Вы находитесь на странице: 1из 1

How to protect our details

A 1 Username & Password


2 Firewalls
3 Encryptions
B 1 The Data Protection Act
1a 1998

1b 1. Processed fairly and lawfully.


2. Obtained for specified and lawful purposes.

3. Adequate, relevant and not excessive.

4. Accurate and up to date.

5. Not kept any longer than necessary.

6. Processed in accordance with the data subjects (the individuals) rights.

7. Securely kept.

8. Not transferred to any other country without adequate protection in situ.

Encryption
1.

Encryption is the most effective way to achieve data security. To read


an encrypted file, you must have access to a secret key or password that enables
you to decrypt it. Unencrypted data is called plain text; encrypted data is referred to
as cipher text. It scrabbles the so if its hacked its safe and secure.
Biometrics:
What is it?
Advantages/Disadvantages
Usernames/Passwords

Вам также может понравиться