Podcast
Questions and Answers
What is data protection?
What is data protection?
Data protection refers to how your personal information is used by the organization or being an organization, how you would make sure to protect data of your customers, employees etc
Define privacy.
Define privacy.
Privacy refers to the privilege provided to an individual by law or by the organizational policy where the individual can keep the information secret to or from a specific group
How has the development of global information networks affected privacy protection?
How has the development of global information networks affected privacy protection?
The development of global information networks has changed and intensified the character of the privacy protection problem
What was the original challenge of data protection law?
What was the original challenge of data protection law?
What are the factors affecting the regulation of data processing?
What are the factors affecting the regulation of data processing?
What has resulted in a convergence of the rules made to ensure good data management?
What has resulted in a convergence of the rules made to ensure good data management?
What is defamation?
What is defamation?
What redress is available for those who feel that untrue and unwarranted statements have been circulated about them?
What redress is available for those who feel that untrue and unwarranted statements have been circulated about them?
What is the impact of increasing computerization on the handling and processing of information?
What is the impact of increasing computerization on the handling and processing of information?
What does data protection refer to?
What does data protection refer to?
What privilege does privacy refer to?
What privilege does privacy refer to?
How has the development of global information networks changed the character of the privacy protection problem?
How has the development of global information networks changed the character of the privacy protection problem?
What are the formidable problems presented by the attempt to regulate systems and practices related to data processing?
What are the formidable problems presented by the attempt to regulate systems and practices related to data processing?
What has resulted in a convergence of the rules made to ensure good data management?
What has resulted in a convergence of the rules made to ensure good data management?
What is the observed fact regarding the level of international agreements and national legislation related to data protection practices?
What is the observed fact regarding the level of international agreements and national legislation related to data protection practices?
What does defamation and protection of reputation concern?
What does defamation and protection of reputation concern?
What does the original challenge of data protection law concern?
What does the original challenge of data protection law concern?
What question is inevitably being asked about the original formulation of data protection law?
What question is inevitably being asked about the original formulation of data protection law?
What does the publication of defamatory material attract?
What does the publication of defamatory material attract?
What are the factors affecting the regulation of data processing?
What are the factors affecting the regulation of data processing?
What is the process of recovering secret passwords from data stored in a computer system called?
What is the process of recovering secret passwords from data stored in a computer system called?
What is the term used for unauthorized access to an email account or email correspondence?
What is the term used for unauthorized access to an email account or email correspondence?
What is the name for the process of changing the look and execution of software, for example, changing the demo version into the full version?
What is the name for the process of changing the look and execution of software, for example, changing the demo version into the full version?
What is the term for the legal attempt to break into a company’s network to find its weakest link?
What is the term for the legal attempt to break into a company’s network to find its weakest link?
What should be done immediately after a computer system has been hacked?
What should be done immediately after a computer system has been hacked?
What is the process of attempting to gain or successfully gaining unauthorized access to computer resources called?
What is the process of attempting to gain or successfully gaining unauthorized access to computer resources called?
What is the primary goal of a computer hacker?
What is the primary goal of a computer hacker?
What type of hacking involves taking control of a website from the website owner?
What type of hacking involves taking control of a website from the website owner?
Define Ethical Hacking.
Define Ethical Hacking.
What does a criminal hacker develop to gain access to confidential information?
What does a criminal hacker develop to gain access to confidential information?