Premium Content

Access "DPA compliance: Tracking changes to Data Protection Act guidelines"

Published: 13 Oct 2012

For a piece of legislation that first hit the statute book in 1984, the Data Protection Act (DPA) has weathered remarkably well. By sticking to broad principles and avoiding any reference to specific technologies from the start, it has managed to stay relevant for nearly 30 years, despite huge social and technological changes. The underlying guidelines, embodied in eight simple principles, are easy to understand and remain a model of clear-sighted lawmaking. Although it was updated in 1998 to bring it into line with EU legislation (which it had influenced), the act has remained essentially the same. So why has the act caused so much confusion and been the subject of so much misinterpretation over the years? Some organisations appear to use it as a convenient veil to avoid releasing any information at all, while others still treat personal information with reckless abandon. Even the police got it wrong, most notably in the Soham murders investigation of 2002 where an overly strict interpretation of the act’s requirements caused vital information to be missed.... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • The IT challenges facing an independent Scotland
    CWE_160914_ezine_24p-1MED.jpg
    E-Zine

    In this week’s Computer Weekly, as Scotland goes to the polls to vote on independence, we assess the IT challenges the country would face. We look at...

  • How cloud is saving lives
    CWE_090914_ezine_22p-1MED.jpg
    E-Zine

    In this week’s Computer Weekly, we look at how the power of public cloud is helping scientists to tackle diseases such as cancer and malaria. Big ...

  • Security issues in Vanets
    Security issues in Vanets.jpg
    E-Handbook

    This article in our Royal Holloway Security Series analyses the security risks of Vehicular ad-hoc networks (Vanets), an important component of ...