Data Protection for Library and Information Services by Paul Ticher

By Paul Ticher

The 1998 information safety Act offers a framework for a way within which agencies may still gather and procedure own info. It has far-reaching implications for library and knowledge managers who carry own information on desktop or on paper, or who can be known as directly to recommend their colleagues. This sensible consultant explains the criminal specifications and illustrates the problems with dozens of appropriate and informative case-studies.

Show description

Read Online or Download Data Protection for Library and Information Services PDF

Similar organization and data processing books

Personalized Digital Television: Targeting Programs to Individual Viewers

Television audience this present day are uncovered to overwhelming quantities of knowledge, and challenged by way of the plethora of interactive performance supplied via present set-top packing containers. to make sure extensive adoption of this know-how through shoppers, destiny electronic tv should take usability matters completely under consideration.

Membrane Computing: 6th International Workshop, WMC 2005, Vienna, Austria, July 18-21, 2005, Revised Selected and Invited Papers

This e-book constitutes the completely refereed prolonged postproceedings of the sixth overseas Workshop on Membrane Computing, WMC 2005, held in Vienna, Austria, in July 2005. The 20 revised complete papers offered including five invited papers went via rounds of reviewing and development. The papers during this quantity hide all of the major instructions of analysis in membrane computing, starting from theoretical themes in arithmetic and computing device technology, to program matters, particularly in biology.

Ultimate Zero and One : Computing at the Quantum Frontier

Computing on the fringe of Nature -- Rethinking desktops -- Shrinking know-how -- A Peek Into Quantumland -- The Qubit: final 0 and One -- Are Bits using Us Bankrupt? -- Quantum Computing -- tips of the exchange -- Quantum reminiscence Registers -- The prepare--evolve--measure Cycle -- Quantum Gates and Quantum Circuits -- instance of a Quantum Computation -- What Can desktops Do?

Additional resources for Data Protection for Library and Information Services

Sample text

And finally, any information that you yourself generate—such as a record of your transactions with the Data Subject—must also be accurately recorded. Examples • In the light of the new Act I decide to review the records I hold on the users of my enquiry service. The first question is whether I need to hold any personal data at all. The enquiries are all dealt with by phone, and most are answered orally. For these, it is not necessary to ask who the person is, although for statistical purposes it would be useful to know what part of the country they are calling from.

You may also want to consider whether you actually need the sensitive data. Of course there will be circumstances where it is essential to your Purpose, but one aim of the Act is to get people to think carefully about their use of such data. If you can achieve what you want without holding sensitive data you both make your life easier and offer additional protection to the Data Subject. Examples • I provide a confidential telephone information service about a particular medical condition. The people who phone me often give considerable amounts of sensitive personal data, which I record.

Is always likely to be compatible with the Purpose it is held for. See also the special provisions for research, statistical and historical purposes in the chapter on Exemptions, page 83. 33 Data protection for library and information services Disclosure to others is also ‘processing’. ) Examples • I record enquiries to my information service. One day, a colleague asks for the names of everyone who has recently asked about a particular topic, so that they can invite them to a free seminar on that subject by a visiting speaker.

Download PDF sample

Rated 5.00 of 5 – based on 36 votes