1. Data and information should be kept secure against loss or exposure.
2. Data and information should not be kept longer than necessary.
3. Data and information should be accurate and up-to-date.
4. Data and information should be collected, used and kept for specified lawful purposes (i.e., it should not be used for unlawful gain).
5. The owner of the data has a right to know what data is held by the person or organization having it.
6. Data should not be transferred to other countries without the owner’s permission.
7. Do not collect irrelevant and overly too much information for a purpose.
francis1897 answered the question on March 15, 2023 at 05:20
- What are log files?(Solved)
What are log files?
Date posted: March 15, 2023. Answers (1)
- With the aid of a diagram, describe data encryption(Solved)
With the aid of a diagram, describe data encryption
Date posted: March 15, 2023. Answers (1)
- Describe audit trails as a way of detection and protection against computer crimes(Solved)
Describe audit trails as a way of detection and protection against computer crimes
Date posted: March 15, 2023. Answers (1)
- State some of the ways of reducing piracy(Solved)
State some of the ways of reducing piracy
Date posted: March 14, 2023. Answers (1)
- What are the different ways tapping may take place?(Solved)
What are the different ways tapping may take place?
Date posted: March 14, 2023. Answers (1)
- Who is an hacker?(Solved)
Who is an hacker?
Date posted: March 14, 2023. Answers (1)
- Give the reasons for hacking(Solved)
Give the reasons for hacking
Date posted: March 14, 2023. Answers (1)
- Discuss the types of computer crimes.(Solved)
Discuss the types of computer crimes.
Date posted: March 14, 2023. Answers (1)
- What causes errors and accidental access to data and information?(Solved)
What causes errors and accidental access to data and information?
Date posted: March 14, 2023. Answers (1)
- Discuss the forms of unauthorized access(Solved)
Discuss the forms of unauthorized access
Date posted: March 14, 2023. Answers (1)
- In your own view, what are some of the intentions of the people who may want to access data without permission?(Solved)
In your own view, what are some of the intentions of the people who may want to access data without permission?
Date posted: March 14, 2023. Answers (1)
- State the types of destructions/damages caused by a virus attack(Solved)
State the types of destructions/damages caused by a virus attack
Date posted: March 14, 2023. Answers (1)
- What are the two tasks a virus (computer code) is designed to undertake?(Solved)
What are the two tasks a virus (computer code) is designed to undertake?
Date posted: March 14, 2023. Answers (1)