9 resultados para PROTECTION

em University of Southampton, United Kingdom


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Slides used in lecture, explaining coursework and providing an introduction to the Data Protection Act. Students should use these resources as guidance for the forthcoming coursework (annotated bibliography). Like all materials you can expect slides to address issues which come up future assessment activities

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This is one of two presentations we have produced for the resource set part of the INFO2009 Assignment 2 Group Poster.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This is the reference lists for the resource set we have produced for the INFO2009 Assignment 2 Group Poster.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This is the poster about the resource set we have produced for the INFO2009 Assignment 2 Group Poster.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This is the poster about the resource set we have produced for the INFO2009 Assignment 2 Group Poster.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Content related to the second INFO2009 assignment for Group 6's radio interview on data security and the DPA

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An online tutorial outlining the definitions and principles of the Data Protection Act. Contains questions on scenarios which allow the user to test their knowledge, as well as a downloadable space-shooter game which gets the user to answer Data Protection Act questions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Published on Jun 7, 2012 by icocomms This ICO training video helps answer questions about the Data Protection Act, its impact on the working environment and how to handle and protect people's information. (Produced by Central Office of Information, Crown Copyright 2006)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Published on Jun 7, 2012 by icocomms This ICO training video helps answer questions about the Data Protection Act, its impact on the working environment and how to handle and protect people's information. (Produced by Central Office of Information, Crown Copyright 2006)