing data from
unauthorized access
• Technical issue
• USA
• Identifying rules and
practices regarding
collection processing of
personal information.
Privacy
• Authorized access who
has it and who defines
it
• Legal issue
Need of data protection
Need of data protection
WHAT IS CYBER SECURITY?
Cyber security is the body of
technologies, processes and practices
designed to protect networks, computers,
programs and data from attack, damage
or unauthorized access.
CLASSIFICATION OF CYBER CRIMES
Against
persons
Against
Property
Against
Society
• E-mail Spoofing
• Hacking
• Cyber Squatting
• Cyber Trespass
• Child
Pornography
• Financial Crimes
SOME IMPORTANT PREVENTIVE MEASURES
• Identification of exposures through education will
assist responsible companies and firms to meet these
challenges.
• One should avoid disclosing any personal information
to strangers via e-mail or while chatting.
• One must avoid sending any photograph to strangers
by online as misusing of photograph incidents
increasing day by day.
CASE STUDY
• Worm Attack: The Robert Tappan Morris well Known as
First Hacker, Son of former National Security Agency
Scientist Robert Morris, was the first person to be prosecuted
under the ‘Computer and Fraud Act, 1986’. He has created
worm while at Cornell as student claiming that he intended to
use the worm to check how large the internet was that time.
The worm was uncontrollable due to which around 6000
computer machines were destroyed and many computers were
shut down until they had completely malfunctioned. He was
ultimately sentenced to three years probation, 400 hours of
community service and assessed a fine of $10500. So there
must be strict laws to punish the criminals who are involved in
cyber crime activities.
METHODS OF DATAPROTECTION
1. Encryption of data
Conversion of plain text into
cipher text is called encryption.
Decryption means to translate
convert
cipher text into plain text.
Even if hacker obtain the
encrypted data , he cannot
understand
the information.
2. SSL (Secure Sockets Layer)
Secure Sockets Layer is the standard security technology for
establishing an encrypted link between a web server and a
browser.
This link ensures that all data passed between the web server
and browsers remain private and integral.
Hello, let’s set up a secure SSL session
01010010110 l 01010010110
Here is a one time, encryption key for our session
Server decrypts session ley using its Private key
and establishes a secure session.
1st
2nd
3nd
3. FIREWALL
A firewall is a network security device that monitors incoming and
outgoing network traffic and decides whether to allow or block specific
traffic based on a defined set of security rules.
Packet Filter:
Looks at each packet entering or
leaving the network and accepts or rejects it
based on user-defined rules
Proxy Server:
Intercepts all messages entering
and leaving the network
Application-layer firewalls:
Recognize when certain applications and protocols
such as HTTP, FTP and DNS -- are being
misused.
4. ANTIVIRUS & ANTISPYWARE
Anti-spyware software is a type of
program designed to prevent and
detect unwanted spyware program
installations.
Anti-virus software is a software utility that
detects, prevents, and removes viruses,
worms, and other malware from the
computer.
5. Other necessary steps
1. Do Background checks.
2. Atleast 2 reference for new employee.
3. Use strong passwords and change the frequently.
4. Stopping usage of cracked or hacked application.
SPDI RULES
• Sensitive personal data or information
• Body corporate to provide policy for
privacy and disclosure of information
• Collection of information
• Disclosure of information
• Transfer of information
• Reasonable Security Practices and
Procedures
HOW TO LODGE A
COMPLAINT IN CASE OF A
CYBER CRIME
FILE A COMPLAINT IN THE CYBER
BRANCH
PROVIDE DETAILS
SUBMIT REQUIRED DOCUMENTS
Penal Provisions Relating To Data
Protection Laws In India
• Section 43A- Failure To Protect Data
Damages by way of compensation –
1) unto Rs.5 cores (adjudicating officer)
2) above Rs.5 cores (civil court)
• Section 65- Hacking/Tampering
Imprisonment unto 3 years or fine unto Rs.2 lakh or
both.
• Section 66C- Identity Theft
Imprisonment unto 3 years and fine unto Rs.1 lakh.
• Section 66E-Violation Of Privacy
Imprisonment unto 3 years or fine unto 2 lakhs or
both.
• Section 67C - Preservation And Retention Of
Information By Intermediaries
Imprisonment up to 3 years.
• Section 72-Breach Of Confidentiality And Privacy
Imprisonment up to 2 years or fine up to 1
lakh or both.
• Section 72A- Disclosure Of information In breach Of
lawful Contract
Imprisonment unto 3 years or fine up to
5 lakhs or both.
•Data protection and its privacy plays the crucial role
for the survival of the companies.
•Traditionally it was difficult to maintain and save
the data and records from unfaithful employees in
the organization but due to advanced backup and
privacy facilities of data , the job got much easier.
•Each and every organization's fortune and its
survival depends on its data protection and its
privacy policy as it becomes tedious job to record the
data again and again on its deletion.
CONCLUSION
BIBLOGRAPHY
http://www.sirhow.com/cyber-crime-complaint-online-in-india/
http://www.wipo.int/edocs/lexdocs/laws/en/in/in098en.pdf
http://googleweblight.com/?lite_url=http://mobile.smallbusinesscomputing.com/webmaster/arti
cle.php/3908811/15-Data-Security-Tips-to-Protect-Your-Small-
Business.htm&ei=NHx5_DPU&lc=en-
IN&s=1&m=682&host=www.google.co.in&ts=1484047412&sig=AF9NedlLM1iX3Rm_bUAnmw1nE
rfRlnRyJg
THANKYOU

Más contenido relacionado

La actualidad más candente

Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsAT Internet
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologiessidra batool
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data SecurityWilmerHale
 
General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...Cvent
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theftAmber Gupta
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentationmlw32785
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation tomasztopa
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyThoughtworks
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection ActSaimaRafiq
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - EnglishData Security
 
Data Protection in India
Data Protection in IndiaData Protection in India
Data Protection in IndiaHome
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issuesSagar Rahurkar
 

La actualidad más candente (20)

Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...
 
Privacy and Data Protection
Privacy and Data ProtectionPrivacy and Data Protection
Privacy and Data Protection
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theft
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
Data protection
Data protectionData protection
Data protection
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny Leroy
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Privacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital WorldPrivacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital World
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
 
GDPR
GDPRGDPR
GDPR
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
 
Data Protection in India
Data Protection in IndiaData Protection in India
Data Protection in India
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issues
 

Destacado

Protect Your Data Now
Protect Your Data NowProtect Your Data Now
Protect Your Data NowJay Gotra
 
Internet, belager van mijn privacy
Internet, belager van mijn privacyInternet, belager van mijn privacy
Internet, belager van mijn privacyGene Vangampelaere
 
7 critical steps to protect your data
7 critical steps to protect your data7 critical steps to protect your data
7 critical steps to protect your dataSafeSpaceOnline
 
Recent Privacy and Data Protection Developments in Latin America and Their Im...
Recent Privacy and Data Protection Developments in Latin America and Their Im...Recent Privacy and Data Protection Developments in Latin America and Their Im...
Recent Privacy and Data Protection Developments in Latin America and Their Im...Cédric Laurant
 
Slides van webinar Privacy by Design: leerling centraal
Slides van webinar Privacy by Design: leerling centraalSlides van webinar Privacy by Design: leerling centraal
Slides van webinar Privacy by Design: leerling centraalKennisnet
 
Data Collection and Presentation
Data Collection and PresentationData Collection and Presentation
Data Collection and PresentationCarlos Erepol
 
Data protection and privacy framework in the design of learning analytics sys...
Data protection and privacy framework in the design of learning analytics sys...Data protection and privacy framework in the design of learning analytics sys...
Data protection and privacy framework in the design of learning analytics sys...Tore Hoel
 
gdpr - avg algemene introductie voor marketeers
gdpr - avg algemene introductie voor marketeersgdpr - avg algemene introductie voor marketeers
gdpr - avg algemene introductie voor marketeersThe CMR Agency
 
EU General Data Protection Regulation
EU General Data Protection RegulationEU General Data Protection Regulation
EU General Data Protection RegulationRamiro Cid
 
Cours CyberSécurité - CyberGuerre & CyberTerrorisme
Cours CyberSécurité - CyberGuerre & CyberTerrorismeCours CyberSécurité - CyberGuerre & CyberTerrorisme
Cours CyberSécurité - CyberGuerre & CyberTerrorismeFranck Franchin
 
Pervasive computing and its Security Issues
Pervasive computing and its Security IssuesPervasive computing and its Security Issues
Pervasive computing and its Security IssuesPhearin Sok
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive ComputingAnkita Gupta
 

Destacado (17)

Protect Your Data Now
Protect Your Data NowProtect Your Data Now
Protect Your Data Now
 
DATA PRIVACY
DATA PRIVACYDATA PRIVACY
DATA PRIVACY
 
Levensloop kortrijk - Social Media in de praktijk - Privacy & mediawijsheid
Levensloop kortrijk - Social Media in de praktijk - Privacy & mediawijsheidLevensloop kortrijk - Social Media in de praktijk - Privacy & mediawijsheid
Levensloop kortrijk - Social Media in de praktijk - Privacy & mediawijsheid
 
Internet, belager van mijn privacy
Internet, belager van mijn privacyInternet, belager van mijn privacy
Internet, belager van mijn privacy
 
7 critical steps to protect your data
7 critical steps to protect your data7 critical steps to protect your data
7 critical steps to protect your data
 
Recent Privacy and Data Protection Developments in Latin America and Their Im...
Recent Privacy and Data Protection Developments in Latin America and Their Im...Recent Privacy and Data Protection Developments in Latin America and Their Im...
Recent Privacy and Data Protection Developments in Latin America and Their Im...
 
Ad hoc Networks
Ad hoc NetworksAd hoc Networks
Ad hoc Networks
 
Slides van webinar Privacy by Design: leerling centraal
Slides van webinar Privacy by Design: leerling centraalSlides van webinar Privacy by Design: leerling centraal
Slides van webinar Privacy by Design: leerling centraal
 
Data Collection and Presentation
Data Collection and PresentationData Collection and Presentation
Data Collection and Presentation
 
Personal Data Protection in Malaysia
Personal Data Protection in MalaysiaPersonal Data Protection in Malaysia
Personal Data Protection in Malaysia
 
Data protection and privacy framework in the design of learning analytics sys...
Data protection and privacy framework in the design of learning analytics sys...Data protection and privacy framework in the design of learning analytics sys...
Data protection and privacy framework in the design of learning analytics sys...
 
gdpr - avg algemene introductie voor marketeers
gdpr - avg algemene introductie voor marketeersgdpr - avg algemene introductie voor marketeers
gdpr - avg algemene introductie voor marketeers
 
EU General Data Protection Regulation
EU General Data Protection RegulationEU General Data Protection Regulation
EU General Data Protection Regulation
 
Cours CyberSécurité - CyberGuerre & CyberTerrorisme
Cours CyberSécurité - CyberGuerre & CyberTerrorismeCours CyberSécurité - CyberGuerre & CyberTerrorisme
Cours CyberSécurité - CyberGuerre & CyberTerrorisme
 
Pervasive computing and its Security Issues
Pervasive computing and its Security IssuesPervasive computing and its Security Issues
Pervasive computing and its Security Issues
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 

Similar a Data protection and privacy

University Security Policy and Usage Document
University Security Policy and Usage DocumentUniversity Security Policy and Usage Document
University Security Policy and Usage DocumentRyan Hughes
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET Journal
 
Securing Mobile Data using Cryptography
Securing Mobile Data using CryptographySecuring Mobile Data using Cryptography
Securing Mobile Data using CryptographyEswar Publications
 
IRJET - Improving Password System using Blockchain
IRJET - Improving Password System using BlockchainIRJET - Improving Password System using Blockchain
IRJET - Improving Password System using BlockchainIRJET Journal
 
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...The Constrained Method of Accessibility and Privacy Preserving Of Relational ...
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...IJERA Editor
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsSagar Rahurkar
 
Azstec cyber-security-workbook
Azstec cyber-security-workbookAzstec cyber-security-workbook
Azstec cyber-security-workbookYulia Dianova
 
Information Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using GoogleInformation Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using GoogleHemraj Singh Chouhan
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)scobycakau
 
RFC 2196 Site Security Handbook
RFC 2196 Site Security HandbookRFC 2196 Site Security Handbook
RFC 2196 Site Security HandbookDavid Sweigert
 
SGSB Webcast 2 : Smart grid and data security
SGSB Webcast 2 : Smart grid and data securitySGSB Webcast 2 : Smart grid and data security
SGSB Webcast 2 : Smart grid and data securityAndy Bochman
 
Refer the attached docs to understand Min 250 wordsSelect O.docx
Refer the attached docs to understand Min 250 wordsSelect O.docxRefer the attached docs to understand Min 250 wordsSelect O.docx
Refer the attached docs to understand Min 250 wordsSelect O.docxlorent8
 
Troy tech 640 507 ccna 2.0 edt.3
Troy tech 640 507 ccna 2.0 edt.3Troy tech 640 507 ccna 2.0 edt.3
Troy tech 640 507 ccna 2.0 edt.3rickybcool
 
Security and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptxSecurity and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptxTRSrinidi
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in IndonesiaEryk Budi Pratama
 
Id 00153639 md. mahbub alom_nsc_assignment_march-16
Id 00153639 md. mahbub alom_nsc_assignment_march-16Id 00153639 md. mahbub alom_nsc_assignment_march-16
Id 00153639 md. mahbub alom_nsc_assignment_march-16University of Greenwich
 
Lo6 student book 1 notes
Lo6 student book 1 notesLo6 student book 1 notes
Lo6 student book 1 notesBreach_P
 
IRJET - Providing High Securtiy for Encrypted Data in Cloud
IRJET -  	  Providing High Securtiy for Encrypted Data in CloudIRJET -  	  Providing High Securtiy for Encrypted Data in Cloud
IRJET - Providing High Securtiy for Encrypted Data in CloudIRJET Journal
 
Select ONE of the following security incidents and provide the f.docx
Select ONE of the following security incidents and provide the f.docxSelect ONE of the following security incidents and provide the f.docx
Select ONE of the following security incidents and provide the f.docxlvernon1
 

Similar a Data protection and privacy (20)

University Security Policy and Usage Document
University Security Policy and Usage DocumentUniversity Security Policy and Usage Document
University Security Policy and Usage Document
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
 
Securing Mobile Data using Cryptography
Securing Mobile Data using CryptographySecuring Mobile Data using Cryptography
Securing Mobile Data using Cryptography
 
IRJET - Improving Password System using Blockchain
IRJET - Improving Password System using BlockchainIRJET - Improving Password System using Blockchain
IRJET - Improving Password System using Blockchain
 
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...The Constrained Method of Accessibility and Privacy Preserving Of Relational ...
The Constrained Method of Accessibility and Privacy Preserving Of Relational ...
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber frauds
 
Azstec cyber-security-workbook
Azstec cyber-security-workbookAzstec cyber-security-workbook
Azstec cyber-security-workbook
 
Information Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using GoogleInformation Technology act 2000 & Threats to India using Google
Information Technology act 2000 & Threats to India using Google
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)
 
RFC 2196 Site Security Handbook
RFC 2196 Site Security HandbookRFC 2196 Site Security Handbook
RFC 2196 Site Security Handbook
 
SGSB Webcast 2 : Smart grid and data security
SGSB Webcast 2 : Smart grid and data securitySGSB Webcast 2 : Smart grid and data security
SGSB Webcast 2 : Smart grid and data security
 
Refer the attached docs to understand Min 250 wordsSelect O.docx
Refer the attached docs to understand Min 250 wordsSelect O.docxRefer the attached docs to understand Min 250 wordsSelect O.docx
Refer the attached docs to understand Min 250 wordsSelect O.docx
 
Troy tech 640 507 ccna 2.0 edt.3
Troy tech 640 507 ccna 2.0 edt.3Troy tech 640 507 ccna 2.0 edt.3
Troy tech 640 507 ccna 2.0 edt.3
 
Security and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptxSecurity and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptx
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in Indonesia
 
Id 00153639 md. mahbub alom_nsc_assignment_march-16
Id 00153639 md. mahbub alom_nsc_assignment_march-16Id 00153639 md. mahbub alom_nsc_assignment_march-16
Id 00153639 md. mahbub alom_nsc_assignment_march-16
 
Lo6 student book 1 notes
Lo6 student book 1 notesLo6 student book 1 notes
Lo6 student book 1 notes
 
IRJET - Providing High Securtiy for Encrypted Data in Cloud
IRJET -  	  Providing High Securtiy for Encrypted Data in CloudIRJET -  	  Providing High Securtiy for Encrypted Data in Cloud
IRJET - Providing High Securtiy for Encrypted Data in Cloud
 
Ijetr021264
Ijetr021264Ijetr021264
Ijetr021264
 
Select ONE of the following security incidents and provide the f.docx
Select ONE of the following security incidents and provide the f.docxSelect ONE of the following security incidents and provide the f.docx
Select ONE of the following security incidents and provide the f.docx
 

Último

哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查ydyuyu
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdfMatthew Sinclair
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsMonica Sydney
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Roommeghakumariji156
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理F
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...kajalverma014
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理F
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsPriya Reddy
 
Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...
Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...
Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...MOHANI PANDEY
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
 
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime BalliaBallia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Balliameghakumariji156
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...kumargunjan9515
 
一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理F
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoilmeghakumariji156
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfJOHNBEBONYAP1
 
PIC Microcontroller Structure & Assembly Language.ppsx
PIC Microcontroller Structure & Assembly Language.ppsxPIC Microcontroller Structure & Assembly Language.ppsx
PIC Microcontroller Structure & Assembly Language.ppsxjeykeydeveloper
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查ydyuyu
 

Último (20)

哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
 
Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...
Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...
Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime BalliaBallia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
 
一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
PIC Microcontroller Structure & Assembly Language.ppsx
PIC Microcontroller Structure & Assembly Language.ppsxPIC Microcontroller Structure & Assembly Language.ppsx
PIC Microcontroller Structure & Assembly Language.ppsx
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 

Data protection and privacy

  • 1. DATA PROTECTION AND PRIVACY TEAM MEMBERS KINJAL METHA KARNITA SHAH HIMANSHU JAIN AAYuSH ADUkIA CHINTAN SANGHAVI
  • 2. CONTENTS 1. DEFINITIONS...................................................................................................................................3 2. DATA PROTECTION V/S PRIVACY..............................................................................................4 3. NEED OF DATA PROTECTION.....................................................................................................5 4. CYBER SECURITY...........................................................................................................................7 CLASSIFICATION OF CYBER SECURITY PREVENTIVE MEASURES CASE STUDY 5. METHODS OF DATA PROTECTION............................................................................................11 ENCRYPTION OF DATA SSL FIREWALL ANTISPYWARE AND ANTIVIRUS OTHER MEASURES 6. SPDI RULES....................................................................................................................................16 7.HOW TO LOGDE A COMPLAINT IN CASE OF CYBER CRIME....................................................17 8.Penal Provisions Relating To Data Protection Laws In India.................................................18
  • 3. Definitions • Data protection It is the process of safeguarding important information from corruption and loss. • Privacy It is the ability of an individual or organization to determine what data in a communication system can be shared with third party.
  • 4. Data protection v/s privacy Data protection • Securing data from unauthorized access • Technical issue • USA • Identifying rules and practices regarding collection processing of personal information. Privacy • Authorized access who has it and who defines it • Legal issue
  • 5. Need of data protection
  • 6. Need of data protection
  • 7. WHAT IS CYBER SECURITY? Cyber security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.
  • 8. CLASSIFICATION OF CYBER CRIMES Against persons Against Property Against Society • E-mail Spoofing • Hacking • Cyber Squatting • Cyber Trespass • Child Pornography • Financial Crimes
  • 9. SOME IMPORTANT PREVENTIVE MEASURES • Identification of exposures through education will assist responsible companies and firms to meet these challenges. • One should avoid disclosing any personal information to strangers via e-mail or while chatting. • One must avoid sending any photograph to strangers by online as misusing of photograph incidents increasing day by day.
  • 10. CASE STUDY • Worm Attack: The Robert Tappan Morris well Known as First Hacker, Son of former National Security Agency Scientist Robert Morris, was the first person to be prosecuted under the ‘Computer and Fraud Act, 1986’. He has created worm while at Cornell as student claiming that he intended to use the worm to check how large the internet was that time. The worm was uncontrollable due to which around 6000 computer machines were destroyed and many computers were shut down until they had completely malfunctioned. He was ultimately sentenced to three years probation, 400 hours of community service and assessed a fine of $10500. So there must be strict laws to punish the criminals who are involved in cyber crime activities.
  • 11. METHODS OF DATAPROTECTION 1. Encryption of data Conversion of plain text into cipher text is called encryption. Decryption means to translate convert cipher text into plain text. Even if hacker obtain the encrypted data , he cannot understand the information.
  • 12. 2. SSL (Secure Sockets Layer) Secure Sockets Layer is the standard security technology for establishing an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browsers remain private and integral. Hello, let’s set up a secure SSL session 01010010110 l 01010010110 Here is a one time, encryption key for our session Server decrypts session ley using its Private key and establishes a secure session. 1st 2nd 3nd
  • 13. 3. FIREWALL A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules. Packet Filter: Looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules Proxy Server: Intercepts all messages entering and leaving the network Application-layer firewalls: Recognize when certain applications and protocols such as HTTP, FTP and DNS -- are being misused.
  • 14. 4. ANTIVIRUS & ANTISPYWARE Anti-spyware software is a type of program designed to prevent and detect unwanted spyware program installations. Anti-virus software is a software utility that detects, prevents, and removes viruses, worms, and other malware from the computer.
  • 15. 5. Other necessary steps 1. Do Background checks. 2. Atleast 2 reference for new employee. 3. Use strong passwords and change the frequently. 4. Stopping usage of cracked or hacked application.
  • 16. SPDI RULES • Sensitive personal data or information • Body corporate to provide policy for privacy and disclosure of information • Collection of information • Disclosure of information • Transfer of information • Reasonable Security Practices and Procedures
  • 17. HOW TO LODGE A COMPLAINT IN CASE OF A CYBER CRIME FILE A COMPLAINT IN THE CYBER BRANCH PROVIDE DETAILS SUBMIT REQUIRED DOCUMENTS
  • 18. Penal Provisions Relating To Data Protection Laws In India
  • 19. • Section 43A- Failure To Protect Data Damages by way of compensation – 1) unto Rs.5 cores (adjudicating officer) 2) above Rs.5 cores (civil court) • Section 65- Hacking/Tampering Imprisonment unto 3 years or fine unto Rs.2 lakh or both. • Section 66C- Identity Theft Imprisonment unto 3 years and fine unto Rs.1 lakh. • Section 66E-Violation Of Privacy Imprisonment unto 3 years or fine unto 2 lakhs or both.
  • 20. • Section 67C - Preservation And Retention Of Information By Intermediaries Imprisonment up to 3 years. • Section 72-Breach Of Confidentiality And Privacy Imprisonment up to 2 years or fine up to 1 lakh or both. • Section 72A- Disclosure Of information In breach Of lawful Contract Imprisonment unto 3 years or fine up to 5 lakhs or both.
  • 21. •Data protection and its privacy plays the crucial role for the survival of the companies. •Traditionally it was difficult to maintain and save the data and records from unfaithful employees in the organization but due to advanced backup and privacy facilities of data , the job got much easier. •Each and every organization's fortune and its survival depends on its data protection and its privacy policy as it becomes tedious job to record the data again and again on its deletion. CONCLUSION