Menu Close

What types of information can be accessed under the Freedom of Information Act?

What types of information can be accessed under the Freedom of Information Act?

The Act covers all recorded information held by a public authority. It is not limited to official documents and it covers, for example, drafts, emails, notes, recordings of telephone conversations and CCTV recordings.

What are some examples of personal information?

Examples of personal information

  • a person’s name, address, phone number or email address.
  • a photograph of a person.
  • a video recording of a person, whether CCTV or otherwise, for example, a recording of events in a classroom, at a train station, or at a family barbecue.
  • a person’s salary, bank account or financial details.

What are some examples of information systems?

Examples of Information Systems

  • Transaction Processing System.
  • Management Information System.
  • Customer Relationship Systems.
  • Decision Support System.
  • Office Automation System.
  • Business Intelligence Systems.
  • Knowledge Management Systems.
  • Enterprise Collaboration System.

What are the 5 types of information system?

6 Types of Information Systems

  • Transaction Processing Systems.
  • Office Automation Systems.
  • Knowledge Management Systems.
  • Management Information Systems.
  • Decision Support Systems.
  • Executive Support System.

What type of documents are not allowed in the Freedom of Information Act?

Information/data that is NOT covered by the Freedom of Information Act (FOIA) includes: Non-agency records and personal records. Public requests for access to physical artifacts or scientific samples (e.g. core samples, sediment, rocks, fossils, specimen samples, blood samples).

What information is exempt from freedom of information?

Some exemptions require you to judge whether disclosure may cause a specific type of harm, for instance, endangering health and safety, prejudicing law enforcement, or prejudicing someone’s commercial interests. These are called prejudice-based exemptions.

What are the three types of sensitive information?

The three main types of sensitive information that exist are: personal information, business information and classified information.

What is not personal information?

Non-PII data, is simply data that is anonymous. This data can not be used to distinguish or trace an individual’s identity such as their name, social security number, date and place of birth, bio-metric records etc.

What are the 4 types of information systems?

Following are the TYPE of information system:

  • Transaction Processing System (TPS): Transaction Processing System are information system that processes data resulting from the occurrences of business transactions.
  • Management Information System (MIS):
  • Decision Support System (DSS):
  • Experts System:

What are the 3 types of information?

This guide will introduce students to three types of resources or sources of information: primary, secondary, and tertiary.

What are the 5 main components of an information system?

An information system is described as having five components.

  • Computer hardware. This is the physical technology that works with information.
  • Computer software. The hardware needs to know what to do, and that is the role of software.
  • Telecommunications.
  • Databases and data warehouses.
  • Human resources and procedures.

What are the four major types of information system?

There are four common types of information systems, and these are transaction processing systems, management information systems, decision-support systems, and executive support systems.

What do companies need to know about personal information?

Practical tips for business on creating and implementing a plan for safeguarding personal information. Most companies keep sensitive personal information in their files—names, Social Security numbers, credit card, or other account data—that identifies customers or employees.

What are the different types of personal information?

Different types of information present varying risks. Pay particular attention to how you keep personally identifying information: Social Security numbers, credit card or financial information, and other sensitive data. That’s what thieves use most often to commit fraud or identity theft.

What kind of data should you be collecting?

Eleven entrepreneurs from Young Entrepreneur Council (YEC) share what types of customer data they find most important as customer growth rates increase. 1. Track your Net Promoter Score. We ask all of our users, “How likely are you to recommend our product to a friend or colleague (on a scale of 1 to 10)?”

What’s the best way to protect your personal information?

TAKE STOCK. Know what personal information you have in your files and on your computers. SCALE DOWN. Keep only what you need for your business. LOCK IT. Protect the information that you keep. PITCH IT. Properly dispose of what you no longer need. PLAN AHEAD.