2 Firewalls 3 Encryptions B 1 The Data Protection Act 1a 1998
1b 1. Processed fairly and lawfully.
2. Obtained for specified and lawful purposes.
3. Adequate, relevant and not excessive.
4. Accurate and up to date.
5. Not kept any longer than necessary.
6. Processed in accordance with the data subjects (the individuals) rights.
7. Securely kept.
8. Not transferred to any other country without adequate protection in situ.
Encryption 1.
Encryption is the most effective way to achieve data security. To read
an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text; encrypted data is referred to as cipher text. It scrabbles the so if its hacked its safe and secure. Biometrics: What is it? Advantages/Disadvantages Usernames/Passwords