Tuesday, May 5, 2020
The data protection Act
Question: Explain Information Technology? Answer: Introduction The data protection act is firstly proceeding in 1998.Personal data and the processes of personal data are the main elements of this assignment. Analyst discuss elaborately about the asymmetric cipher .Mainly, Chik et al. (2013), discuss about the procedure of the asymmetric cipher and the integrity of the cipher. There are also a support which is depends on the asymmetric cipher. Also analyst discuss about the long distance wireless connection and satellites. According to Ahn (2014), those protocols are mainly depends on the user and connection. Analyst also examine about the Wi-Fi network in Nepal. Explanation of the Long Distance wireless connection with inconsistencies: The long distance wireless connection is basically depends on the two signal which is placed in different place through long distance. According to Wohlfeld (2015), Two signal has different port address by which user located two signal .Two signal has different network switch and those network switch is connected with the a computer and the NVR. Long Distance wireless system has quality by which it connects with the computer. Long Distance wireless connection has some disadvantage by which those wireless system shown their inconsistency. By the customer view, Chik et al. (2013), there has some inconsistency. Lack of protection, unfinished protocols are there, standard is conflicted and there are also frequencies of protocols are there by which is shown the inconsistency. There is no obvious street map by which long distance wireless are connected. The entire growth of the connection is disorganized. For that reason, the connection is not access through the long distance. Kawashima et al. (2015), the whole quality of the industry is scrawny. The appearance of the wireless connection is transferred poorly with the speculation. There is some indecision with the stipulation submission. There is also a challenge of the network which depends on the connection of the long distance. In the IT organization, the entire support is inconsistence and the quality is poor. Those are the major disadvantages of the long d istance wireless connection. Identify and explain the two major entities from the table: The long distance wireless connection is basically depends on the two signal which is placed in different place through long distance. According to Stott-Jess (2014), Two signal has different port address by which user located two signal .Two signal has different network switch and those network switch is connected with the a computer and the NVR. Long Distance wireless system has quality by which it connects with the computer. Long distance wireless connection is made between two long distance buildings. There are several Wi-Fi, by the use of the WI- FI, we connects with the router. Suppose, According to Stott-Jess (2014), in an organization, there are many computers are there, by which those computers are connected through a router and that router are also connected with the wireless satellite system of the earth. Those connections are water-resistant and have a tight security. Satellite connection: There are many types of satellite in our locality. A good quality of the satellite is connected with the internet service provider who re allocates TV, routers, computers etc. According to Wohlfeld (2015), that service provider connects with the internet with the satellite and that satellites are totally connected with the computer, modem and the TV of the customer. By the help of those satellite people uses their product very easily and the connection of the lines are high-quality. Those are the main elements of a satellite connection. Satellite connection has teleport and the customer location by which those elements are connected with the satellite. According to Ahn (2014), that connection is high class and by that connection, routers are connected with the most number of the computer. There are many internet protocols are there by which satellite is directly connected with the centre of the satellites. Joining table of the satellite connection and the long distance wireless connection Workable knowledge information Rate of the connection reporting area of the connection Wi-Fi connection 200 Mbps 10 km WiMAX 70 Mbps 50 km Satellites 256 kbps 1.5 Mbps 40% of the earth Explain the Data Protection act (DPA): The data protection act (DPA) is firstly executed in UK. The basic part of this Act is all about the living people who officially use those acts. The main objective of this act is to defend the human being against the mistreatment of the information that is totally against them. Mainly, according to Wohlfeld (2015), data means a information which is activated automatically for the rationale of instruction. It should be processed by some equipment. It is a part of satisfying system. A meticulous individual is reachable for that information which is have been created or developed by the human in different circumstances. It is not easy to operate those things in a very particular way. Its delver information about the individuals in terms of system of life. That individual information is all about life, where life is worked with the way of individuals aspiration. In the DPA, according to Ahn (2014), there are also a reachable records are there. There are different types of reachable records, named fitness record, enlightening record and community record. In case of fitness records, those individual have some psychological or corporal problem which is made by the fitness specialized. Chik et al. (2013), in case of enlightening record, neighbouring school has a pr oblem on personal data which is located in the act as another definition of problem that is held in fitness problem. In case of public problem, there are many problems which are basically based on the accommodation, communal service and other purpose. There are many elementary details of the DPA. Those are discussed elaborately in the below passage: The procedure of this act is basically blond and legally recognized. It gain for only the legally purpose and not for the manual. This is appropriate for the individual people. It is as truthful as proper for the longer version of the people. Chik et al. (2013), it protects the illegal process which will hurt those people in future. It has an independence of the data which is allocated in the act. Personal Data: Personal Data is one type of data which is basically identifying the specific living human or person who have those data. Personal data is based on the act of DPA. The entire things is depends on the mistreatment of the information of that person who have those data. Each person have own information about their life and those information also have different estimation to be uttered on it. According to Wohlfeld (2015), that informations are very responsive as per human being concern. On the base of the assessment in general, personal data is sensitive data which belong with the individual personal problem. Explanation of Personal Data in respect of DPA: The entire elements of the personal data are based on the information of human. Each person has its own information such as health problem, sexual problem, and confidential problem about trade union and cultural origins. Many people have their own spiritual and following view which is very much personal. Deal union is one type of personal data which is very much confidential about life. Information of sexual life is also a personal data of human life. According to Wohlfeld (2015), there are many problems of health that is based on the psychological and substantial. Those data is varied person to person individually. Those personal data are stored in the access. It is much secured against the injuries and the unlawful access. Those data does not transfer without the knowledge of that person. . According to Ahn (2014), if those people change the country in that case, storing data is transferred through providers. Those data is confidential for people in that case its depend on the information. That information is basically about the family. Explain the term processing in terms of DPA: In the case of DPA, processing is the major factor of DPA. It carries the data to person to person and those data is accumulated with the subject. It must be accessed with correct data. It has to be an automatic pronouncement making capacity to do the proper work as a life of individual. Straight marketing is another prospect of the processing of the data protection act. Personal data is an element of the straight marketing. Chik et al. (2013), straight marketing is a process where personal data is used usually a marketing prospect. In case of processing, casual damage has been done by the process of DPA. In the DPA, the entire process is developed in processing methods. There are some steps are thereby which process has been done manually. Board has firstly reading the development plan which is organized by the help of processing. Then public those assignment in the base of notice which is based on the main alternatives .Then the process is based on the public hearing which is board will be assigned .Then it resolute and process for the further purpose of the development. Then plan is to be notified. Chik et al. (2013), there are two alternatives, named major and minor alternatives. Then, plan will be proceed for the minor alternatives which are to be no changes for planning. In case of second reading council, that is directly notified to the second reading person who represents the entire representation of that plan and those process is submitted to the minister level. Then, minister decides to approve the entire plan and then it will be process for the further representation. Munic ipal Board will publish that document in terms of the plan and minister notified those reports to the council where notification is to be submitted through a definite process. Then, those plan process in two definite way, one is third reading and another is process of resolution which is definite for the individual person in a certain time period. Then, that copy of the plan is submitted to the other person and the minister home through which public easily go through this purpose and those plans has to be submitted by others who have those personal data. The resolution is not to be proceed in the base of the notice which is mainly a plan of personal data and others documents like health issue, others manual problem, housing problem, sexual problem etc. Explain the working principal of the asymmetric cipher: The asymmetric cipher is an algorithms process. There are four elements by which the cipher works. Source, the algorithm of encryption, the algorithm of decryption and the destination port are there. Chik et al. (2013), between the destination port and the algorithm of decryption, there are main two keys are there, by which the entire asymmetric cipher work. Source is directly connected with the algorithm of the encryption and also protocol is come from destination port to the algorithm of the encryption then, this is directly connected with the algorithm of the decryption which is also directly associated with the destination port. There are main two key by which the public key and the private key works with the message of Helen and assume that Helen works on the message with the help of the this cipher. How an asymmetric cipher can support the confidentiality of Helens message? Confidentiality of the asymmetric cipher of the Helens message is depending on the main two keys which are public key and the private key. Chik et al. (2013), those key are the pair of the asymmetric key which also depends on the encrypt process of the Helens message. There are two plain text which works on the text of the message and those two keys are associated with the encrypt and decrypt of the plain text. This is the major supporting process of an asymmetric cipher. How an asymmetric cipher can support the integrity of Helens message? The integrity of the asymmetric cipher of the Helens message has some major properties. , According to Ahn (2014), the main two protocols are sender and the recipient by whom secret keys are worked. Encrypt and decrypt are also main thing by whom identical keys are used for the encryption and decryption has to be done in a secretly. Cipher text is also there between the encryption and the decryption of the Helens message. Conclusion: As per analyst concern about this assignment, they discuss about the entire elements of long distance wireless connection and satellite connection. The asymmetric cipher is another main protocol of the processing. The personal data of DPA is processed in many steps. Analyst is concluded that personal data is very securely personified by the individual thinking and the entire things is depends on the mistreatment of the information of that person who have those data. Each person have own information about their life and those information also have different estimation to be uttered on it. References List: Ahn, A., Ahn, A. and Yoon, T. (2014). Key-Amplified Cipher. Lecture Notes on Information Theory, 2(1), pp.54-60. Chik, W. (2013). The Singapore Personal Data Protection Act and an assessment of future trends in data privacy reform. Computer Law Security Review, 29(5), pp.554-575. Novakowski, L. and Stott-Jess, K. (2015). Personal information protection act British Columbia Alberta. Toronto: Carswell. Tp-link.com, (2015). Long distance wireless connection concerns when using outdoor access point - Welcome to TP-LINK. [online] Available at: https://www.tp-link.com/en/faq-907.html [Accessed 3 Sep. 2015]. Wohlfeld, V. (2015). Cipher. JAMA, 313(13), p.1375. Yamamoto, N., Kawashima, M., Fujita, T., Suzuki, M. and Kato, K. (2015). How should the legal framework for the protection of human genomic data be formulated?Implications from the revision processes of the Act on the Protection of Personal Information (PPI Act). Journal of Human Genetics, 60(4), pp.225-226.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.