governs the use of this data and details the actions that can be taken by data subjects if their data is abused.
Back
Card 7
Front
makes it illegal to hack into a computer system and steal the data stored on it.
Back
Card 8
Front
allow different access rights to each area of the premises
Back
Card 9
Front
monitor and record what employees are doing.
Back
Card 10
Front
hardware or software which records the real time activity of a computer user, including the keyboard keys they press, or collects screen captures (prints)
Back
Card 11
Front
obtaining of the current position of a mobile phone
Back
Card 12
Front
a ‘text file’ which usually contains two pieces of information: a site name and unique user ID.