ITE4103 Tutorial06 Privacy
ITE4103 Tutorial06 Privacy
(7) After collecting data from the data subject, the data should not be kept longer than necessary by the data user. The
maximum length of time one should keep the data:
(a) 6 months.
(b) 1 year.
(c) 2 years.
(d) Same as required by the tax law.
(e) None of the above
(8) Suppose that I conduct a lucky draw on the Internet for prizes and participants have to fill in their names and
addresses. After the winners are drawn and prizes given out, can I use the information to send out my product
promotion material to all the participants?
(a) Yes, I can use it.
(b) Yes, I can use it if I tell the participants before they enter the draw and get their consent.
(c) No, I cannot do that because it will violate Principle 3 of the PDPO.
(d) No, I cannot do that because it will violate Principle 4 of the PDPO.
(9) I am a system administrator and I am responsible for the users’ personal data. This includes:
(a) The security of its storage from not being stolen or illegally duplicated.
(b) The safety of the data from physical damage, e.g. water, fire or typhoon.
(c) The safety of data is out of my system at that time.
(d) Both (a), (b) and (c).
(e) None of above.
(10) Principle 4 deals with the security of the personal data collected. This includes which one below?
(a) The data is not duplicated without authorization.
(b) The data is not changed without authorization.
(c) The data is not read without authorization.
(d) All of (a), (b) and (c)
(e) None of (a), (b) or (c).
Q 1 2 3 4 5 6 7 8 9 10
Ans e b a d d c e b d d
2. Provide Access: If your system does hold their personal data, you must provide the
individual access to this data. This involves sharing the personal information you have
stored about them, in a format that is understandable and accessible.
3. Correction Requests: Should there be any inaccuracies in the personal data you've
provided, the individual has the right to request corrections. You are required to make
these corrections to ensure the data is accurate and up-to-date, reflecting the true and
current state of the individual's personal information.
4. Handle Requests Promptly: The ordinance requires that these requests for access or
correction are handled within a reasonable timeframe. Ensure your processes are
efficient to meet this requirement.
5. Ensure Security: While processing these requests, maintain the security and
confidentiality of the individual's personal data. Any access or correction process must
not compromise the data's security.
6. Communicate Clearly: Inform the individual about the outcome of their request,
including any corrections made or reasons if a request cannot be fulfilled.
7. Document Compliance: Keep records of the request and your response to demonstrate
compliance with the PDPO.
b) After checking his/her information. The user discovers there are errors in his telephone number and photo. What
you should do to comply with the principle of Personal Data (privacy) Ordinance? (4 marks)
By complying the principle of Personal Data (privacy) Ordinance and according
to
Principle 6, I should correct the telephone number and the photo immediately,
otherwise I should stop using it if it cannot be corrected.
c) You want to employ an assistant system administrator to help you. But you are worry about the security of the user
data. List THREE requirements/capabilities for your assistant. (6 marks)
Under the Principle 4 of the PDPO, I (i.e. data user) am responsible for the security of
the data. The people that handle the data should be a person with
1. competence (with knowledge and skill to handle the tasks)
2. integrity (keep confidentiality of user data)
3. prudence (follow the security policy of the company with care)
- end -