Section 1 - Types of information
Section 2 - Safe Storage and Efficient Retrieval
Safe storage is the ability to store data in a way so that it won’t get damaged, so with a physical document like a letter or application form it would be filed away into a folder, filing cabinet or even a computer (by scanning it onto the computer). The method of storage should be dictated by the importance and sensitivity of the data as this will dictate how much protection should be placed on a document. Highly sensitive information must be securely stored while less important things such as applications will have a folder in which they are all stored.
Retrieving information efficiently starts with both safe and smart storage. This is due to how information must be stored has to follow some logic otherwise it will be lost. If it follows this process usually there will be a system in place be it a filing system of alphabetical dependant on name for letters, or a numerical if looking at applications for information that are being complete. If this is followed in some form then it will be easy to find the information as you would just be able to follow a simple trail and quickly find the information that you need.
Section 3 - Different types of storage and retrieval system
Electronically applications for spreadsheets and databases are commonly used to store information that will be accessed frequently and used on at least a weekly basis as it allows easy access to those who need to use it and those who need to view and search for data it is an easy way to do so. Most of these applications have multiple uses as spreadsheets can be used to turn numeric data into graphs and charts and also calculate differences while databases can be used to create and run reports that can be sent out to others. For storing entire documents it is easy to just use the hard drive on your computer as you can implement multiple password checks and other locks such as pin codes to prevent unauthorised access though it may not be wise as if others need to access a document then it may mean a simple password should be used as to allow others to use it. Another form of this type of storage is using a cloud/off site location as this can allow for you to keep only the shortcuts to documents on your hard drive while allowing you access to the full document to change. By this being offsite it means any local issues that may damage a network will not affect the documents as they are not part of that system.
Section 4 - Legal Requirements
The main code that should be followed is the Data Protection Act 1998, due to it focusing on the storage of sensitive data. The DPA has 8 key principles to do with storing data they are as follows:
- be processed fairly and lawfully
- be obtained only for lawful purposes and not processed in any manner incompatible with those purposes.
- be adequate, relevant and not excessive.
- be accurate and current.
- not be retained for longer than necessary.
- be processed in accordance with the rights and freedoms of data subjects.
- be protected against unauthorized or unlawful processing and against accidental loss, destruction or damage.
- not be transferred to a country or territory outside the European Economic Area unless that country or territory protects the rights and freedoms of the data subjects
Each of these focuses on a specific way to keep data correctly protected. The first is self explanatory as it is just saying to get the data by legal means. The second follows the first but is focusing on what the data is to be used for. The third focuses on what data is to be collected so if I look at my job and use a skip licence I ask for things I need to complete the licence such as location of skip, size, duration, company applying. I wont ask them what driver is going as I don't need to know that information and as such is irrelevant to me and excess information. The fourth is basically asking is the data the most up to date version of it as to make sure there is no changes. the fifth is making sure that the data is only held for while it is needed this may mean holding it a while after in case any problems arise with it. The sixth is one that looks at how the information from the subject is collected, basically asking if the subject knew their information was taken and what it was being used for. The seventh is to protect in case the data is affected by an unforeseen circumstance such as hacking or fire, allowing the data to remain safe and protected even during these situations. The eighth is to protect against the data being transferred to somewhere without a form of data protection legislation implemented as to keep the data secure.