Page 270 - DCAP104_EXPOSURE_TO_COMPUTER_DISCPLINES
P. 270

Unit 14: Taking Protected Measures



            invisible gif images are not web bugs, as some are used for alignment purposes. Web bugs are   Notes
            also known as clear gifs or 1 by 1 gifs or invisible gifs.
            The informations sent to the server are:

                 The IP address of the system that fetched the Web Bug
                 The URL of the page that the Web Bug is located on

                 The URL of the Web Bug image

                 The time the Web Bug was viewed
                 The type of browser that fetched the Web Bug image

                 A previously set cookie value.
            Networks use web bugs to add information to a personal profile of what sites a person is visiting.
            This information is stored in a database belonging to the ad network. This in turn determines
            what banner ad the user is shown. Web bugs are also used to gather statistics about web browser
            usage and independent accounting of the number of people who have visited a particular web
            site. Web bugs can be found by using the HTML source of a web page. The web bug is usually
            loaded from a different server than the rest of the page.

            14.6  Keeping your Data Secure


            After a series of catastrophic errors by big businesses and the government, data protection issues
            have been thrown into sharp relief. As criminals become more savvy to how they can use data
            and the public becomes more alert to the threats identity theft and careless handling of data pose,
            it’s become increasingly important for businesses to ensure their approach to data protection is
            as scrupulous as possible.
            14.6.1 The Data Protection Act

              (a)  The Data Protection Act came into force in 1998 and provides businesses and public bodies
                 with a series of regulations governing how they handle people’s personal information. If
                 you store any personal data on customers or employees, the Data Protection Act applies to
                 you.

              (b)  The information the Data Protection Act covers can be described as any information about
                 living, identified or identifiable individuals. It includes names, addresses, email addresses,
                 dates of birth, bank details and opinions expressed about an individual.

              (c)  The Data Protection Act is split into eight principles, which require that you:
                    1.  Process data fairly and according to the law

                    2.  Process data for a limited, lawful purpose
                    3.  Only hold enough information for your purpose—nothing excessive or extraneous

                    4.  Ensure the data you hold is accurate, relevant and up-to-date
                    5.  Don’t hold the data for any longer than necessary

                    6.  Process the data in line with individuals’ rights (below)



                                             LOVELY PROFESSIONAL UNIVERSITY                                   263
   265   266   267   268   269   270   271   272   273   274   275