NAME – Ahana Mitra
STREAM - BMS
ROLL NO. - 30903891082
SECTION - B
SEM - 1ST year 2nd sem
SUBJECT - Print Media(203)
What do you mean by data protection under
information act? How far it is effected in this
emergency time of the world?
The Data Protection Act (DPA) is a United Kingdom Act of Parliament w
. It was developed to control how personal or customer information is
used by organisations or government bodies. It protects people and lays
down rules about how data about people can be used. It was in enacted
in 1988.Partically Data Protection refers to the set of privacy laws,
policies and procedures that aim to minimise intrusion into one's privacy
caused by the collection, storage and dissemination of personal data.
Personal data generally refers to the information or data which relate to
a person who can be identified from that information or data whether
collected by any Government or any private organization or an agency.
The Data Protection Act is important because it provides guidance and
best practice rules for organisations and the government to follow on
how to use personal data including:
1. Regulating the processing of personal data
2. Protecting the rights of the data subject
3. Enabling the Data Protection Authority (The ICO) to enforce rules
4. Holding organisations liable to fines in the event of a breach of the
rules
In the light of the 7 July 2005 attacks it was
clear that emergency planners and responders required additional
guidance specifically on data protection and sharing in an emergency.
This publication does not introduce any new policy or legal requirements.
It rather seeks to provide clear and understandable guidance on the
legislative framework surrounding personal data so that emergency
responders know what they can and cannot do when handling personal
data. By exploding some of the myths that have built up around data
protection, we will be better placed to prepare for, respond to and
recover from emergencies. The guidance contributes to the
Government’s Vision for Information Sharing in the Future published by
Department for Constitutional Affairs (DCA) and the Government’s
Action Plan on Social Exclusion published by the Cabinet Office.4 A
comprehensive plan for information-sharing across the public sector is
due for publication in April 2007. 9 Although different areas of law apply
to data sharing – specifically the Data Protection Act 1998, the European
Convention of Human Rights (ECHR) Article 8 and the common law of
confidentiality – it is important to recognise that there is overlap
between them. The particular rules of the various pieces of legislation
cannot be ignored. These rules are explained in as non-legalese language
as possible in this guidance. When considering the issues and to help get
to the right decision in an emergency it is acceptable for responders to
have in mind some fairly broad-brush and straightforward questions: • is
it unfair to the individual to disclose their information? • what
expectations would they have in the emergency at hand? • am I acting
for their benefit and is it in the public interest to share this information?
that if they decide in good faith that it is appropriate to share
personal information during an emergency, then they are
extremely unlikely to be personally legally liable if – after the event
– it turns out that the information sharing was not lawful. In the
unlikely event of a complaint or mistake, any action or claim for
compensation would almost certainly be made against the
organisation concerned (and if not you could expect your
organisation to support you). 1.12 Where a mistake is made and
information is shared in breach of the Data Protection Act 1998,
any enforcement action would be taken against the organisation,
not the individual. There is an offence under the Data Protection
Act 1998 if an individual knowingly or recklessly discloses personal
data without the consent of the data controller (organisation). But
this need not concern a person making data protection decisions
in the course of their job (ie with the consent of the organisation). It
also does not apply where the individual acted in the reasonable
belief they had in law the right to disclose. Any claim that an
organisation has breached the Human Rights Act 1998 would be
made against the organisation concerned. That should also be the
case if someone were to seek compensation for the disclosure of
their confidential information if this turned out to be wrong.
What is cyber crime?When and how first cyber
crime was conducted in India?
Cybercrime, or computer-oriented crime, is a crime that involves
a computer and a network.] The computer may have been used in the
commission of a crime, or it may be the target.[2] Cybercrimes can be
defined as: "Offences that are committed against individuals or groups
of individuals with a criminal motive to intentionally harm the reputation
of the victim or cause physical or mental harm, or loss, to the victim
directly or indirectly, using modern telecommunication networks such as
Internet (networks including chat rooms, emails, notice boards and
groups) and mobile phones (Bluetooth/SMS/MMS)".] Cybercrime may
threaten a person or a nation's security and financial health. Issues
surrounding these types of crimes have become high-profile, particularly
those regarding hacking, copyright infringement, unwarranted mass-
surveillance, sextortion, child pornography, and child grooming.[
One tip from the FBI is all it took for India to catch its first cyber
criminal.Until he was taken down in a raid by India's Central Bureau of
Investigation (CBI) on Friday, Amit Tiwari was the head of an illegal
enterprise that he had grown into a $600 million business since its
inception in 2011. Tiwari and a band of cyber crooks sold their expertise
with computer hacking to more than 1,000 customers who wanted to
snoop around online but didn't have the means. While still in operation,
Tiwari's team took fees of $250 to $500 for assignments like stealing
funds, snooping around for the financial information of a business rival,
digging up a family's secrets and more. is organization was
sophisticated enough to operate worldwide, but Tiwari still fell victim to
some basic errors that let law enforcement track him down; he hosted
his websites on insecure U.S. servers and accepted payment in easy-to-
track transfers from PayPal accounts. He even received some money
via wiring through Western Union. The FBI figured out Tiwari's identity
and passed along his GPS location to India's CBI.
While the Indian government can now boast about Tiwari's capture, he
should have been on the watch list since 2003, when Tiwari hacked into
a credit card processing company based in Mumbai and robbed
$14,300. Now, the CBI is making up for lost time by conducting
additional raids in the Indian cities of Mumbai, Pune and Ghaziabad to
try to pin down others involved in the cyber crime ring.
Soon, the Indian government hopes to secure a system ensuring that no
cyber criminal slips through the cracks of its justice system. Last June,
India set up a surveillance web designed to tap into India's 900 million
land lines and track the activity of the country's 120 million Internet users
Discus some of the major cyber crime cases
conducted in India till date.
1. Phishing scams
Phishing is a practice of a cybercriminal or hacker attempting to obtain
sensitive or personal information from a computer user. This process is
usually accomplished through phishing websites which are designed to
mimic a legitimate website in hopes that the unsuspecting computer
user will enter several bits of personal information such as their banking
passwords, home address or even social security number. To avoid
phishing scams, we recommend using a phishing filter feature on your
web browser so that it can actively scan websites that you visit to check
if they have been identified as a phishing website.
2. Identity Theft scams
Cybercrooks who may have gained access to your credit card or
banking account information may use that information to make
purchases in your name. Identity theft has been a major issue even
before the conception of the Internet but as you may already know, the
virtual world has made it much easier for criminals to utilize and steal
your identity. One of the easiest and lest expensive things to do to
protect your identity is to closely monitor your accounts. If you notice
suspicious activity, you should report it to the proper authorities
immediately. Be proactive and do not waste time in these situations.
Identity theft scams are very prevalent online and may come in the form
of a spam email, website or even an online pop-up survey. Phishing is a
major contributor to identity theft also.
3. Online Harassment
Harassment online is usually related to your social lifestyle and if you
choose to use a popular social network such as Facebook or Twitter.
Online harassment can consist of threats sent through email, instant
message or through a social network message/post. Usually, it is simple
to report these threats to the social network you're being harassed on.
Harassment can also be found to result in cyberbullying kids which can
have dire consequences as you may have witnessed recently in the
media where a 13-year-old kid from Dardenne Prairie, Missouri, named
Megan Meier committed suicide from being bullied online. Our
suggestion for handling harassment online is to immediately report any
activity out of the ordinary before it gets out of hand even if you may
know the person on the other end. Often online impostors who harass
you online do it to find your 'breaking point' but you should never let it
get that far.
4. Cyberstalking
Cyberstalkers will go to great lengths to try to monitor a victims online
activity. This may include infecting a person's computer with malware
that is able to log computer activity. Cyberstalkers are also known to
continually harass their potential victims. Cyberstalking cases should
also be reported to authorities, just like online harassment cases.
Cyberstalkers may contact a victim's colleagues, friends and other
online contacts in an effort to slander them or extract personal
information from them.
5. Invasion of privacy
The invasion of privacy is basically the act of someone attempting to
intrude on a person's personal life. This includes hacking into a person's
computer, reading their emails or monitoring online activities. Many of
these specific crimes are punishable under the law. If you ever suspect
someone invading your privacy, you can simply contact the police and
file a report. Local authorities can handle these situations most times
without seeking a specific online law enforcement organization.
In any of the above cases, you should always have the proper computer
security applications installed and updated on your computer which may
include a trustworthy anti-spyware or anti-virus program. Having security
software installed and running on your system will ensure that you are
protected from known threats that can lead to any of the above
situations and help protect you against cybercrimes.