Thursday, August 8, 2019

Data Protection Act impact on Security on Canada (IT Security) Essay

Data Protection Act impact on Security on Canada (IT Security) - Essay Example It is necessary to ensure that every organization’s foreign organization follows the same requirements that would apply for Canadian operations, if the information is being transferred for processing. This can be achieved by entering into a contract or legal agreement with the other party â€Å"and adherence to the agreement that the foreign organization must work by the requirements of the Act, the OECD is an instance of such agreements.† (http://ec.europa.eu/justice_home/fsj/privacy/thridcountries/adequacy-faq_en.htm) Many members of the OECD in the European now have legislations in place, which apply the Privacy Protection Guidelines to the private and public sectors. As a result of this, the most recent OECD analysis on access and supply rights recognizes that: 1. Governments may have a right to block the transfer or broadcast of information between a supplier and potential customer(s) if the information may be considered to endanger national security or to conflict with societal norms on censorship or data protection 2. Third party individuals may require the right to block transfer or broadcast of information between a supplier and potential customer(s) if the information relates to the privacy of the individual. (OECD, 1990, pp. 47) Every organization considers its data pool and its information resources to be invaluable assets, and thus will apply the necessary security strategies in order to protect its information in a way to safeguard its interests. The data protection act helps in avoiding any breach of security that might affect data privacy. The Data protection act requires the implementation of standardized strategies for a secure data management. Every organization is required to assess its own security practices, because necessary security provisions might involve the development and implementation of security policies to protect private data and information. Thus, security

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.