Know and understand the need for personal data to be kept confidential and protected to avoid inappropriate disclosure
Safety and Security – Personal Data Confidentiality
1. What is Personal Data?
Any information that can identify a living individual, directly or indirectly.
Sensitive personal data – health, ethnicity, religion, sexual orientation, biometric identifiers, or financial details.
2. Legal & Ethical Frameworks (Why They Matter)
These frameworks set the rules that organisations (including schools) must follow when handling personal data.
General Data Protection Regulation (GDPR) – EU‑wide regulation; applies to any body that processes data of people in the EU.
Data Protection Act 2018 (UK) – National implementation of GDPR; adds provisions for law‑enforcement and intelligence agencies.
Children’s Online Privacy Protection Act (COPPA) – US law protecting children < 13 years when they use online services.
ISO/IEC 27001 – International standard for an Information Security Management System (ISMS).
Copyright law (Section 9 of the syllabus) – Protects creators’ rights; unauthorised copying or distribution of software, images, music, etc., is illegal.
3. Data‑Protection Principles (Core of the Data‑Protection Act & GDPR)
These seven principles are the basis for AO1 (recall) questions. An organisation must be able to demonstrate compliance (accountability).
Principle
What it means
Lawful, fair & transparent processing
Collect data for a legitimate reason and inform the data subject.
Purpose limitation
Use data only for the purpose stated at collection.
Data minimisation
Collect the smallest amount of data necessary.
Accuracy
Keep data up‑to‑date and correct any errors.
Storage limitation
Delete or anonymise data when it is no longer needed.
Integrity & confidentiality (security)
Protect data with appropriate technical and organisational measures.
Accountability
Be able to demonstrate that all other principles are being met.
Example (AO2 – application): A school records pupils’ emergency contact numbers (purpose = safety). It stores the file on a password‑protected server, updates it each term, and permanently deletes it when a pupil leaves the school.
4. Common Types of Personal Data
Category
Examples
Identification
Name, date of birth, National Insurance/ID number, passport number
Contact details
Home address, telephone number, email address
Financial information
Bank account numbers, credit/debit card details, tax records
Health & biometric data
Medical history, DNA profile, fingerprint, facial‑recognition data
At least 12 characters, mix of upper/lower case, numbers, symbols. e.g. “G7!kPz$3mQb9”.
Two‑factor authentication (2FA)
Password + one‑time code sent to phone or generated by an authenticator app.
Encryption
Transforms data into unreadable code; only holders of the decryption key can read it. Used for files (AES), emails (PGP), and whole‑disk (BitLocker, FileVault).
Firewalls
Hardware or software that filters incoming/outgoing network traffic according to security rules.
SSL/TLS & digital certificates
Secure the link between a web browser and a server; the padlock icon shows the site uses HTTPS.
Access controls & role‑based permissions
Only authorised users can view or edit data; rights are set according to job role.
Regular software updates & patches
Install updates promptly to close known security vulnerabilities.
Secure disposal
Shred paper documents; use data‑wiping tools (e.g., DBAN) for hard drives before recycling.
Awareness & training
Regular lessons on phishing, safe password habits, and reporting procedures.
9. Practical Steps for Individuals (Checklist)
Lock computers, tablets and smartphones with passwords, PINs or biometrics.
Never post full name, address, or school name on public forums.
Review privacy settings on social‑media, gaming and messaging apps every 3–6 months.
Install and keep updated reputable antivirus/anti‑malware software.
Back up important files to an encrypted external drive or a trusted cloud service.
Use a password manager to generate and store unique passwords.
Report any suspected data breach or suspicious message to a teacher, IT officer or parent immediately.
Only use software, music, images or video that you have a legal licence for (copyright compliance).
10. Case Study – The Cost of a Data Breach (2022)
A small e‑commerce retailer stored customer credit‑card numbers in an unencrypted spreadsheet on a shared server. Hackers accessed the file, exposing 3 200 customers’ details.
Financial loss: £12 000 of fraudulent transactions.
GDPR fine: £75 000 for failing to implement appropriate security measures.
Reputational damage: 15 % drop in repeat customers within three months.
Remediation costs: £8 000 for forensic investigation, system upgrades and staff training.
Key lessons (AO2 – application): encrypt stored data, enforce 2FA for admin accounts, and schedule regular security audits.
11. Summary (Key Points for Exam Revision)
Personal and sensitive data must be kept confidential to protect privacy, prevent fraud and satisfy legal obligations.
The seven data‑protection principles guide how organisations should handle data (lawful processing, purpose limitation, data minimisation, accuracy, storage limitation, security, accountability).
Common threats include hacking, phishing, malware, social engineering, shoulder surfing and physical loss of devices.
eSafety behaviours—using trusted sites, managing privacy settings, respecting copyright, and reporting concerns—are essential for every learner.
12. Quick Quiz (Exam‑style Questions)
Which of the following is NOT considered personal data?
a) Email address
b) Favourite colour
c) National Insurance number
d) Date of birth
True or False: Using the same password for multiple accounts improves security.
Name two legal frameworks that require organisations to protect personal data.
What is the main purpose of two‑factor authentication?
List three common threats to personal data (choose any three from the syllabus).
Explain why encrypting stored data helps meet the “integrity & confidentiality” principle.
Suggested diagram: Flowchart of the personal‑data life‑cycle – Collection → Storage → Processing → Transfer → Disposal – with security checkpoints (encryption, access control, secure disposal) at each stage.
Support e-Consult Kenya
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources,
past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.