Slide 1 Friday, 15 March 2013 Confident in Data Protection Compliance Ayrshire College.

Slides:



Advertisements
Similar presentations
Numbers Treasure Hunt Following each question, click on the answer. If correct, the next page will load with a graphic first – these can be used to check.
Advertisements

Scenario: EOT/EOT-R/COT Resident admitted March 10th Admitted for PT and OT following knee replacement for patient with CHF, COPD, shortness of breath.
AP STUDY SESSION 2.
1
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 4 Computing Platforms.
RXQ Customer Enrollment Using a Registration Agent (RA) Process Flow Diagram (Move-In) Customer Supplier Customer authorizes Enrollment ( )
Instructions for Filling out the Reintegration Opportunity Report Savable PDF Training.
David Burdett May 11, 2004 Package Binding for WS CDL.
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination. Introduction to the Business.
The Managing Authority –Keystone of the Control System
Prepared by: Workforce Enterprise Services For: The Illinois Department of Commerce and Economic Opportunity Bureau of Workforce Development ENTRY OF EMPLOYER.
Local Customization Chapter 2. Local Customization 2-2 Objectives Customization Considerations Types of Data Elements Location for Locally Defined Data.
Process a Customer Chapter 2. Process a Customer 2-2 Objectives Understand what defines a Customer Learn how to check for an existing Customer Learn how.
Custom Statutory Programs Chapter 3. Customary Statutory Programs and Titles 3-2 Objectives Add Local Statutory Programs Create Customer Application For.
Custom Services and Training Provider Details Chapter 4.
CALENDAR.
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt BlendsDigraphsShort.
Applicable for Persons Registered under Article 10
1 Click here to End Presentation Software: Installation and Updates Internet Download CD release NACIS Updates.
Engagement in Human Research & Multi-Site Studies K. Lynn Cates, M.D. Assistant Chief Research & Development Officer Director, PRIDE May 30, 2012.
Slide 1 of 20 Don't Make a Legal Ass of Assessment Pecha Kucha 3.30pm RSC Northwest Annual Event
Welcome. © 2008 ADP, Inc. 2 Overview A Look at the Web Site Question and Answer Session Agenda.
Student & Work Study Employment Facts & Time Card Training
Break Time Remaining 10:00.
Turing Machines.
Table 12.1: Cash Flows to a Cash and Carry Trading Strategy.
Red Tag Date 13/12/11 5S.
DATA PROTECTION and Research University Research Ethics Committee – David Cauchi David Cauchi Office of the Commissioner for Data Protection.
PP Test Review Sections 6-1 to 6-6
EIS Bridge Tool and Staging Tables September 1, 2009 Instructor: Way Poteat Slide: 1.
Bellwork Do the following problem on a ½ sheet of paper and turn in.
Exarte Bezoek aan de Mediacampus Bachelor in de grafische en digitale media April 2014.
Sample Service Screenshots Enterprise Cloud Service 11.3.
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
1 RA III - Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Buenos Aires, Argentina, 25 – 27 October 2006 Status of observing programmes in RA.
Mobility Tool Fremtidens afrapportering 2013 – Erasmus Mobilitet / IP 2014 – Erasmus+ aktioner.
Slide 1 Wednesday, 3 July 2013 Sir George Monoux College Data Protection: What You Need to Know.
Slide 1 Wednesday, 3 July 2013 Sir George Monoux College Data Protection: Confident in Compliance.
Adding Up In Chunks.
Data Protection What You Need To Know New College Telford, 23 October 2013.
SLP – Endless Possibilities What can SLP do for your school? Everything you need to know about SLP – past, present and future.
MaK_Full ahead loaded 1 Alarm Page Directory (F11)
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt Synthetic.
GEtServices Services Training For Suppliers Requests/Proposals.
1 The Data Protection Officer at work Experience, good practices and lessons learnt Pierre Vernhes – former DPO at the Council of the EU Workshop on Data.
Introduction to basic principles of Regulation (EC) 45/2001 Sophie Louveaux María Verónica Pérez Asinari.
1 hi at no doifpi me be go we of at be do go hi if me no of pi we Inorder Traversal Inorder traversal. n Visit the left subtree. n Visit the node. n Visit.
1 Let’s Recapitulate. 2 Regular Languages DFAs NFAs Regular Expressions Regular Grammars.
Speak Up for Safety Dr. Susan Strauss Harassment & Bullying Consultant November 9, 2012.
Essential Cell Biology
Audit of the Sales and Collection Cycle
Converting a Fraction to %
Clock will move after 1 minute
PSSA Preparation.
Physics for Scientists & Engineers, 3rd Edition
Select a time to count down from the clock above
Slide 1 of 16 An Overview of Legal Issues Relating to BCE and pointers to specific legal resources Supporting Professional Development for Engagement:
1 Decidability continued…. 2 Theorem: For a recursively enumerable language it is undecidable to determine whether is finite Proof: We will reduce the.
The Data Protection (Jersey) Law 2005.
What does the Data Protection Act do? It sets standards which must be satisfied when obtaining, recording, holding, using, disclosing or disposing of.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Data Protection for Church of Scotland Congregations
Data Protection and research Rachael Maguire Records Manager.
© University of Reading Lee Shailer 06 June 2016 Data Protection the basics.
Can you share? Yes you can!! Angus Council Adult Protection Maureen H Falconer, Senior Policy Officer Information Commissioner’s Office.
Data protection—training materials [Name and details of speaker]
Introduction to Data Protection Plan »Brief Introduction to Data Protection  Example  Principles  P3, 4, 7  Sensitive Data  Conditions for Processing.
G.D.P.R General Data Protection Regulations
Presentation transcript:

Slide 1 Friday, 15 March 2013 Confident in Data Protection Compliance Ayrshire College

Slide 2 Hi! Jason Miles-Campbell JISC Legal Service Manager

Slide 3

Slide 4 Law, ICT and Data Protection jiscleg.al/DataProtection

Slide 5 Have you heard of Jisc Legal before? 1.Hello again, Jason 2.Yes, fairly often 3.Yes, used occasionally 4.Vague acquaintance 5.What’s that, then?

Slide 6 When it comes to data protection... 1.I’m confident 2.I’ve a fair idea 3.I dabble 4.I ask others 5.I hide in the toilet

Slide 7 Relevant Law Data Protection Act 1998 Freedom of Information Act 2000 Privacy and Electronic Comms Regs 2003 Protection of Freedoms Act

Slide 8 Why Comply? 1.It’s the law 2.Good business practice 3.Sets a good example 4.Confidence 5.Risk (ID theft) 6.All of the above

Slide 9 Some DP Terminology Data Subject Data Controller Data Processor A Relevant Filing System Processing

Slide 10 Which one of the following is likely to be covered by the DPA? 1.a deceased staff member’s account 2.Student ID numbers in a VLE 3.documents relating to a disciplinary matter 4.‘John Smith’ on a post-it on a monitor

Slide 11 What is Personal Data? Any information which relates to an identified or identifiable person Living persons Must be significant biographical information which affects privacy Sensitive personal data

Slide 12 Common Scenarios A parent requests information on son’s progress Police request information on one of your students A tutor asks to see a reference supplied by her supervisor An employer requests information on an employee’s attendance Personal details of a student disclosed in confidence appear on FB A staff mobile phone containing sensitive data is lost Internal sharing of data amongst staff External sharing of data - ALL have DP compliance implications

Slide 13 Data Protection Essentials “Data protection..regimes…do not seek to protect data itself, rather they seek to provide the individual with a degree of control over the use of their personal data” “data privacy regimes do not seek to cut off the flow of data, merely to see that it is collected and used in a responsible and, above all, accountable, fashion” (Source: DP Code of Practice for FE and HE) i.e. Data Protection law does not prevent using and sharing personal data lawfully and fairly

Slide 14 Some Particular Issues Institutional mergers Institutional splits Retention periods - European Social Fund requirements

Slide 15 The 8 Data Protection Principles Data Protection Act 1998

Slide 16 1: Fair and Lawful Consent Legitimate interest of the data controller Fulfilment of a contractual obligation

Slide 17 One of these is fair and lawful. Which? 1.The college releases details on student attendance to a parent 2.The college collects name and contact details of all students 3.A tutor puts personal details of a student on his FB account

Slide 18 Sensitive Personal Data Explicit consent Fulfilment of employment law Protection of vital interests Needed for administration of justice / legal proceedings

Slide 19 A college collects names and addresses of students. It outsources IT support. The students start to receive targeted s. Scenario Scenario

Slide 20 2: Limited Purposes Consider all uses and future uses State the purposes when collecting the data Stick to using the data for those purposes If a further purpose arises, you need to seek further consent

Slide 21 A Sample Data Protection Statement JISC Legal undertake to treat your personal data in accordance with the provisions of the Data Protection Act The data given will only be used to register you for the JISC Legal Newsletter on the JISCmail system. You can read the details of our Privacy policy at

Slide 22 A college decides to retain all s for a period of 10 years. Is this in line with the DPA? 1.Yes 2.No 3.Depends 4.Don’t know

Slide 23 3: Adequate, Relevant, Not Excessive Follows from purposes Good records management practice See Jisc infoNet No duties with respect to personal data you no longer hold!

Slide 24 4 & 5: Accuracy and Currency Kept up-to-date Kept no longer than necessary

Slide 25 6: The Individual’s Rights S.10 Substantial prejudice S.12 Right to stop automatic processing

Slide 26 6: The Individual’s Rights S.7 the Data Subject Access Request Allows access to personal data Exemptions: – request not in writing, or fee not paid; requester cannot verify identity; disclosure of third party personal data; disclosure of third party as source; certain health, education social work records

Slide 27 A tutor writes a reference for a student in the college. The student doesn’t get the job and makes a S.A.R. asking the college to see the reference. What should the college do? Scenario Scenario

Slide 28 7: Security Data must be secure (organisationally and technically)

Slide 29 Password and access, encryption for mobile devices Authority to transfer/share information with third parties – see section in Code of Practice Compliance with recognised standards – what the ICO expects? UCISA Information Security Toolkit may help Information Security Information Security

Slide 30 Ayr College contracts with Help4U to process staff personal data to produce pay slips. Unfortunately the names, addresses, bank details and account numbers are sent to the wrong recipient. Who is liable? Over to You Over to You

Slide 31 Who is liable? 1.The college as data controller 2.The processor as they caused the error 3.Both the data controller and the processor 4.Neither

Slide 32 A laptop is used on campus to create personal profiles of learners. A tutor wishes to work from home so he copied the files of 5 students onto a USB and takes it home. It is accidentally dropped in the car park of the train station Scenario Scenario

Slide 33 8: Transfer Out of EEA Data must not be transferred out of Europe without adequate security …..

Slide 34 In developing your data protection strategy, consider: 1.Purpose: why are you collecting personal data, 2.Fairness: is the reason fair to the data subject and 3.Transparency: does the data subject know about it 4.Security: at an appropriate level of security Important Points Important Points

Slide 35 Establish practices to protect individuals and allow the college to carry out operational business without compromising privacy. Address risks of data loss and invasion of privacy. Build DP safeguards into day to day practice. Ensure that this is embedded within the college (training). Forming a Strategy Forming a Strategy

Slide 36 “All operational s will be accessible on the ___ drive” “We will protect privacy by…..” Forming a Strategy Forming a Strategy

Slide 37 Implement your strategy Share with all staff Training Records Future proof (technologies) Consistency Response Policy and Procedures Policy and Procedures

Slide 38 Should have a privacy statement which Complements full DP policy States what is done with information collected Cookie regulations – in force 26 May 2012 Website Website

Slide 39 DP policy in place and a regular review date New developments which may affect your DP policy: Mechanism for conducting a privacy impact assessment at planning stage of new project Guidance and training for staff/student use of social networking and web 2.0 tools laptops memory sticks and other ‘mobiles’ Information Security standards Website information on privacy and cookies What should be in place? What should be in place?

Slide Police arrive at the front reception requesting to confirm the address of one of your students, his record of attendance at the college, and whether he is currently in class. What should you do? Scenario Scenario

Slide A father calls saying that he understands his son needs to pay the year 2 course fees for the BTEC HND in Construction, and also has some library fines to pay – he’d like to make payment on his son’s behalf. What do you do? Scenario Scenario

Slide A college carried out Disclosure Scotland checks for a new cleaner. A colleague asks her boss whether she should be concerned about the shoplifting and security of personal items in college. Scenario Scenario

Slide Staff are encouraged to use their own mobile devices when processing information, including personal data. How should the college handle this?

Slide Staff use FB to chat to students…. Scenario Scenario

Slide An employer s asking for the grades and attendance record of a student being sponsored by them through their college studies. What do you do? Scenario Scenario

Slide 46 A member of staff discloses to his line manager in confidence a health issue. The member of staff is upset when a colleague in another department says he’s sorry to hear he’s not well. Scenario Scenario

Slide A college is finished with various hard drives so it contracts with a company who have a really persuasive website to dispose of them securely. Unfortunately, the drives then appear for sale on ebay. What is the college’s liability here?

Slide A tutor receives a request from a JISC project asking for details of a student who has done well in a technology-based course, for the purposes of making a case study. They only want first name and address. What do you do? Scenario Scenario

Slide 49 Sources of help and (code of practice) (checklists) University of Edinburgh - ataProtection.htm ataProtection.htm UCISA Information Security Toolkit and others ICO – privacy impact assessments / general guidance JISC InfoNet on records management and data retention

Slide 50 Summary Make all staff aware of data protection Consider what personal data you hold Ensure you’ve stated the purposes for which the data will be used Observe the data protection principles Periodically review what personal data you hold Ensure the college’s notification allows this

Slide 51 Common Scenarios A parent requests information on son’s progress Police request information on one of your students A tutor asks to see a reference supplied by her supervisor An employer requests information on an employee’s attendance Personal details of a student disclosed in confidence appear on FB A staff mobile phone containing sensitive data is lost Internal sharing of data amongst staff External sharing of data - ALL have DP compliance implications

Slide 52 Next Steps? 1.Go back and say well done! 2.Start a conversation with management 3.Re-write a few policies 4.Monitor what’s in place already 5.Get further support 6.Point at the guy over there and say ‘his problem!’

Slide 53 ? Questions and Follow Up Questions and Follow Up