DATA PROTECTION AND RUNNING A COMPLIANT PUB WATCH SCHEME Nigel Connor Head of Legal –JD Wetherspoon PLC.

Slides:



Advertisements
Similar presentations
Legal & Regulatory Compliance. Overview What types of information should be included? What issues or problems might there be? What benefits could be obtained?
Advertisements

Administrative Systems and the Law What you need to know to produce an oral presentation for Unit 7 When the presentations will take place Resources you.
Ten things you should know about Data Protection Paul Simpkins Director, Act Now Training Ltd.
Confidentiality & Records Management. What is Information Governance? What is Records Management?
The Data Protection (Jersey) Law 2005.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
What does the Data Protection Act do? It sets standards which must be satisfied when obtaining, recording, holding, using, disclosing or disposing of.
Data Protection Act Description The Data Protection Act controls how your personal information can be used and protects from the misuse of your.
Information Commissioner’s Office: data protection Judith Jones Senior Policy Officer Strategic Liaison – public security 16 November 2011.
Audiences NI Data Protection Workshop
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Data Protection Overview
An overview of the Data Protection Act Legal framework The Data Protection Act 1998 came into force in March 2001, replacing the Data Protection.
The Data Protection Act
Data Protection Act. Lesson Objectives To understand the data protection act.
The ICO and the DPA Ken Macdonald Assistant Commissioner Information Commissioner’s Office ScotStat Public Sector Analysts Network 30 th September 2010.
Data Protection for Church of Scotland Congregations
CENTRAL SCOTLAND POLICE Data Protection & Information Security Stuart Macfarlane Information Governance Unit Police Service of Scotland.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
The Information Commissioner’s Office David Evans.
Regulation of Personal Information Daniel Pettitt, Leon Sewell and Matthew Pallot.
The Data Protection Act 1998 The Eight Principles.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
Data Protection Act AS Module Heathcote Ch. 12.
Data Protection Act & Freedom of Information Simon Mansell Corporate Governance and Information Team.
Data Protection Corporate training Data Protection Act 1998 Replaces DPA 1994 EC directive 94/46/EC The Information Commissioner The courts.
Processing personal health data: the regulator’s perspective Ken Macdonald Assistant Commissioner Information Commissioner’s Office.
The Data Protection Act - Confidentiality and Associated Problems.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
Data Protection Act (1984, 1998). 2 Data Protection Act There are many organisations which hold personal information about individuals Examples: Loyalty.
Local Government Reform and Compliance with the DPA Ken Macdonald Assistant Commissioner (Scotland & Northern Ireland) Information Commissioner’s Office.
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
Data Protection for Church of Scotland Congregations.
The Data Protection Act What the Act covers The misuse of personal data by organisations and businesses.
12/12/2015 Data Protection Act /12/2015 The DP Act A law that protects personal privacy and upholds individual’s rights Anyone who handles personal.
Introduction Data protection is relevant to every individual, business or organisation today, not just Local Government. As well as protecting privacy,
Data Protection - Rights & Responsibilities Information Commissioner’s Office Orkney Practice Forum 4 th July 2007.
THE DATA PROTECTION ACT Data Protection Act 1998 DPA 1. Reasons2. People3. Principles 4. Exemptions 4 key points you need to learn/understand/revise.
Data Protection Act The Data Protection Act (DPA) is a balance between rights of the DATA SUBJECT and obligations of the DATA CONTROLLER DATA CONTROLLER.
Information Systems Unit 3.
Information Management in Retail: A Legal Perspective Chris Hill Barlow Lyde & Gilbert LLP 17 September 2009.
INFORMATION GOVERNANCE AND CONFIDENTIALITY Information Governance Facilitator.
Data Protection and research Rachael Maguire Records Manager.
DATA PROTECTION ACT (DPA). WHAT IS THE DATA PROTECTION ACT?  The Data Protection Act The Data Protection Act (DPA) gives individuals the right.
What is the Data Protection Act (DPA)? 1998 The Data Protection Act 1998 seeks to strike a balance between the rights of individuals and the sometimes.
DATA PROTECTION ACT INTRODUCTION The Data Protection Act 1998 came into force on the 1 st March It is more far reaching than its predecessor,
© University of Reading Lee Shailer 06 June 2016 Data Protection the basics.
Can you share? Yes you can!! Angus Council Adult Protection Maureen H Falconer, Senior Policy Officer Information Commissioner’s Office.
Workshop Understanding your responsibilities under the Data Protection Act 1998 and the Freedom of Information Act 2000 Adele Rhodes Girling.
Data protection—training materials [Name and details of speaker]
Sharing Personal Data ‘What you need to know’ Corporate Information Governance Team Strategic Intelligence.
Presented by Ms. Teki Akuetteh LLM (IT and Telecom Law) 16/07/2013Data Protection Act, 2012: A call for Action1.
Introduction to Data Protection Plan »Brief Introduction to Data Protection  Example  Principles  P3, 4, 7  Sensitive Data  Conditions for Processing.
Students’ Unions 2011 Data Protection and Students’ Unions Mairead O’Reilly 19 July 2011.
General Data Protection Regulation (EU 2016/679)
The Data Protection Act 1998
General Data Protection Regulation
Data Protection Act.
The Data Protection Act 1998
Data Protection Legislation
GENERAL DATA PROTECTION REGULATION (GDPR)
New Data Protection Legislation
G.D.P.R General Data Protection Regulations
Data Protection and Running a Compliant Pub Watch SCHeme
General Data Protection Regulation
Data Protection and You
Data Protection What’s new about The General Data Protection Regulation (GDPR) May 2018? Call Kerry on Or .
General Data Protection Regulations 2018
General Data Protection Regulations (GDPR) Training
Presentation transcript:

DATA PROTECTION AND RUNNING A COMPLIANT PUB WATCH SCHEME Nigel Connor Head of Legal –JD Wetherspoon PLC

WHAT IS DATA PROTECTION? How our personal information (or data)is kept secure. Key legislation is Data Protection Act 1998 or DPA. Protected data covered by Act = electronic and paper records including names/addresses/telephone numbers/job titles/DOBs. Confidentiality not a requirement for protection. DPA imposes restrictions how that data is processed. Processing very widely defined = obtaining,holding, using, disclosing, sharing data. Processing has to be automatic or partly automatic or manual if in from of a filing system. Any activity involving personal data is covered in practice. JDW LEGAL

WHO DOES IT APPLY TO? The data controller. Defined as a person who decides purpose for /or manner personal data is to be processed. i.e. a company or business is data controller of its employees or customer’s personal details. i.e. a doctor’s surgery is data controller of it’s patients records. i.e. a Pubwatch is the data controller of images shared among members i.e. a Police force is the data controller of images circulated to a Pubwatch. JDW LEGAL

WHAT ARE THE DPA OBLIGATIONS? Any processor must notify ICO if it controls/processes data. Adherence to a number data protection principles: 1. Data obtained and processed for both fair and lawful purposes only 2. Data must be adequate, relevant and not excessive for purpose. 3. Must be accurate and in some cases kept up to date. 4. Must be kept no longer than necessary. 5. Must be processed in accordance with rights of data subjects. 6. Appropriate security measures must be taken to prevent unlawful processing/loss or destruction JDW LEGAL

IF I DON’T COMPLY? Information Commissioner(ICO) and/or court responsible for enforcement. Individuals encouraged to contact data controller first if a concern. If no response or not satisfactory, individual can ask ICO or court to intervene. ICO can assess a possible breach and issue a notice requiring compliance or request an undertaking. Serious cases a fine of up to £500k. Courts can also make a number of orders including compensation for any damage. Reputational damage. JDW LEGAL

HOW DOES A PUBWATCH COMPLY? Data sharing at heart of Pubwatch. Pictures of banned individuals = personal data and subject to DPA with or without names. Sharing within scheme means all scheme members are data controllers for DPA. The sharing of those images is not a breach of DPA as it meets the condition of lawful processing because it is legitimate interests of the members of the Pubwatch to keep premises safe/promote the LOs. However to ensure compliance a number of steps have to be put in place and complied with as follows to meet the data protection principles/requirements of DPA. JDW LEGAL

HOW DOES A PUBWATCH COMPLY? NOTIFICATION Scheme as a data controller must notify ICO before sharing images. Cost = £ Can be done on-line via ICO webpage and quite simple process. Basic information needed. Needs renewing annually. Any change to details have to be notified in 28 days. Failure to notify/renew/update = criminal offence. Make renewal a standing agenda item. JDW LEGAL

HOW DOES A PUBWATCH COMPLY? DATA SHARING PROTOCOL FOR MEMBERS. Not statutory but strongly recommended. Key components 1. What data is being shared and benefits and why; 2. Organisations involved in it; 3. Type of data; 4. Basis for sharing; 5. Common rules for sharing/security of data; 6. Rules for how long stored and deletion; National Pubwatch have pro-forma – get it, use it and review it. JDW LEGAL

HOW DOES A PUBWATCH COMPLY DATA SECURITY – DOS AND DONTS Lack of adequate data security likely to be main source of a breach. Images/names must be kept securely – i.e. Pubwatch on-line system / Folder in the office held in a place where no general access. Do not:  Display on notice boards front or back of house;  Leave hanging around the bar;  Place on social media;  If images transferred by personal equipment, remove once transferred;  Share data for any reasons other than aims of scheme. JDW LEGAL

HOW DOES A PUBWATCH COMPLY RIGHTS OF DATA SUBJECTS Individuals have a number of rights under DPA to access data held on them = Data Access Request Must comply in 40 days Can charge £10 admin fee Reply must tell them what data held and why held, who disclosed to and source of the data. Individual can object to data storage if causing substantial and unwarranted damage or distress. Reply must be in 21 days.Requirement to stop only if damage/distress substantial/unwarranted. No unqualified right to object. JDW LEGAL

PPOLICE AND DATA PRTOECTION Many schemes rely on Police for images/details of barred individuals/service of barring orders. Police generally content to share this data under s29 DPA as to prevent crime and disorder. Police also have statutory and common law powers of disclosure for policing purposes. Data sharing = Lawful Police will insist on an information sharing agreement. Contains basis of sharing of data and process of sharing it with scheme plus obligations of the scheme it self. Obligations include secure site to circulate/share data + own data sharing protocol consistent with the information sharing agreement. Some forces drawing back from participation for fear of breach. JDW LEGAL

ANY QUESTIONS? JDW LEGAL