Home Page Icon
Home Page
Table of Contents for
Index
Close
Index
by Stewart Room
Data Protection and Compliance in Context
Copyright
Figures and tables
About the author
Acknowledgements
Abbreviations
Glossary
Useful Websites
Preface
1 Introduction to Data Protection
DATA PROTECTION IN THE UK – THE DATA PROTECTION ACT 1998
OVERVIEW AND HISTORY OF DATA PROTECTION LAWS
KEY ASPECTS WITHIN DATA PROTECTION LAWS
KEY WORDS AND PHRASES – DATA, PERSONAL DATA AND PROCESSING
THE DPA – IMPORTANT MISCELLANY
2 Transparency
INTRODUCTION
CONSENSUAL PROCESSING (INCLUDING THE FIRST DATA PROTECTION PRINCIPLE)
FAIR PROCESSING (THE FIRST DATA PROTECTION PRINCIPLE)
PROCESSING FOR SPECIFIED PURPOSES (THE SECOND DATA PROTECTION PRINCIPLE)
NOTIFICATION
THE RIGHT OF ACCESS TO PERSONAL DATA
INFORMATION NOTICES
PART IV EXEMPTIONS
3 General Rules on Lawfulness
INTRODUCTION
THE FIRST DATA PROTECTION PRINCIPLE
THE SECOND DATA PROTECTION PRINCIPLE
THE THIRD DATA PROTECTION PRINCIPLE
THE FOURTH DATA PROTECTION PRINCIPLE
THE FIFTH DATA PROTECTION PRINCIPLE
THE SIXTH DATA PROTECTION PRINCIPLE
THE SEVENTH DATA PROTECTION PRINCIPLE
SCHEDULE 2 CONDITIONS (FOR PERSONAL DATA AND SENSITIVE PERSONAL DATA)
SCHEDULE 3 CONDITIONS (FOR SENSITIVE PERSONAL DATA)
THE DATA PROTECTION (PROCESSING OF SENSITIVE PERSONAL DATA) ORDER 2000
THE DATA PROTECTION (PROCESSING OF SENSITIVE PERSONAL DATA) (ELECTED REPRESENTATIVES) ORDER 2002
THE DATA PROTECTION (PROCESSING OF SENSITIVE PERSONAL DATA) ORDER 2006
PART IV EXEMPTIONS
4 The Right to Object
INTRODUCTION
SUBSTANTIAL AND UNWARRANTED DAMAGE OR DISTRESS
DIRECT MARKETING
AUTOMATED DECISION TAKING
EXEMPT MANUAL DATA
THE RIGHT TO OBJECT AND THE SIXTH DATA PROTECTION PRINCIPLE
5 Transborder Data Flows
INTRODUCTION
THIRD COUNTRIES AND ADEQUATE PROTECTION
DEROGATIONS AND BINDING CORPORATE RULES
DEROGATIONS AND CONTRACTUAL CLAUSES
TRANSBORDER DATA FLOWS AND THE DPA
6 Privacy and Electronic Communications
INTRODUCTION
THE DIRECTIVE ON PRIVACY AND ELECTRONIC COMMUNICATIONS
UK IMPLEMENTATION OF DPEC
REGULATION OF INVESTIGATORY POWERS ACT 2000
ANTI-TERRORISM, CRIME AND SECURITY ACT 2001
RECONCILING RIPA AND ATCSA
7 Enforcing Data Protection Laws
INTRODUCTION
ENFORCEMENT BY THE DATA SUBJECT
ENFORCEMENT BY THE DATA CONTROLLER
ENFORCEMENT BY THE EUROPEAN COMMISSION
ENFORCEMENT BY THE INFORMATION COMMISSIONER
CRIMINAL PROCEEDINGS
8 Compliance
INTRODUCTION
PRIORITIZATION OF ACTION
STAGE 1 – GATHERING INFORMATION ABOUT DATA
STAGE 2 – LAWFULNESS AND THE CRITERION FOR LEGITIMACY
STAGE 3 – IMPLEMENTING COMPLIANCE MECHANISMS
REFERENCES
Index
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Index
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset