Introduction to Data Protection Plan »Brief Introduction to Data Protection  Example  Principles  P3, 4, 7  Sensitive Data  Conditions for Processing.

Slides:



Advertisements
Similar presentations
Introduction to basic principles of Regulation (EC) 45/2001 Sophie Louveaux María Verónica Pérez Asinari.
Advertisements

Archive, Records Management and Museum Services Confidentiality, Personal Data and the Data Protection Act 1998 Alan R Bell Records Manager and Information.
The Data Protection (Jersey) Law 2005.
Getting data sharing right for every child
Data Protection.
What does the Data Protection Act do? It sets standards which must be satisfied when obtaining, recording, holding, using, disclosing or disposing of.
© 2012 Morgan Cole LLPExpertise | Experience | Efficiency | Contribution 11th October 2012 Avoiding Data Protection pitfalls when collecting Equality Information.
ILONA GAVRONSKA GROUP IL-41 INTERNATIONAL LAW DEPARTMENT KYIV NATIONAL ACADEMY OF SCIENCES OF UKRAINE KYIV UNIVERSITY OF LAW.
Audiences NI Data Protection Workshop
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Data Protection Overview
An overview of the Data Protection Act Legal framework The Data Protection Act 1998 came into force in March 2001, replacing the Data Protection.
The Data Protection Act
 The Data Protection Act 1998 is an Act of Parliament which defines UK law on the processing of data on identifiable living people and it is the main.
Data Protection for Church of Scotland Congregations
CENTRAL SCOTLAND POLICE Data Protection & Information Security Stuart Macfarlane Information Governance Unit Police Service of Scotland.
The Information Commissioner’s Office David Evans.
Data Protection and You Your Rights & The Law Registration Basics Other Activities Disclaimer: This presentation only provides an introductory info. Please.
The Data Protection Act 1998 The Eight Principles.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
Data Protection: An enabler? David Freeland, Senior Policy Officer 23 October 2014.
Data Protection STFC Presentation to PPD Senior Staff 26/11/2009 FoI/DP team.
Data Protection Act AS Module Heathcote Ch. 12.
Data Protection Act & Freedom of Information Simon Mansell Corporate Governance and Information Team.
Data Protection Corporate training Data Protection Act 1998 Replaces DPA 1994 EC directive 94/46/EC The Information Commissioner The courts.
Processing personal health data: the regulator’s perspective Ken Macdonald Assistant Commissioner Information Commissioner’s Office.
The Data Protection Act - Confidentiality and Associated Problems.
DATA PROTECTION ACT 1998 Became law on 1 March 2000 Only applies to the use of personal data, that is data which relates to an identifiable living individual,
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
Local Government Reform and Compliance with the DPA Ken Macdonald Assistant Commissioner (Scotland & Northern Ireland) Information Commissioner’s Office.
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
Data Protection Property Management Conference. What’s it got to do with me ? As a member of a management committee responsible for Guiding property you.
Data Protection for Church of Scotland Congregations.
The Data Protection Act What the Act covers The misuse of personal data by organisations and businesses.
12/12/2015 Data Protection Act /12/2015 The DP Act A law that protects personal privacy and upholds individual’s rights Anyone who handles personal.
Introduction Data protection is relevant to every individual, business or organisation today, not just Local Government. As well as protecting privacy,
Data Protection - Rights & Responsibilities Information Commissioner’s Office Orkney Practice Forum 4 th July 2007.
Data Protection Act The Data Protection Act (DPA) is a balance between rights of the DATA SUBJECT and obligations of the DATA CONTROLLER DATA CONTROLLER.
Introduction to Information Governance (IG) Mark Scallan – Head of IG/Data Protection Officer Angela Kaye – IG Officer.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
DATA PROTECTION ACT (DPA). WHAT IS THE DATA PROTECTION ACT?  The Data Protection Act The Data Protection Act (DPA) gives individuals the right.
DATA PROTECTION ACT INTRODUCTION The Data Protection Act 1998 came into force on the 1 st March It is more far reaching than its predecessor,
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
© University of Reading Lee Shailer 06 June 2016 Data Protection the basics.
Can you share? Yes you can!! Angus Council Adult Protection Maureen H Falconer, Senior Policy Officer Information Commissioner’s Office.
Getting data sharing right for every child Maureen H Falconer Senior Policy Officer Information Commissioner’s Office.
Data protection—training materials [Name and details of speaker]
Sharing Personal Data ‘What you need to know’ Corporate Information Governance Team Strategic Intelligence.
Presented by Ms. Teki Akuetteh LLM (IT and Telecom Law) 16/07/2013Data Protection Act, 2012: A call for Action1.
Clark Holt Limited (Co. No ), Hardwick House, Prospect Place, Swindon, SN1 3LJ Authorised and regulated by the Solicitors Regulation.
Data Protection Laws in the European Union John Armstrong CMS Cameron McKenna.
Data protection act. During the second half of the 20th century, businesses, organisations and the government began using computers to store information.
Students’ Unions 2011 Data Protection and Students’ Unions Mairead O’Reilly 19 July 2011.
The Data Protection Act 1998
Learning Intention Legislations impact on security of information
Trevor Ellis Trainee Programmer (1981 – 28 years ago)
Data Protection The Current Regime
The Data Protection Act 1998
Data Protection Legislation
Data Protection & Freedom of Information- An Introduction
GENERAL DATA PROTECTION REGULATION (GDPR)
New Data Protection Legislation
G.D.P.R General Data Protection Regulations
General Data Protection Regulation
Data Protection principles
Data Protection What’s new about The General Data Protection Regulation (GDPR) May 2018? Call Kerry on Or .
Welcome IITA Inbound Insider Webinar: An Introduction to GDPR
Understanding Data Protection
Dr Elizabeth Lomas The General Data Protection Regulation (GDPR): Changing the data protection landscape Dr Elizabeth Lomas
Presentation transcript:

Introduction to Data Protection Plan »Brief Introduction to Data Protection  Example  Principles  P3, 4, 7  Sensitive Data  Conditions for Processing  Penalties »Worked example

Introduction to Data Protection Data Protection is exciting Data Protection CAN be exciting Should be boring

How DP can be “Exciting" »News release: 30 August »The Information Commissioner’s Office (ICO) has served Aberdeen City Council with a monetary penalty of £100,000a monetary penalty of £100,000 after a serious data breach resulted in sensitive information relating to social services involvement with several individuals being published online. The information included details relating to the care of vulnerable children. »The information was released after a council employee accessed documents, including meeting minutes and detailed reports, from her home computer. A file transfer program installed on the machine automatically uploaded the documents to a website, publishing sensitive information about several vulnerable children and their families, including details of alleged criminal offences.

Principles »1) Fairly and lawfully processed »2) Processed only for limited and lawful purposes »3) Adequate Relevant, not excessive »4) Accurate »5) Not kept for longer than necessary »6) Processed in accordance with the rights of the individual »7) Appropriate technical and organisational measures are taken to keep data secure »8) Not transferred out of EU to Country without adequate protection.

Principle 3: Personal data held for any purpose should be adequate, relevant and not excessive in relation to the purpose or purposes for which processed. »This aims to ensure that personal data held is sufficient for a specific purpose, but no more that that. Data users should seek to ensure that personal data is not recorded merely because there is a possibility that it has a future use. The old adage “Knowledge is power” has no place within data protection.

Principle 4: Personal data should be accurate and, when necessary, kept up to date. »Where it is necessary to keep personal information for some time it may become out of date and inaccurate. In order to prevent this it is important that systems are in place to review and update the information on a regular basis. »The consequences of using out of date personal information can be enormous. »inaccurate payments being made, »correspondence sent to the wrong address, »confidential personal information being wrongly disclosed to a third party etc. »claims for compensation or enforcement action or prosecution proceedings being instituted by the Information Commissioner.

Principle 7 Appropriate technical and organisational measures are taken to keep data secure »Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data. »This principle requires the data controller to ensure that it has security measures in place to avoid loss, damage or destruction to data. Also the Act sets out specific considerations for ensuring security »Organisational responsibilities include items such as Firewall, GCSX Training etc »Personal responsibility Appropriate method of sending appropriate relevant information – Care for the information you hold & use

Conditions Relevant for Processing Personal Information »Que does Data Protection stop you sharing personal information? »Schedule 2 – Any personal data »1 – The data subject has given consent. »2 - The processing is necessary – »a) For the performance of a contract to which the data subject is a party; or »a) For the taking of steps at the request of the data subject with a view to entering into a contract. 3 – The processing is necessary to comply with any legal obligation to which the data controller is subject, other than an obligation imposed by contract. »4 – The processing is necessary in order to protect the vital interest of the data subject. »5 – The processing is necessary – »a) For the administration of justice; or »b) For the exercise of any function conferred by or under any enactment; or »c) For the exercise of any functions of a government department; or »d) For the exercise of any other functions of a public nature exercised in the public interest. »6 – The processing is necessary for the purposes of legitimate interests pursued by the data controller or by the third party or parties to whom the data are disclosed, except where the processing is unwarranted in any particular case by reason of prejudice to the rights and freedoms or legitimate interest of the data subject.

s2 Sensitive Data »“SENSITIVE PERSONAL DATA” means personal data consisting of information as to— »(A)THE RACE or ETHNICITY, »(B)POLITICAL OPINIONS, »(C)RELIGIOUS BELIEFS OR OTHER BELIEFS OF A SIMILAR NATURE, »(D)WHETHER HE IS A MEMBER OF A TRADE UNION »(E)HIS PHYSICAL OR MENTAL HEALTH OR CONDITION, »(F)HIS SEXUAL LIFE, »(G)THE COMMISSION OR ALLEGED COMMISSION BY HIM OF ANY OFFENCE, OR »(H)ANY PROCEEDINGS FOR ANY OFFENCE COMMITTED OR ALLEGED TO HAVE BEEN COMMITTED BY HIM, THE DISPOSAL OF SUCH PROCEEDINGS OR THE SENTENCE OF ANY COURT IN SUCH PROCEEDINGS.

SCHEDULE 3 - Conditions necessary for processing sensitive personal information 1 – The data subject has given his/her explicit consent. 2 – The processing is necessary to perform legal obligations and rights in the context of employment. 3 (a) – The processing is necessary to protect the vital interests of the data subject or another person where consent cannot be given or the data controller cannot reasonably be expected to obtain consent. (b) – The processing is necessary to protect the vital interests of another person where consent has been unreasonably withheld by the data subject. 4 – The processing is carried out by certain non-profit making bodies and relates to their members. 5 – The information has been made public as a result of steps deliberately taken by the data subject. 6 – The processing – »a) Is necessary for the purposes of legal proceedings; or »b) It is necessary for the purpose of obtaining legal advice; or »c) Is otherwise necessary for establishing exercises or defending legal rights. 7 – The processing is necessary - »a) For the administration of justice; or »b) For the exercise of any functions conferred by or under any enactment; or »c) For the exercise of any functions of a government department 8 – The processing is necessary for medical purposes and undertaken by a health professional or by a person who has a similar duty of confidentiality. 9 – The processing of information as to racial or ethnic origin and is necessary for equality monitoring purposes. MUST be able to fulfil one condition from schedule 2 & 3

Penalties »Fines up to £500,000 »Public Undertaking note signed by Data Controller »Enforcement noticesEnforcement notices »Read the enforcement notices and ‘stop now’ orders we have issued to organisations in breach of the legislation, requiring them to take specified steps in order to ensure they comply with the law. »ProsecutionsProsecutions »Details of the criminal prosecutions under the legislation.

Cautionary Tales » Customer given access to another customer’s data. Basic checks were not carried out » Key fobs attached to memory sticks with the passwords written on. Passwords are used to protect data from unauthorised access. P7 » Personal information ed to the wrong people/groups. This has happened on numerous occasions. Adequate checks were not carried out when selecting the recipient from the address book. Other authorities have incurred fines for similar breaches…..P7 » User id shared with a family member who carried out work on their behalf.. Disciplinary action was taken against the employee. P7, P1, P6 » Disc containing personal data lost. The chain of custody was not maintained meaning no one officer had responsibility for the disc. P7 etc » Envelope incorrectly addressed resulting in personal data being sent to the wrong address. Other authorities have incurred fines for similar breaches.