Identity theft

What is a Personal Identity?
This is who you are; expressed in various methods of verification. There are many ways of identifying you, some being as complex as your National Insurance Number, or even your library card, they still represent you.

How could it be lost?
1. Legal methods - data harvesting
this is when companies are either legally allowed to or you consent toward them collecting data about you.
2. Giving it away - user’s careless - social media etc.
You could be entering a giveaway that is a fake, in reality they just need your data. You could upload your information to social media sites through that people could locate where you live, where you work, where you have been 30 mins ago.
3. Illegal methods - hacking & viruses etc.
When you access a website and the website injects viruses and malware onto your computer, through this hackers can gain full access to your machine, insert key loggers and even blackmail you for money to keep your identity safe.

Consequences of ID Loss
Having your identity stolen isn’t just costly in time and money, it can also lead to false imprisonment, life-threatening false medical records, and much more.
Information Commissioners Office
Data Protection Act - UK & Europe
1. 8 Data Protection Principles

a. 1) Personal information must be fairly and lawfully processed.
b. 2) Personal information must be processed for limited purposes.
c. 3) Personal information must be adequate, relevant and not excessive.
d. 4) Personal information must be accurate and up to date.
e. 5) Personal information must not be kept for longer than is necessary.
f. 6) Personal information must be processed in line with the data subjects’ rights.
g. 7) Personal information must be secure.
h. 8) Personal information must not be transferred to other countries without adequate protection.
2. Rights of the Data Subject
People whose personal data is stored are called data subjects. The DPA sets up rights for people who have data kept about them.
3. Responsibilities if the Data User
The user is expected to keep his information private and not expose it to websites without fully reading the terms and conditions. And only if he agrees to the T&C’s then he may give the company/website his information.

1. Data

Information of a person, this involves personal details such as where they live, their workplace, maritial status etc.
2. Data Subject
The Data Subject is a living individual to whom personal data relates. Consent. Cookie. Data Controller. Data Processor.
3. Data User
An individual with a stationary computer or terminal that requires data transmission to and from a network. Contrast with mobile data user.
4. Data Manager
Data management is the process of controlling the information generated during a research project. Any research will require some level of data management, and funding agencies are increasingly requiring scholars to plan and execute good data management practices.

Privacy & Electronic Communication Regulations
Responsibilities & Obligations

PECR regulations restrict the processing and sharing of personal traffic data and location data and provide for access to users’ personal data in the interest of national security. The information commissioner has the power to audit the measures taken by a provider of public electronic communications services to comply with personal data breach notification and recording requirements.

1. Person

A person who is being subjected to calls and subscriptions.
2. Caller
People who call you up to try get your information like card details. This could also be junk mail.
3. Subscriber
The subscriber is the customer who has a contract with the service provider. So a person has subscribed to a monthly update of Wall Street Magazine.

Solicited & Un-solicited Marketing
Opt in and opt out clauses: - a clause that permits signatories to a contract to opt out of particular provisions, or to terminate the contract early
Complying with the regulations: you are agreeing to what the regulation says.