Page 248 - E-Bussiness and E-Commerce Management Strategy, Implementation, and Practice
P. 248

M04_CHAF9601_04_SE_C04.QXD:D01_CHAF7409_04_SE_C01.QXD  16/4/09  11:11  Page 215





                                                                                     Chapter 4 E-environment  215


                                        The guidelines state: ‘To comply with this Principle, data controllers will need to review
                                      their personal data regularly and to delete the information which is no longer required for
                                      their purposes.’
                                        It might be in a company’s interests to ‘clean data’ so that records that are not relevant
                                      are archived or deleted, for example if a customer has not purchased for ten years.
                                      However, there is the possibility that the customer may still buy again, in which case the
                                      information would be useful.
                                        If a relationship between the organization and the data subject ends, then data should
                                      be deleted. This will be clear in some instances, for example when an employee leaves a
                                      company their personal data should be deleted. With a consumer who has purchased
                                      products from a company this is less clear since frequency of purchase will vary, for
                                      example, a car manufacturer could justifiably hold data for several years.
                                    6 Processed in accordance with the data subject’s rights.
                                      In full: ‘Personal data shall be processed in accordance with the rights of data subjects under
                                      this Act.’
                                        One aspect of the data subject’s rights is the option to request a copy of their personal
                  Subject access      data from an organization; this is known as a ‘subject access request’. For payment of a
                  request             small fee such as £10 or £30, an individual can request information which must be supplied
                  A request by a data  by the organization within 40 days. This includes all information on paper files and on
                  subject to view personal
                  data from an organization.  computer. If you requested this information from your bank there might be several boxes
                                      of transactions!
                                        Other aspects of a data subject’s rights which the law upholds are designed to prevent
                                      or control processing which:
                                        causes damage or distress (for example repeatedly sending mailshots to someone who
                                        has died);
                                        is used for direct marketing (for example, in the UK consumers can subscribe to the
                                        mail, e-mail or telephone preference service to avoid unsolicited mailings, e-mails or
                                        phone calls). This invaluable service is provided by the Direct Marketing Association
                                        (www.dmaconsumers.org). If you subscribe to these services organizations must check
                                        against these ‘exclusion lists’ before contacting you. If they don’t, and some don’t, they
                                        are breaking the law.
                                        is used for automatic decision taking – automated credit checks, for example, may result in
                                        unjust decisions on taking a loan – these can be investigated if you feel the decision is unfair.
                                    7 Secure.
                                      In full:‘Appropriate technical and organizational measures shall be taken against unauthorised
                                      or unlawful processing of personal data and against accidental loss or destruction of, or damage

                                      to, personal data.’
                                        This guideline places a legal imperative on organizations to prevent unauthorized
                                      internal or external access to information and also its modification or destruction. Of
                                      course, most organizations would want to do this anyway since the information has value
                                      to their organization and the reputational damage of losing customer information or being
                                      subject to a hack attack can be severe. For example, in late 2006, online clothing retail group
                                      TJX Inc (owner of TK Maxx) was hacked, resulting in loss of credit card details of over 45
                                      million customer details in the US and Europe. TJX later said in its security filing that its
                                      potential liability (loss) from the computer intrusion(s) was $118 million.
                                        Techniques for managing data security are discussed in Chapter 11.
                                        Of course, the cost of security measures will vary according to the level of security
                                      required. The Act allows for this through this provision:
                                      (i) Taking into account the state of technological development at any time and the cost of
                                        implementing any measures, the measures must ensure a level of security appropriate to:
                                        (a) the harm that might result from a breach of security; and (b) the nature of the data to
                                        be protected. (ii) The data controller must take reasonable steps to ensure the reliability
                                        of staff having access to the personal data.
   243   244   245   246   247   248   249   250   251   252   253