Data Protection Training Module Legal Department 2017

Size: px
Start display at page:

Download "Data Protection Training Module Legal Department 2017"

Transcription

1 Data Protection Training Module Legal Department

2 Welcome to the Data Protection Training Module INSTRUCTIONS This training module is in 2 parts: Part 1 is a slideshow which you can progress at your own pace. When you have read through the slideshow, you will be instructed to complete part 2 of the training, which is a short test. To progress through the training: click your mouse (anywhere on the page) or use the right arrow on your keyboard to view the next section. To leave the training module, click Esc on your keyboard, at any time. 2

3 Why do we need mandatory data protection training? Assets: Information is one of the University s most valuable assets. Personal data is a vital asset the University needs to collect and process in order to function effectively. Risks: However, dealing with personal data is also a responsibility and a risk. The law dictates that we must protect personal data (and tells us how we must do this); it restricts what we are allowed to do with the personal data when it is in our possession; and gives data subjects rights over their data while we hold it. Compliance: The University cannot comply with the Data Protection Act unless staff are trained; and are aware of, and adhere to, the relevant University policies and procedures. Compliance is dependent upon the day to day actions of every member of staff. Most data breaches reported to the ICO are triggered by individuals making mistakes. For example, sending a single to the wrong recipient may be a breach of the law, with serious consequences for both the individuals involved and for the University. Action: Completing this training module, and familiarising yourself with University guidance about data protection issues relevant to your work, will help you to comply with University policies and with the law; and will reduce the risks to our students and staff. It should help you to feel more assured when dealing with personal data in your day to day role. 3

4 What s new? Data protection laws are changing: On 25 th May 2018, the Data Protection Act 1998 will be replaced by the GDPR (the General Data Protection Regulation). This is the biggest change to data protection laws in 20 years. While the main principles of data protection remain largely the same, the GDPR is much stricter than the current Act; more prescribed in terms of how we must comply; and the penalties for non compliance are more severe. The University has commenced its preparations for GDPR compliance. The GDPR emphasises accountability and the need to demonstrate compliance. The impact to the University is significant it will affect all Departments and Services; and all systems and processes involving personal data across the University. This training module serves as a refresher of the data protection principles and as a brief introduction to the GDPR. Further guidance and information will be produced throughout The Legal Department will also be contacting Services across the University, to determine where changes and additional support are required, in the coming weeks. 4

5 Training Menu You will be directed through the following sections in turn. Continue to the next page to learn about Key Terms... Key terms Compliance The 8 Principles of Data Protection Requests for personal data Resources 5

6 Key terms: It is important for anyone who works with personal data to understand the following terms: Data protection Personal data Sensitive personal data ICO Data subject Processing data Data controller & data processor Data protection refers to the Data Protection Act This is the current law in the UK that tells us how we must deal with personal data. All organisations (and staff) processing personal data must comply with the Act. The Act protects an individual s rights regarding their personal data and their right to privacy. It balances the individual s right to privacy with the needs of organisations to legitimately process the personal data of the people they deal with. Failure to comply with the Act is an offence. The GDPR will replace the DPA on 25 th May

7 Key terms: Data protection Personal data Sensitive personal data ICO Data subject Processing data Data controller & data processor Personal data is information about or relating to a living, identifiable person. Anonymised data is not personal data, so it can be processed (eg, worked on outside the University, or published) without risk. However, anonymising data requires care: it is not fully anonymised and remains personal data under the Act, if it is possible to identify someone indirectly from it. Just removing someone s name is not always enough to anonymise the data. Guidance on anonymisation is available at the end of the training. Pseudonomised data is information which has been partially anonymised, eg, using a key/identifier instead of a name for each person. While this can help to protect information, pseudonomised data is still personal data protected by the Act. Examples of personal data are: name, address, student status, expressions of opinion regarding the person, exam results and feedback. Exam scripts and academic coursework are not personal data as they are not about the individual (unless the content of the work is biographical). Personal data is not restricted to paper and electronic documents and s. It also includes photographs; CCTV & video footage; data on mobile devices and websites; and handwritten notes. 7

8 Key terms: Data protection Personal data Sensitive personal data ICO Data subject Processing data Data controller & data processor The Act recognises that certain categories of personal data require a higher degree of privacy than others; these categories are sensitive personal data, and are defined by the Act: Racial or ethnic origin Political opinions Religious (or similar) beliefs Trade union membership Physical or mental health/condition Sexual life The (alleged) commission of any offence by the data subject and associated proceedings or sentence of any court. The University s Data Classification Policy sets out procedures for processing data, according to its sensitivity. You will learn more about rules for processing personal and sensitive personal data in the section on the 8 Principles. Under GDPR, there will be some changes to the definitions for personal and sensitive personal data, eg, including genetic & biometric data. 8

9 Key terms: Data protection Personal data Sensitive personal data ICO Data subject Processing data Data controller & data processor The ICO is the Information Commissioner s Office the regulatory body which oversees compliance with the Data Protection Act in the UK. It: sets codes of practice for organisations. provides advice and guidance on how to comply. investigates complaints and data breaches. has the power to prosecute organisations and individuals, and impose monetary penalties of up to 500,000, for failure to comply with the Act. Guidance is available from the ICO website at: Under GDPR, fines will increase significantly: up to a maximum penalty of 2 million Euros or 4% of turnover 9

10 Key terms: Data protection Personal data Sensitive personal data ICO Data subject Processing data Data controller & data processor A data subject is the person who is the subject of the information the person the data relates to or is about. Staff and students are data subjects, because the University processes personal data about them. We also process personal data about other data subjects, including: next of kin/parents and relatives of students and staff non employed individuals, such as agency staff or those working under a contract for services applicants and enquirers referees research subjects business associates 10

11 Key terms: Data protection Personal data Sensitive personal data ICO Data subject Processing data Data controller & data processor Processing personal data means any action involving the data, from collecting the information for the first time, to the destruction of the data; and everything in between. Every time you view/read, amend, share or discuss, file, store or delete personal data, you are processing it. 11

12 Key terms: Data protection Personal data Sensitive personal data ICO Data subject Processing data Data controller & data processor Organisations that process personal data may be Data Controllers or Data Processors: The Data Controller is the organisation with authority to decide how and why personal data is processed. It is responsible for compliance with the Act. The University is a registered Data Controller. A Data Processor collects or processes personal data for a Data Controller, under the Data Controller s instructions. The University may use an external data processor for some activities; and it may also act as a data processor for another organisation. Arrangements involving sharing of personal data between Data Controllers, or with Data Processors, require a Data Sharing Agreement, which is a legal agreement, setting out the roles and responsibilities of each organisation. 12

13 Training Menu Key terms Compliance The 8 Principles of Data Protection Requests for personal data Resources 13

14 How the University complies with the Act: 1. Policies the Data Protection Policy applies to staff and students: Additional policies and procedures are also important for data protection compliance, these include Information Security, IT Services and Records Management policies. 2. Registration The University is a registered data controller. Our registration notice is published on the ICO s website. It sets out in detail how the University may process, and with whom it may share, personal data: New activities and data sharing arrangements should be checked against and recorded on our Registration. 3. Training, guidance and advice for staff is provided by the Legal Department. Contact legal@mmu.ac.uk 4. Subject Access Requests are managed by the Legal Department. Contact dataprotection@mmu.ac.uk 5. Staff the University s compliance is reliant upon the day to day actions of its staff when dealing with personal data. Training works only when staff complete it. Policies and guidance work only when staff read them, refer back to them when needed, and follow the instructions provided. Training materials, policies and guidance are tools provided by the University to enable staff to comply. 14

15 How you can comply: Training & awareness Manage Plan Report Respond promptly Training: Complete training when asked and refer back to it as a reference tool, when needed. Ensure that new staff in your team also receive training. Policies: Familiarise yourself with the Data Protection policy, and the other policies listed under Resources. The Data Classification Policy, Information Security Policy and several IT Services polices will be of particular practical use in enabling you to comply with the Data Protection Act. Awareness: Review your procedures and look for ways to reduce risks within your service. Look out for new guidance and instructions and ensure that you implement these within your Service. New guidance and instructions will be issued prior to May Look out for notices and s about Data Protection, Information Security and Records Management; check how these apply to your Service and implement any changes required. 15

16 How you can comply: Training & awareness Manage Plan Report Respond promptly Manage the personal data in your department: Establish procedures for dealing with personal data within your department/service. Check these against the 8 Principles (set out in this Module), and University policies & procedures, to identify ways of reducing risks. Setting practical procedures and protocols and dealing with personal data in a consistent way reduces the likelihood of individuals making mistakes. Ensure that Data Protection, Record Management and Information Security policies are fully implemented within your Service/Department. 16

17 How you can comply: Training & awareness Manage Plan Report Respond promptly Check whether new activities/projects (or changes to existing University procedures or systems) are likely to involve or impact upon personal data. If so, the project or activity will need to be assessed; and practical ways of ensuring that the activity is compliant will need to be incorporated into the activity. This may be as simple as identifying the need for a data sharing agreement; documenting the way you will share the data (eg encrypted attachment), or identifying that the information can be fully anonymised. This is known as a Privacy Impact Assessment, or PIA. This process should take place at the design phase of any activity; and prior to any agreement with another organisation. New guidance on PIA s will be issued soon. PIAs will be mandatory under GDPR 17

18 How you can comply: Training & awareness Manage Plan Report Respond promptly Report the following to the Legal Department immediately: Breaches/incidents and risks likely to result in a breach involving personal data. The Legal team will provide instructions regarding how to deal with the incident and limit any damage. Legal staff will investigate the breach, determine whether it should be reported to the ICO and provide followup instructions and advice regarding breach prevention. What is a breach? A breach/incident includes any loss, or unauthorised disclosure involving personal or sensitive personal data. Complaints relating to personal data. Under GDPR, it will be mandatory to report all serious data breaches to the ICO within 72 hours 18

19 How you can comply: Training & awareness Manage Plan Report Respond promptly If you are contacted about any data protection related matter you must act quickly: Subject Access Requests are subject to strict timescales. If you receive a SAR, send it to the Legal Department immediately. If you are asked by the Legal Department for information, you must respond quickly. Complaints, incidents and breaches must all be reported and investigated quickly. The more quickly they are reported, the greater the chance of reducing any harm. Delays may result in missed deadlines and a further breach of the Act. Police requests are often urgent and may impact an individual s safety or welfare all police requests should be referred to Legal or to Security. Under GDPR, deadlines will be reduced, increasing the burden on the University. The risk of any delay will also increase, eg: we could be penalised twice a fine for the original incident leading to a breach/complaint and a second fine for the delay in reporting/responding. 19

20 Training Menu Key terms Compliance The 8 Principles of Data Protection Requests for personal data Preparing for GDPR: 2018 Resources 20

21 The 8 Data Protection Principles The 8 Principles are defined by the Data Protection Act. A breach of any one of the 8 Principles is a breach of the Act. They are important as they have practical implications for how you deal with personal data in your day to day role: A summary of the 8 Principles is provided below. You will learn more about each principle in the following slides. Personal data must be: 1. Obtained fairly & lawfully 2. Processed for specified & lawful purposes 3. Adequate, relevant and not excessive 4. Kept accurate and up to date 5. Kept no longer than necessary 6. Processed in accordance with the data subject s rights 7. Kept safe & secure 8. Not transferred outside the EEA 21

22 Principle 1 Personal data must be obtained and processed fairly and lawfully, and not processed unless certain conditions are met: Fairness means transparency: we must communicate to data subjects, in a privacy notice, what data we will collect and process, the purpose of the processing, who we will share it with and how long we will retain it. We can only process personal data if one of the Conditions under Schedule 2 of the Act applies. Sensitive data can only be processed if we can satisfy a condition under Schedule 2 and a condition under Schedule 3. Schedule 2 Conditions: Consent from the data subject, or Necessary for fulfilment of a contract Necessary for fulfilment of a legal obligation Necessary to protect the vital interests of a person Necessary for justice/public functions in the public interest Necessary for legitimate interests The Legal Dept will determine if a condition applies and if the processing meets the general principle of fair and lawful. Under GDPR, we will have to provide much more information in our privacy notices, such as the source of personal data held. We may need to create privacy notices for each University service. The conditions for processing will also change and it will be more difficult to rely on consent. Valid consent can only be by active opt in; as opt outs, silence, inaction or lack of response are no longer valid. The legitimate interests condition will no longer be available for public authorities. 22

23 Principle 2 Personal data must be obtained for specified and lawful purposes and not processed in any manner incompatible with those purposes: This means that, once we have collected and are holding personal data, we cannot then use the data for another activity or for any reason the data subject would not expect or did not originally agree to. Any use of personal data should be checked against what the data subject was originally told and the consent previously provided. Any additional or re use of the data collected for some other purpose will normally require obtaining new consent from the data subject. This principle is of particular relevance to staff involved in research or marketing activities. Just because the University holds data about lots of students, it does not mean we can then use that data to conduct research, or use/share that information for advertising purposes, without notifying or obtaining the data subject s consent. 23

24 Principle 3 3 Personal data must be adequate, relevant and not excessive for the purpose: We must collect sufficient information for the intended purpose; insufficient data may be a breach under Principle 3, for example, destroying a student s marks or feedback before an Exam Board or before the deadline for submitting an appeal. However, too much information may also be a breach anything that isn t required is an unnecessary invasion of privacy. Collect and retain the minimum data necessary for the stated purpose. Collecting or recording information in case it might be useful is not permitted. Beware of recording or sharing opinions or excessive details stick to factual information. This principle is also important when designing forms / questionnaires, stick to what is relevant and necessary. The GDPR emphasises data minimisation (collecting and using the minimum data necessary to fulfil the purpose) and privacy by design (determining at the outset the data required for the purpose). 24

25 Principle 4 Principle 4 Personal data must be accurate and kept up to date: Mistakes in this area are easy to make, but can have serious consequences: Failing to update an address quickly or accurately can result in a disclosure of data to the wrong person. Simple procedures and good practice can prevent a breach: Always use central sources of data (eg QLS) where possible these are most likely to be up to date and accurate. Avoid creating unnecessary copies of data (such as your own list of contacts) which will quickly become out of date and inaccurate. Act promptly to ensure that records are updated quickly when there is any change in staff/student circumstances or data. Ensure records are checked and updated regularly. Follow the University s record management policy and schedule. Regularly destroy out of date information and data which is no longer required. 25

26 Principle 5 Principle 5 Personal data must not be kept for longer than is necessary for the purpose: Effective records management is vital for data protection compliance: You should not store information indefinitely just in case keeping data for too long is a breach of Principle 5. Regularly review, archive and delete older data. Information no longer needed or out of date should be safely destroyed/deleted. Records management applies not just to paper files/documents but to electronic records and s. Ensure you are familiar with the University s Record Management policy and retention schedules applicable to your area. See: management/ Paper & electronic files and s should be tidy and well organised. You should know what data you are holding and where to find it, quickly, when required. Instructions on how to dispose of confidential waste (including items such as CDs/DVDs) are available on the University website, see: waste diposal guidance.pdf For instructions on how to dispose of IT equipment, contact IT Services. Under GDPR, we will have to include retention periods in our privacy notices 26

27 Principle 6 Personal data must be processed in accordance with the data subject s rights under the Act: These include the right to: know why their data is being collected, what it will be used for, how long it will be kept for; know who the University will share their data with; ask for access to the data that the University holds about them; give permission for their data to be held/processed; to opt out of unnecessary processing; object to data processing that causes damage or distress. More information about the data subject s right of access is provided in this module in the section on Requests for Personal Data. Under GDPR, data subjects will have more rights; and the timescales for the University to respond will be reduced. 27

28 Principle 7 Personal data must be kept safe from unauthorised access and processing, and from accidental loss, damage or destruction Breaches of Principle 7 are the most common cause of fines issued by the ICO, usually as a result of a simple error by an individual. Because of the potential for serious harm as a result of a breach in data security, the Information Commissioner has imposed fines on organisations even where a breach caused no unauthorised disclosure or actual harm to the data subject. Practical advice for staff on measures for keeping personal (and other types of confidential) data secure is provided in the next slide. 28

29 Principle 7: Data security measures for staff Identity checks Access controls Secure systems Physical security s Verify the identity of data subjects before you release any information to them, for example: check the ID badge, take and compare signatures, ask for verifying information that matches their student/staff record, such as their date of birth or national insurance number, request a copy of their driving licence/passport. The exact method of identity check will vary, depending upon whether the individual is current or former staff/student and the nature of the situation. Set a departmental protocol for identity checks, especially if you regularly disclose information to staff/students. 29

30 Principle 7: Data security measures for staff Identity checks Access controls Secure systems Physical security Implement departmental controls to restrict access to systems/documents containing personal data, so that only those staff who are authorised and need to view the data for specific work purposes can do so. Personal data should not be available to all staff at all times, just in case it might be useful. Information should be available and shared on a need to know basis only. s 30

31 Principle 7: Data security measures for staff Identity checks Access controls Secure systems Physical security s Use the secure areas provided (or approved by) the University for working on and storing personal data such as encrypted devices and network drives. Software and cloud storage solutions which are not approved by the University are a risk as they may store information on servers outside the EEA, which may breach Principle 8 of the Act. Do not download or store any data on nonencrypted computers/devices. Refer to the Data Classification Policy for more details on how to store/send information according to its level of sensitivity. 31

32 Principle 7: Data security measures for staff Identity checks Access controls Secure systems Physical security s Keep documents and screens out of sight of others Position computer screens so that they cannot be viewed by an unauthorised person from a window or glass partition behind you Use screen locks when you move away from your desk Use secure passwords Lock doors and filing cabinets Clear your desk! Tidy confidential data away when it is not being used. Papers containing personal data should not be taken out of the University. Anonymising data makes it safe. Pseudonymising data also reduces risk. 32

33 Principle 7: Data security measures for staff Identity checks s require particular care: Once you click send, s cannot be retrieved. Remember: STOP CHECK SEND Access controls Secure systems Physical security s is not generally a secure method for transmitting personal data use these checks to avoid a breach: Does it contain personal data? Is it ok to ? Check the Data Classification Policy. Remove unnecessary content and attachments. Avoid forwarding entire s, trails, and attachments, unless you have checked it for personal data and it is necessary for recipients to see. Sensitive content can be sent in an encrypted attachment (password protected word or pdf document) with the password provided separately. Beware of the autocomplete function which can easily result in s being sent to the wrong recipient. Should you blind copy (bcc) the recipients? Do you have the sender s permission to forward or share their name/ address? 33

34 Principle 7: Data security measures for staff Identity checks Beware autocomplete! When you start to type the name of a recipient, Outlook will suggest addresses you have used before. It is very easy to accidentally select the wrong one without realising. Access controls Secure systems Physical security s Always double check the address you have selected before you hit Send. Regularly clear the autocomplete memory, so that out of date contacts or those you no longer need are removed from the suggestions box/list: Go to File, Option, Mail, and click on the Empty Auto Complete Listbutton (under the Send Messages header). Disable autocomplete this is recommended for all staff who regularly individual students, and those dealing with sensitive personal data. If you choose this option, instead of relying on autocomplete, you will need to type the name of the recipient / address, or select an address from the address book, by clicking the To, Cc, or Bcc button: In Outlook click the File tab. Select Options from the menu on the left, then Mail. Scroll down to Send messages and un check the Use Auto Complete List to suggest names when typing in the To, Cc, and Bcc lines box. Autocomplete can be re enabled again, at any time, by following the steps above and re checking the box. 34

35 Principle 7: Data security measures for staff Identity checks Access controls Secure systems Physical security When to use the bcc function: Multiple recipients There are two types of group 1. Where the recipients need to know who the other recipients are, to have an conversation with each other. In this case, you should insert the recipients into the to or cc fields. 2. Where the recipients do not need to know who the other recipients are. The is sent to multiple recipients for convenience, where sending one is preferable to lots of separate s (eg, as a mail shot). In this case, it is unlikely that the recipients have consented to having their contact details (or the contents of the mail as it relates to them), shared with the other recipients. In this situation, you should always use the bcc (blind copy) function so the recipients can t identify each other: s 35

36 Principle 8 Personal data must not be transferred to a country outside the EEA*, unless that country has equivalent levels of protection for personal data: As Data Controller, the University is responsibile for protecting personal data which is sent, transferred to, or stored in non EEA countries. Contractual clauses therefore need to be sufficient to ensure protection in countries where there is no Data Protection Act (or equivalent) in place. If your project is doing business with a company outside the EEA, you must ensure the Data Protection clauses in the contract are approved by the Legal Department. Many types of software and mobile app providers are not UK based and they store information outside the EEA, via the cloud. You should only use the University s approved methods of data sharing and storage. See the University s IT Services policies & guidance for more information. If in doubt, contact the Legal Department. *The UK s decision to leave the EU has not resulted in any change to this requirement. We still need to comply with these rules. 36

37 Training Menu Key terms Compliance The 8 Principles of Data Protection Requests for personal data Resources 37

38 Requests for personal data Please send me all the info you have about me Data subjects Third parties All written information held for/on behalf the University may be released to the data subject, including items normally considered private or confidential. A data subject s request to see their personal data is called a Subject Access Request (SAR). 38 The University charges a fee of 10 for a SAR. The Data Protection Act says that SARs must be responded to promptly and within 40 calendar days. Failure to comply with a SAR is an offence. The Legal Department manages SARs, checking the request is valid, advising which information must be disclosed (or withheld) under the Act, and ensuring that no personal data relating to any other person is released. Staff are also responsible for complying with SARs Under GDPR, the SAR deadline will reduce from 40 days to 1 month; and we will no longer be able to charge a fee.

39 Requests for personal data Data subjects Third parties Staff are also responsible for Subject Access Requests: Promptly refer all Subject Access Requests received to A SAR is any written ( or paper) request for their own personal data. It doesn t have to say SAR, subject access or data protection. Promptly respond to the Legal Department providing copies of the data requested. Note: it is an offence to delete or destroy information to avoid disclosure via a SAR. Ensure your records and s, are well organised, so you can identify and retrieve information quickly, on request. Comply with record management policies and destroy / delete data at the end of its retention period. This will make it much easier to respond to requests within the legal time limits. Failure to provide data in time (because you have too much data or it is not sufficiently organised) is a breach of the Act. Never assume anything you write on University records or s will be private. 39

40 Requests for personal data Data subjects Third parties Not all requests from a data subject need to be formal SARs: The University s duty is to ensure that information is easily accessible to data subjects. A request will require a formal SAR if the data subject asks for: a high volume of data ( send me all data about me ), data which is not normally or routinely released, or documents containing personal data about more than one person. However, a student should not have to pay 10, submit a formal request and wait for up to 40 days for a simple document he/she has already seen previously, such as a copy of a council tax exemption certificate or a feedback sheet. Check with the Legal Department about any requests you regularly receive for personal data, for advice on establishing a protocol for dealing with them. Requests for transcripts of marks should be referred directly to awards@mmu.ac.uk 40

41 Requests for personal data Data subjects Third parties The default position is that information about staff and students should not be shared with any third party without the data subject s consent. However, there are some exceptions to this rule, such as part of a formal data sharing arrangement which has been approved by the Legal Department, or where an exemption under the Data Protection Act applies. Third parties are : All external organisations (eg, police, solicitors, Council Tax offices, business partners) All individuals other than the data subject him/herself (such as parents and relatives). What to do if a third party individual/organisation asks for personal data: Contact the Legal Department: legal@mmu.ac.uk For urgent/emergency situations outside of normal office hours, contact Security If you are regularly asked for particular types of personal data, eg Council Tax exemption requests, or employers/sponsors who fund students, contact the Legal Department for advice on setting a protocol for dealing with these. If you need to set up a data sharing arrangement with any third party organisation, contact the Legal Department for advice. Parents: The University is not permitted to release or discuss personal data relating to a student with parents/friends or relatives, without the student s consent. This is made clear in our data protection statement to students: For advice on dealing with queries from parents, contact the Legal Department. More detailed guidance on dealing with parents will soon be published on the Legal Department s website. 41

42 Training Menu Key terms Compliance The 8 Principles of Data Protection Requests for personal data Resources 42

43 Resources University Resources: Data Protection Policy: CCTV Policy: Information Security and IT Services policies: This includes Data Classification, Mobile Devices, Acceptable Use, etc. E Security Training is available for any staff who would like further training in information security. This can be completed at your own pace as a complete training module, or used as a reference tool, by viewing the particular section(s) of interest. See: Staff Resources Section in Moodle. Log in here: Records Management: management/ Student Reference Policy (writing references for students): This is available on the CELT website, under Supporting Student Success, then Personal Tutoring. See the following link (you will need to log in): Contact us: Legal Department: legal@mmu.ac.uk External Resources: Information Commissioner s Office: For more detailed guidance available online, such as the ICO Guide to Anonymisation 43

44 To complete your training, please go the Data Protection Test in Moodle. Good luck! 44

Subject: Kier Group plc Data Protection Policy

Subject: Kier Group plc Data Protection Policy Kier Group plc Data Protection Policy Subject: Kier Group plc Data Protection Policy Author: Compliance Document type: Policy Authorised by: Kier General Counsel & Company Secretary Version 3 Effective

More information

UWTSD Group Data Protection Policy

UWTSD Group Data Protection Policy UWTSD Group Data Protection Policy Contents Clause Page 1. Policy statement... 1 2. About this policy... 1 3. Definition of data protection terms... 1 4. Data protection principles..3 5. Fair and lawful

More information

PS Mailing Services Ltd Data Protection Policy May 2018

PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Limited is a registered data controller: ICO registration no. Z9106387 (www.ico.org.uk 1. Introduction 1.1. Background We collect

More information

COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2

COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2 COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September 2018 Table of Contents 1. Scope, Purpose and Application to Employees 2 2. Reference Documents 2 3. Definitions 3 4. Data Protection Principles

More information

DATA PROTECTION POLICY THE HOLST GROUP

DATA PROTECTION POLICY THE HOLST GROUP DATA PROTECTION POLICY THE HOLST GROUP INTRODUCTION The purpose of this document is to provide a concise policy regarding the data protection obligations of The Holst Group. The Holst Group is a data controller

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Data Protection Policy Version 3.00 May 2018 For more information, please contact: Technical Team T: 01903 228100 / 01903 550242 E: info@24x.com Page 1 The Data Protection Law...

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Addressing the General Data Protection Regulation (GDPR) 2018 [EU] and the Data Protection Act (DPA) 2018 [UK] For information on this Policy or to request Subject Access please

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions After having undertaken a period of research within recreational cricket, this document is aimed at addressing the frequently asked questions from cricket Clubs, Leagues, Boards

More information

General Data Protection Regulation (GDPR) Key Facts & FAQ s

General Data Protection Regulation (GDPR) Key Facts & FAQ s General Data Protection Regulation (GDPR) Key Facts & FAQ s GDPR comes into force on 25 May 2018 GDPR replaces the Data Protection Act 1998. The main principles are much the same as those in the current

More information

Islam21c.com Data Protection and Privacy Policy

Islam21c.com Data Protection and Privacy Policy Islam21c.com Data Protection and Privacy Policy Purpose of this policy The purpose of this policy is to communicate to staff, volunteers, donors, non-donors, supporters and clients of Islam21c the approach

More information

This Policy has been prepared with due regard to the General Data Protection Regulation (EU Regulation 2016/679) ( GDPR ).

This Policy has been prepared with due regard to the General Data Protection Regulation (EU Regulation 2016/679) ( GDPR ). PRIVACY POLICY Data Protection Policy 1. Introduction This Data Protection Policy (this Policy ) sets out how Brital Foods Limited ( we, us, our ) handle the Personal Data we Process in the course of our

More information

Guardian Electrical Compliance Ltd DATA PROTECTION GDPR REGULATIONS POLICY

Guardian Electrical Compliance Ltd DATA PROTECTION GDPR REGULATIONS POLICY 1. Statement of Policy (Guardian) needs to collect and use certain types of information about the Individuals or Service Users with whom they come into contact in order to carry on our work. This personal

More information

INNOVENT LEASING LIMITED. Privacy Notice

INNOVENT LEASING LIMITED. Privacy Notice INNOVENT LEASING LIMITED Privacy Notice Table of Contents Topic Page number KEY SUMMARY 2 ABOUT US AND THIS NOTICE 3 USEFUL WORDS AND PHRASES 4 WHAT INFORMATION DO WE COLLECT? 4 WHY DO WE PROCESS YOUR

More information

ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION

ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION Document Control Owner: Distribution List: Data Protection Officer Relevant individuals who access, use, store or

More information

Data Protection. Policy

Data Protection. Policy Data Protection Policy Policy adopted: April 2016 Policy review date: April 2018 OAT Model Policy 1 Contents 1. Policy statement and principles... 3 1.1 Policy aims and principles... 3 1.2 Data protection

More information

Data Protection Policy

Data Protection Policy Introduction In order to; provide education, training, assessment and qualifications to its customers and clients, promote its services, maintain its own accounts and records and support and manage its

More information

Introductory guide to data sharing. lewissilkin.com

Introductory guide to data sharing. lewissilkin.com Introductory guide to data sharing lewissilkin.com Executive Summary Most organisations carry out some form of data sharing, whether it be data sharing between organisations within the group or with external

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY 1 Your Data Protection Responsibilities DATA PROTECTION POLICY 1.1 Everyone has rights with regard to how their personal data is handled. Personal data is any information that a person can be identified

More information

About the information we collect We collect and process personal data including but not limited to:-

About the information we collect We collect and process personal data including but not limited to:- Privacy Policy About us TP Supported Accommodation is responsible for collecting, processing, storing and safe keeping of personal information as part of our business activities. We manage information

More information

Privacy notice. Last updated: 25 May 2018

Privacy notice. Last updated: 25 May 2018 Privacy notice Last updated: 25 May 2018 www.courtprice.co.uk ('Website') is provided by Courtprice Limited ('we'/'us'/'our'). In doing so, we may be in a position to receive and process personal information

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Introduction Stewart Watt & Co. is law firm and provides legal advice and assistance to its clients. It is regulated by the Law Society of Scotland. The personal data that Stewart

More information

Privacy Notice - General Data Protection Regulation ( GDPR )

Privacy Notice - General Data Protection Regulation ( GDPR ) THIS PRIVACY NOTICE APPLIES TO ANY PERSON WHO INSTRUCTS AN INDIVIDUAL BARRISTER AT 12 OLD SQUARE CHAMBERS EITHER DIRECTLY OR THROUGH A SOLICITOR OR WHO ASKS THE INDIVIDUAL BARRISTER FOR A REFERENCE Privacy

More information

Data Protection Policy

Data Protection Policy The Worshipful Company of Framework Knitters Data Protection Policy Addressing the General Data Protection Regulation (GDPR) 2018 [EU] and the Data Protection Act 1998 (DPA) [UK] For information on this

More information

MBNL Landlord Privacy Notice. This notice sets out how we handle landlord personal data as part of our General Data Protection policies (GDPR).

MBNL Landlord Privacy Notice. This notice sets out how we handle landlord personal data as part of our General Data Protection policies (GDPR). MBNL Landlord Privacy Notice This notice sets out how we handle landlord personal data as part of our General Data Protection policies (GDPR). SUMMARY This Privacy Notice applies to: users of our website

More information

ADMA Briefing Summary March

ADMA Briefing Summary March ADMA Briefing Summary March 2013 www.adma.com.au Privacy issues are being reviewed globally. In most cases, technological changes are driving the demand for reforms and Australia is no exception. From

More information

Motorola Mobility Binding Corporate Rules (BCRs)

Motorola Mobility Binding Corporate Rules (BCRs) Motorola Mobility Binding Corporate Rules (BCRs) Introduction These Binding Privacy Rules ( Rules ) explain how the Motorola Mobility group ( Motorola Mobility ) respects the privacy rights of its customers,

More information

Privacy Notice. General Information Protection Regulation ( GDPR )

Privacy Notice. General Information Protection Regulation ( GDPR ) Privacy Notice General Information Protection Regulation ( GDPR ) Please read the following information carefully. This privacy notice contains information about the information collected, stored and otherwise

More information

HOW WE USE YOUR INFORMATION

HOW WE USE YOUR INFORMATION HOW WE USE YOUR INFORMATION Herold Mediatel Ltd compiles the Gibraltar Telephone Directory on behalf of Gibtelecom. Every care is taken to render this Directory as accurate as possible but neither Herold

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY DATA PROTECTION POLICY Introduction The purpose of this document is to provide a concise policy regarding the data protection obligations of Youth Work Ireland. Youth Work Ireland is a data controller

More information

Data protection legal jungle or common sense Susan Healy. Religious Archives Group 22 Mar 2010

Data protection legal jungle or common sense Susan Healy. Religious Archives Group 22 Mar 2010 Data protection legal jungle or common sense Susan Healy Religious Archives Group 22 Mar 2010 In this presentation Things you need to know Things you need to do and not do Particular issues? Things you

More information

Creative Funding Solutions Limited Data Protection Policy

Creative Funding Solutions Limited Data Protection Policy Creative Funding Solutions Limited Data Protection Policy CONTENTS Section Title 1 Introduction 2 Why this Policy Exists 3 Data Protection Law 4 Responsibilities 5 6 7 8 9 10 Data Protection Impact Assessments

More information

UWC International Data Protection Policy

UWC International Data Protection Policy UWC International Data Protection Policy 1. Introduction This policy sets out UWC International s organisational approach to data protection. UWC International is committed to protecting the privacy of

More information

Made In Hackney Data Protection Policy Last Updated:

Made In Hackney Data Protection Policy Last Updated: Made In Hackney Data Protection Policy Last Updated: 16.05.2018 Definitions Charity GDPR Responsible Person Register of Systems Made In Hackney (MIH), a registered charity. means the General Data Protection

More information

You will see lots of references in the Checklist to the GDPR Pack if you would like to purchase this, go to

You will see lots of references in the Checklist to the GDPR Pack if you would like to purchase this, go to Suzanne Dibble 2018. Copyright in this document belongs to Suzanne Dibble. You may not copy or use it for any purpose unless you have purchased this template document from Suzanne Dibble. You may not allow

More information

DATA PROTECTION IN RESEARCH

DATA PROTECTION IN RESEARCH DATA PROTECTION IN RESEARCH Document control Applicable to: All employees and research students Date first approved February 2006 Date first amended May 2015 Date last amended May 2015 Approved by Approval

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY DATA PROTECTION POLICY Introduction 1 In undertaking the business of the University of Stirling, we all create, gather, store and process large amounts of data on a variety of data subjects such as on

More information

GDPR - Are you ready?

GDPR - Are you ready? GDPR - Are you ready? Anne-Marie Bohan and Michael Finn 24 March 2018 Matheson Ranked Ireland s Most Innovative Law Firm Financial Times 2017 International Firm in the Americas International Tax Review

More information

Privacy and Data Protection Policy

Privacy and Data Protection Policy Privacy and Data Protection Policy Introduction 1. The Ripple Pond is committed to ensuring the secure and safe management of personal data held by the Charity in relation to Beneficiaries, Staff, Trustees,

More information

The Data Protection Act 1998

The Data Protection Act 1998 The Data Protection Act 1998 1. Terms 2. The principles of The Data Protection Act 3. Disclosure of Information 4. Subject Access 5. Enforcement 6. Data Security 7. Recording of Contact Exemptions All

More information

Adkin s Privacy Information Notice for Clients, Contractors, Suppliers and Business Contacts

Adkin s Privacy Information Notice for Clients, Contractors, Suppliers and Business Contacts Adkin s Privacy Information Notice for Clients, Contractors, Suppliers and Business Contacts POLICY STATEMENT Adkin is committed to protecting and respecting the privacy of all of our clients. This Policy

More information

Cognizant Careers Portal Privacy Policy ( Policy )

Cognizant Careers Portal Privacy Policy ( Policy ) Cognizant Careers Portal Privacy Policy ( Policy ) Date: 22 March 2017 Introduction This Careers Portal Privacy Policy ("Policy") applies to the Careers portal on the Cognizant website accessed via www.cognizant.com/careers

More information

Access Rights and Responsibilities. A guide for Individuals and Organisations

Access Rights and Responsibilities. A guide for Individuals and Organisations Access Rights and Responsibilities A guide for Individuals and Organisations This guide is aimed at both individuals and organisations. It is designed to bring individuals through the process of making

More information

Privacy Policy GENERAL

Privacy Policy GENERAL Privacy Policy GENERAL This document sets out what information Springhill Care Group Ltd collects from visitors, how it uses the information, how it protects the information and your rights. Springhill

More information

WEBSITE PRIVACY POLICY

WEBSITE PRIVACY POLICY WEBSITE PRIVACY POLICY INTRODUCTION Welcome to the Octopus Group s privacy policy ( Privacy Policy ) Octopus Group respects your privacy and is committed doing the right thing when it comes to protecting

More information

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information Privacy Statement Introduction Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information about how IT Support (UK) Ltd handle personal information.

More information

Within the meanings of applicable data protection law (in particular EU Regulation 2016/679, the GDPR ):

Within the meanings of applicable data protection law (in particular EU Regulation 2016/679, the GDPR ): Privacy Policy Introduction Ikano S.A. ( Ikano ) respects your privacy and is committed to protect your Personal Data by being compliant with this privacy policy ( Policy ). In addition to Ikano, this

More information

If you have any questions about this notice, please contact the Head Master.

If you have any questions about this notice, please contact the Head Master. Parent Privacy Notice Introduction This notice is to help you understand how and why we collect personal information about you and what we do with that information. It also explains the decisions that

More information

Rights of Individuals under the General Data Protection Regulation

Rights of Individuals under the General Data Protection Regulation Rights of Individuals under the General Data Protection Regulation 2018 Contents Introduction... 2 Glossary... 3 Personal data... 3 Processing... 3 Data Protection Commission... 3 Data Controller... 3

More information

Heavers Farm Primary School DATA PROTECTION AND INFORMATION MANAGEMENT POLICY Updated 2017

Heavers Farm Primary School DATA PROTECTION AND INFORMATION MANAGEMENT POLICY Updated 2017 Heavers Farm Primary School DATA PROTECTION AND INFORMATION MANAGEMENT POLICY Updated 2017 Introduction The Data Protection Act 1998 (the Act) is the primary legislation in the United Kingdom, which regulates

More information

UUEAS Privacy policy - Members

UUEAS Privacy policy - Members UUEAS Privacy policy - Members The Union of UEA Students (The Union) is an independent charity, whose primary goal is to represent the students at the University of East Anglia. Every student at UEA is

More information

St Bernard s Primary School Data Protection Policy

St Bernard s Primary School Data Protection Policy St Bernard s Primary School Data Protection Policy St Bernard s RC Primary School, A Voluntary Academy Approved by Governors: 11.11.2015 Review date: Autumn 2016 St Bernard s Data Protection Policy General

More information

Element Finance Solutions Ltd Data Protection Policy

Element Finance Solutions Ltd Data Protection Policy Element Finance Solutions Ltd Data Protection Policy CONTENTS Section Title 1 Introduction 2 Why this Policy Exists 3 Data Protection Law 4 Responsibilities 5 6 7 8 9 10 Data Protection Impact Assessments

More information

Brasenose College ICT Systems Privacy Notice (v1.2)

Brasenose College ICT Systems Privacy Notice (v1.2) Brasenose College ICT Systems Privacy Notice (v1.2) A summary of what this notice explains Brasenose College is committed to protecting the privacy and security of personal data. This notice applies to

More information

The Data Protection Act 1998 and the Use of Personal Data for IT Administration

The Data Protection Act 1998 and the Use of Personal Data for IT Administration Introduction The Data Protection Act 1998 and the Use of Personal Data for IT Administration 1. This document has been drawn up to provide guidance to University IT staff who need to use real data about

More information

This article will explain how your club can lawfully process personal data and show steps you can take to ensure that your club is GDPR compliant.

This article will explain how your club can lawfully process personal data and show steps you can take to ensure that your club is GDPR compliant. GDPR and BMC Clubs Lawful basis for Processing Personal Data This article will explain how your club can lawfully process personal data and show steps you can take to ensure that your club is GDPR compliant.

More information

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy.

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy. I. OBJECTIVE ebay s goal is to apply uniform, adequate and global data protection

More information

Privacy Notice For Ghana International Bank Plc customers

Privacy Notice For Ghana International Bank Plc customers Privacy Notice For Ghana International Bank Plc customers You may be aware of the European Union s General Data Protection Regulation (GDPR), effective as from 25th May 2018. Ghana International Bank Plc

More information

Data Protection and Information Security. Presented by Emma Hawksworth Slater and Gordon

Data Protection and Information Security. Presented by Emma Hawksworth Slater and Gordon Data Protection and Information Security Webinar Presented by Emma Hawksworth Slater and Gordon 1 3 ways to participate Ask questions link below this presentation Answer the polls link below this presentation

More information

The British Museum. Data Protection Code of Practise. 1 Introduction

The British Museum. Data Protection Code of Practise. 1 Introduction The Data Protection Code of Practice 1 Introduction 1.1 The 1998 Data Protection Act is aimed at ensuring a balance between individuals rights to privacy and the lawful processing of personal data undertaken

More information

This information accompanies the online data sharing best practice guidance commissioned by ACE

This information accompanies the online data sharing best practice guidance commissioned by ACE Data Protection - What the regulations say This information accompanies the online data sharing best practice guidance commissioned by ACE The guidance cannot be relied upon as legal advice. This document

More information

This Privacy Policy applies if you're a customer, employee or use any of our services, visit our website, , call or write to us.

This Privacy Policy applies if you're a customer, employee or use any of our services, visit our website,  , call or write to us. Privacy Policy Background This policy explains when and why we collect personal information about you; how we use it, the conditions under which we may disclose it to others and how we keep it secure.

More information

DATA SECURITY - DATA PROTECTION ACT

DATA SECURITY - DATA PROTECTION ACT DATA SECURITY - DATA PROTECTION ACT Data Security - Data Protection Act Many businesses are totally reliant on the data stored on their PCs, laptops, networks, mobile devices and in the cloud. Some of

More information

Data Protection Privacy Notice

Data Protection Privacy Notice PETA Limited Page 1 of 7 Data Protection Privacy Notice PETA Limited provides a range of services to both members of the public and to those employed within business. To enable us to provide a service,

More information

DEPARTMENT OF JUSTICE AND EQUALITY. Data Protection Policy

DEPARTMENT OF JUSTICE AND EQUALITY. Data Protection Policy DEPARTMENT OF JUSTICE AND EQUALITY Data Protection Policy May 2018 Contents Page 1. Introduction 3 2. Scope 3 3. Data Protection Principles 4 4. GDPR - Rights of data subjects 6 5. Responsibilities of

More information

Data Protection Policy

Data Protection Policy Page 1 of 6 General Statement The Local Governing Bodies of the academies have overall responsibility for ensuring that records are maintained, including security and access arrangements, in accordance

More information

GDPR Data Protection Policy

GDPR Data Protection Policy GDPR Data Protection Policy Volleyball England 2018 VE Data Protection Policy May 2018 Page 1 GDPR Data Protection Policy 1. Introduction This Policy sets how the English Volleyball Association Limited

More information

Cayman Islands Data Protection Law Guide Book

Cayman Islands Data Protection Law Guide Book Cayman Islands Data Protection Law Guide Book 2017 Guide Book Cayman Islands Data Protection Law, 2017 1. Background and Overview On 27 March 2017 the Data Protection Law, 2017 (Law) was passed by the

More information

Procedures for responding to requests for personal data to support Data Protection Policy

Procedures for responding to requests for personal data to support Data Protection Policy Procedures for responding to requests for personal data to support Data Protection Policy Heriot-Watt Procedures for responding to requests for personal data; to support Data Protection Policy HERIOT-WATT

More information

PRIVACY STATEMENT. The Island with Bear Grylls (the Programme ) Introduction and main purposes

PRIVACY STATEMENT. The Island with Bear Grylls (the Programme ) Introduction and main purposes PRIVACY STATEMENT The Island with Bear Grylls (the Programme ) Introduction and main purposes Shine TV Limited ("Company" or "we, us, our") is the data controller in respect of your personal data and will

More information

SOUTHFIELD SCHOOL PROCEDURE FOR RECEIVING AND RESPONDING TO SUBJECT ACCESS REQUESTS

SOUTHFIELD SCHOOL PROCEDURE FOR RECEIVING AND RESPONDING TO SUBJECT ACCESS REQUESTS PROCEDURE FOR RECEIVING AND RESPONDING TO SUBJECT ACCESS REQUESTS 1. Policy Statement 1.1. All Data Subjects have rights of access to their personal data. This document sets out the procedure to be followed

More information

Little Blue Studio. Data Protection and Security Policy. Updated May 2018

Little Blue Studio. Data Protection and Security Policy. Updated May 2018 Little Blue Studio Data Protection and Security Policy Updated May 2018 Contents Introduction... 3 Purpose... 3 Application... 3 General Data Protection Regulation (GDPR)... 3 Handling personal information,

More information

This procedure sets out the usage of mobile CCTV units within Arhag.

This procedure sets out the usage of mobile CCTV units within Arhag. CCTV PROCEDURE Statement This procedure sets out the usage of mobile CCTV units within Arhag. Arhag is a registered charitable housing association and is not considered an appropriate authority with regards

More information

The Provincial Grand Lodge and Chapter of East Lancashire. Data Protection Act 1998

The Provincial Grand Lodge and Chapter of East Lancashire. Data Protection Act 1998 The Provincial Grand Lodge and Chapter of East Lancashire Data Protection Act 1998 Why do I need to read this? If you have access to the systems and records that the Province holds about our members, or

More information

PRIVACY POLICY. 1. Introduction

PRIVACY POLICY. 1. Introduction PRIVACY POLICY 1. Introduction 1.1. The Pinewood Studios Group is committed to protecting and respecting your privacy. This privacy policy (together with our Website Terms of Use and Cookies Policy) (Privacy

More information

1.7 The Policy sets out the manner by which the University will respond to Subject Access Requests.

1.7 The Policy sets out the manner by which the University will respond to Subject Access Requests. 1 Introduction 1.1 Article 15 of the General Data Protection Regulations (GDPR) provides individuals (Data Subjects) with the right to access personal information so that they are fully informed of the

More information

Privacy Policy Inhouse Manager Ltd

Privacy Policy Inhouse Manager Ltd Privacy Policy Inhouse Manager Ltd April 2018 This privacy statement is designed to tell you about our practices regarding the collection, use and disclosure of information held by Inhouse Manager Ltd.

More information

Data Protection policy

Data Protection policy DULWICH SYMPHONY ORCHESTRA Data Protection policy 1. Overview Policy prepared by: Dan Sullivan and Jeremy Crump Approved by committee on: 3 May 2018 Next review date: 1 May 2020 Introduction In order to

More information

GDPR Compliance. Clauses

GDPR Compliance. Clauses 1 Clauses GDPR The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) is a privacy and data protection regulation in the European Union (EU). It became enforceable from May 25 2018. The

More information

Data protection. 3 April 2018

Data protection. 3 April 2018 Data protection 3 April 2018 Policy prepared by: Ltd Approved by the Directors on: 3rd April 2018 Next review date: 31st March 2019 Data Protection Registration Number (ico.): Z2184271 Introduction Ltd

More information

It applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your).

It applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your). Our Privacy Policy 1 Purpose Mission Australia is required by law to comply with the Privacy Act 1988 (Cth) (the Act), including the Australian Privacy Principles (APPs). We take our privacy obligations

More information

In this policy, whenever you see the words we, us, our, it refers to Ashby Concert Band Registered Charity Number

In this policy, whenever you see the words we, us, our, it refers to Ashby Concert Band Registered Charity Number ASHBY CONCERT BAND PRIVACY POLICY The privacy and security of your personal information is extremely important to us. This privacy policy explains how and why we use your personal data. We will keep this

More information

Website privacy policy

Website privacy policy Website privacy policy Introduction Welcome to the Octopus Group s privacy policy ( Privacy Policy ) Octopus Group respects your privacy and is committed doing the right thing when it comes to protecting

More information

Technical Requirements of the GDPR

Technical Requirements of the GDPR Technical Requirements of the GDPR Purpose The purpose of this white paper is to list in detail all the technological requirements mandated by the new General Data Protection Regulation (GDPR) laws with

More information

Data Protection Policy

Data Protection Policy Michaelmas 2017 Data Protection Policy For the purpose of this policy school personnel includes: volunteers, self-employed persons, employed staff and governors. Introduction This Data Protection Policy

More information

Requirements for a Managed System

Requirements for a Managed System GDPR Essentials Requirements for a Managed System QG Publication 6 th July 17 Document No. QG 0201/4.3 Requirements for a Managed GDPR System The General Data Protection Regulation GDPR will apply in the

More information

ma recycle GDPR Privacy Policy .com Rely and Comply... Policy Date: 24 May 2018

ma recycle GDPR Privacy Policy .com Rely and Comply... Policy Date: 24 May 2018 ma recycle.com Rely and Comply... GDPR Privacy Policy Policy Date: 24 May 2018 Max Recycle Hawthorne House Blackthorn Way Sedgeletch Industrial Estate Fencehouses Tyne & Wear DH4 6JN T: 0845 026 0026 F:

More information

Plus500UK Limited. Website and Platform Privacy Policy

Plus500UK Limited. Website and Platform Privacy Policy Plus500UK Limited Website and Platform Privacy Policy Website and Platform Privacy Policy Your privacy and trust are important to us and this Privacy Statement (Statement) provides important information

More information

Information Governance Policy

Information Governance Policy 2015 Information Governance Policy University of Wolverhampton Version 1.0 28 th October 2015 Policy Approval Procedure Information Governance Policy Policy Author: Stephen Hill Dept.: DAS Information

More information

DATA PROTECTION 1. INTRODUCTION 2. SCOPE

DATA PROTECTION 1. INTRODUCTION 2. SCOPE DATA PROTECTION 1. INTRODUCTION 1.1 Methodist Homes (MHA) is committed to conducting its business in accordance with all applicable Data Protection laws and regulations (General Data Protection Regulation

More information

"PPS" is Private Practice Software as developed and produced by Rushcliff Ltd.

PPS is Private Practice Software as developed and produced by Rushcliff Ltd. Rushcliff Ltd Data Processing Agreement This Data Processing Agreement ( DPA ) forms part of the main terms of use of PPS, PPS Express, PPS Online booking, any other Rushcliff products or services and

More information

Polemic is a business involved in the collection of personal data in the course of its business activities and on behalf of its clients.

Polemic is a business involved in the collection of personal data in the course of its business activities and on behalf of its clients. Privacy policy 1 Background This document sets out the policy of Polemic Forensic ABN 60 392 752 759 ( Polemic ) relating to the protection of the privacy of personal information. Polemic is a business

More information

SCHOOL SUPPLIERS. What schools should be asking!

SCHOOL SUPPLIERS. What schools should be asking! SCHOOL SUPPLIERS What schools should be asking! Page:1 School supplier compliance The General Data Protection Regulation (GDPR) comes into force on 25 May 2018 and will be applied into UK law via the updated

More information

Bournemouth Churches Housing Association: National Citizen Service (NCS) PRIVACY NOTICE

Bournemouth Churches Housing Association: National Citizen Service (NCS) PRIVACY NOTICE Bournemouth Churches Housing Association: National Citizen Service (NCS) PRIVACY NOTICE WHO WE ARE Bournemouth Churches Housing Association (BCHA), under funding and guidance from the National Citizen

More information

Breach Notification Form

Breach Notification Form Breach Notification Form Report a breach of personal data to the Data Protection Commission Use this form if you are a Data Controller that wishes to contact us to report a personal data breach that has

More information

Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice

Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice Cardiff University Security & Portering Services (SECTY) CCTV Code of Practice Document history Author(s) Date S Gamlin 23/05/2018 Revision / Number Date Amendment Name Approved by BI annual revision Date

More information

Data Protection and GDPR

Data Protection and GDPR Data Protection and GDPR At DPDgroup UK Ltd (DPD & DPD Local) we take data protection seriously and have updated all our relevant policies and documents to ensure we meet the requirements of GDPR. We have

More information

Data Privacy Notice. Madsen Advisory Limited ("Madsen") is committed to protecting and respecting your privacy.

Data Privacy Notice. Madsen Advisory Limited (Madsen) is committed to protecting and respecting your privacy. Data Privacy Notice 1.INTRODUCTION Madsen Advisory Limited ("Madsen") is committed to protecting and respecting your privacy. We pledge to handle your data fairly and legally at all times and are committed

More information

The Data Protection Act 1998 Clare Hall Data Protection Policy

The Data Protection Act 1998 Clare Hall Data Protection Policy The Data Protection Act 1998 Clare Hall Data Protection Policy Introduction This document is a guide to the main requirements of the new Data Protection Act (DPA) that came into force on 24th October 2001.

More information

Policy Objectives (the Association) Privacy Act APPs Policy Application ACTU The Police Association Website

Policy Objectives (the Association) Privacy Act APPs Policy Application ACTU The Police Association Website Privacy Policy 1. Policy Objectives 1.1 The Police Association Victoria (the Association) is the organisation representing sworn police officers at all ranks, protective services officers, police reservists

More information

Motor Sports Association. Data Protection Policy

Motor Sports Association. Data Protection Policy Motor Sports Association Data Protection Policy Version: 12 Last updated: 15/11/2017 CONTENTS 1 Introduction... 3 2 The Data Protection Act 1998... 3 2.1 The Principles for Good Information Handling...

More information