Data Protection Fundamentals_2
Data Protection Fundamentals_2
Company
By : Mrs. Pravina DODAH
LOGO Mr. Hemrajsingh BHUGOWON
1.
1.Data
DataProtection
ProtectionAct
Act
2.
2.The
TheData
DataProtection
ProtectionOffice
Office
3.
3.Legal
LegalAspects
Aspects
4.
4.MQA
MQA
5.
5.Guidelines
Guidelinesfor
forOrganisations
Organisations
6.
6.Threats
Threatsand
andTechnical
TechnicalAspects
Aspects
7.
7.Personal
PersonalData
DataProtection
ProtectionVideo
Video
8.
8.QQ&&AA
Data Protection Act, 2004
The Data Protection Office (DPO)
Mission of DPO:
Safeguard the privacy rights of all
individuals with regard to the
processing of their personal data.
The Data Protection Office
Amongst the Functions of the DPO
Register all data controllers and data processors in Mauritius
Definition
Data which relate to an individual who can be
identified from those data
How ???
Amend/ design application forms with data
protection clauses. E.g:
(b) Computers, servers, and files are securely locked away from
unauthorised people.
Identity Theft
Data Breach
Identity Theft
Bank/finance fraud
They may create counterfeit cheques using your name or account number.
They may open a bank account in your name and write bad cheques.
They may clone your ATM or debit card and make electronic withdrawals your name,
draining your accounts.
They may take out a loan in your name.
Frauds
Other frauds
They may get a job using your Social Security number.
They may rent a house or get medical services using your name.
They may give your personal information to police during an arrest. If they don't show
up for their court date, a warrant for arrest is issued in your name.
How do thieves do that ?
Dumpster Diving. They rummage through trash looking for bills or other paper with
your personal information on it.
Skimming. They steal credit/debit card numbers by using a special storage device
when processing your card.
Phishing. They pretend to be financial institutions or companies and send spam or
pop-up messages to get you to reveal your personal information.
Changing Your Address. They divert your billing statements to another location by
completing a change of address form.
Old-Fashioned Stealing. They steal wallets and purses; mail, including bank and
credit card statements; pre-approved credit offers; and new checks or tax information.
They steal personnel records, or bribe employees who have access.
Pretexting. They use false pretenses to obtain your personal information from
financial institutions, telephone companies, and other sources. For more information
about pretexting.
Physical Safeguards
Proper Signage
Alert
Purpose
Name and contact of operator
Public should be well aware of the presence of
the cameras
Cameras should be focussed and positioned at
authorised premises only
Capturing images outside authorised perimeter
constitute an offence under the law
Internet Use and Email Policy
Disclaimer Notice: This e-mail message (including any attachments) is intended for
the addressee only, and may contain confidential information. The unauthorised use,
disclosure or copying of this e-mail or any information contained within it is strictly
prohibited. If you are not the intended recipient, please notify the author and delete
this e-mail (including any attachments) immediately in its entirety. This e-mail
message has been swept by a virus checker for the presence of known computer
viruses. Besides, any opinion or other information in this email (including any
attachments) that does not have anything to do with the official business of the (...), is
personal to the author, and therefore does not engage any liability whatsoever of the
(...), . The above statement does not constitute an acceptance of liability on the part
of the ((...) ,or its employees in the event of technical or virus issues generated by this
e-mail. It is the responsibility of the recipient to take adequate security measures.
Further, the (...) ,or its employees do not accept liability however arising, including
liability for negligence, for any loss resulting from the use of or reliance upon the
information contained in the email (including any attachments) and/or reliance or its
availability at any time. The recipient must also verify/check any information with the
relevant (...) and/or other source(s), and to obtain any appropriate professional advice
before acting on the contents of this email (including any attachments).
Guidelines by DPO
47