Podcast
Questions and Answers
What is data protection?
What is data protection?
Data protection refers to how your personal information is used by the organization or being an organization, how you would make sure to protect data of your customers, employees etc
Define privacy.
Define privacy.
Privacy refers to the privilege provided to an individual by law or by the organizational policy where the individual can keep the information secret to or from a specific group
How has the development of global information networks affected privacy protection?
How has the development of global information networks affected privacy protection?
The development of global information networks has changed and intensified the character of the privacy protection problem
What was the original challenge of data protection law?
What was the original challenge of data protection law?
Signup and view all the answers
What are the factors affecting the regulation of data processing?
What are the factors affecting the regulation of data processing?
Signup and view all the answers
What has resulted in a convergence of the rules made to ensure good data management?
What has resulted in a convergence of the rules made to ensure good data management?
Signup and view all the answers
What is defamation?
What is defamation?
Signup and view all the answers
What redress is available for those who feel that untrue and unwarranted statements have been circulated about them?
What redress is available for those who feel that untrue and unwarranted statements have been circulated about them?
Signup and view all the answers
What is the impact of increasing computerization on the handling and processing of information?
What is the impact of increasing computerization on the handling and processing of information?
Signup and view all the answers
What does data protection refer to?
What does data protection refer to?
Signup and view all the answers
What privilege does privacy refer to?
What privilege does privacy refer to?
Signup and view all the answers
How has the development of global information networks changed the character of the privacy protection problem?
How has the development of global information networks changed the character of the privacy protection problem?
Signup and view all the answers
What are the formidable problems presented by the attempt to regulate systems and practices related to data processing?
What are the formidable problems presented by the attempt to regulate systems and practices related to data processing?
Signup and view all the answers
What has resulted in a convergence of the rules made to ensure good data management?
What has resulted in a convergence of the rules made to ensure good data management?
Signup and view all the answers
What is the observed fact regarding the level of international agreements and national legislation related to data protection practices?
What is the observed fact regarding the level of international agreements and national legislation related to data protection practices?
Signup and view all the answers
What does defamation and protection of reputation concern?
What does defamation and protection of reputation concern?
Signup and view all the answers
What does the original challenge of data protection law concern?
What does the original challenge of data protection law concern?
Signup and view all the answers
What question is inevitably being asked about the original formulation of data protection law?
What question is inevitably being asked about the original formulation of data protection law?
Signup and view all the answers
What does the publication of defamatory material attract?
What does the publication of defamatory material attract?
Signup and view all the answers
What are the factors affecting the regulation of data processing?
What are the factors affecting the regulation of data processing?
Signup and view all the answers
What is the process of recovering secret passwords from data stored in a computer system called?
What is the process of recovering secret passwords from data stored in a computer system called?
Signup and view all the answers
What is the term used for unauthorized access to an email account or email correspondence?
What is the term used for unauthorized access to an email account or email correspondence?
Signup and view all the answers
What is the name for the process of changing the look and execution of software, for example, changing the demo version into the full version?
What is the name for the process of changing the look and execution of software, for example, changing the demo version into the full version?
Signup and view all the answers
What is the term for the legal attempt to break into a company’s network to find its weakest link?
What is the term for the legal attempt to break into a company’s network to find its weakest link?
Signup and view all the answers
What should be done immediately after a computer system has been hacked?
What should be done immediately after a computer system has been hacked?
Signup and view all the answers
What is the process of attempting to gain or successfully gaining unauthorized access to computer resources called?
What is the process of attempting to gain or successfully gaining unauthorized access to computer resources called?
Signup and view all the answers
What is the primary goal of a computer hacker?
What is the primary goal of a computer hacker?
Signup and view all the answers
What type of hacking involves taking control of a website from the website owner?
What type of hacking involves taking control of a website from the website owner?
Signup and view all the answers
Define Ethical Hacking.
Define Ethical Hacking.
Signup and view all the answers
What does a criminal hacker develop to gain access to confidential information?
What does a criminal hacker develop to gain access to confidential information?
Signup and view all the answers