Data Protection webinar: Data Protection & Volunteers 19 th June 2014 Welcome. We’re just making the last few preparations for the webinar to start at.

Slides:



Advertisements
Similar presentations
Data Protection webinar: Data Protection & Human Resources
Advertisements

Introduction to Information Governance (IG)
Confidentiality & Records Management. What is Information Governance? What is Records Management?
The Data Protection (Jersey) Law 2005.
Data Protection.
Data Protection and Records Management
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Data Protection Act.
Data Protection Recruitment Process
Audiences NI Data Protection Workshop
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Data Protection Overview
An overview of the Data Protection Act Legal framework The Data Protection Act 1998 came into force in March 2001, replacing the Data Protection.
Data Protection Act. Lesson Objectives To understand the data protection act.
Data Protection for Church of Scotland Congregations
Data Protection webinar: Overview of Data Protection & Confidentiality 22 nd April 2015 Welcome. We’re just making the last few preparations for the webinar.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Practical Information Management
1 AQA ICT AS Level © Nelson Thornes Data Protection Act.
Health & Social Care Apprenticeships & Diploma
The Data Protection Act 1998 The Eight Principles.
Professional Values and Basic Business Legislation.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
Data Protection Act AS Module Heathcote Ch. 12.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
The Data Protection Act [1998]
The right item, right place, right time. DLA Privacy Act Code of Fair Information Principles.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Volunteers and the Law Example Training Slides Check out updated Home Office Guidance: Asylum Seekers Slide 13 Getting People Involved.
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
Local Government Reform and Compliance with the DPA Ken Macdonald Assistant Commissioner (Scotland & Northern Ireland) Information Commissioner’s Office.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
Data Protection for CiviCRM developers and users.
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
12/12/2015 Data Protection Act /12/2015 The DP Act A law that protects personal privacy and upholds individual’s rights Anyone who handles personal.
1 Data Protection & Confidentiality Young Carers Workers Conference, Harrogate, 25 March 2009 Paul Ticher
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
INFORMATION GOVERNANCE AND CONFIDENTIALITY Information Governance Facilitator.
Data Protection: Friend or foe? 15 th October 2015.
Session 11 Data protection. 1 Contents Part 1: Introduction Part 2: Applicability and responsibility Part 3: Our procedures on data protection Part 4:
DON Code of Privacy Act Fair Information Principles DON has devised a list of principles to be applied when handling Protected Personal Information (PPI).
© University of Reading Lee Shailer 06 June 2016 Data Protection the basics.
Workshop Understanding your responsibilities under the Data Protection Act 1998 and the Freedom of Information Act 2000 Adele Rhodes Girling.
Data protection—training materials [Name and details of speaker]
Commissioning Services: with the DPA in mind South Yorkshire Information and Data Sharing Group Sheffield 14 th August 2014 Lynne Shackley Lead Policy.
Clark Holt Limited (Co. No ), Hardwick House, Prospect Place, Swindon, SN1 3LJ Authorised and regulated by the Solicitors Regulation.
Understanding Privacy An Overview of our Responsibilities.
General Data Protection Regulation (EU 2016/679)
PowerPoint presentation
General Data Protection Regulations: what you really need to know
Data Protection Act.
Data Protection Legislation
Data Protection & Freedom of Information- An Introduction
GENERAL DATA PROTECTION REGULATION (GDPR)
The Data Protection Act & ICT Law
G.D.P.R General Data Protection Regulations
From DPA to GDPR: the key elements
General Data Protection Regulation
Data Protection principles
Data Protection What’s new about The General Data Protection Regulation (GDPR) May 2018? Call Kerry on Or .
Mathew Norman, Policy & Public Affairs Officer, RLA Wales
D3 Confidentiality.
How we’ll prepare for the General Data Protection Regulation (GDPR)
Information management and communication
General Data Protection Regulations 2018
Welcome IITA Inbound Insider Webinar: An Introduction to GDPR
GDPR what do we need to do?
Presentation transcript:

Data Protection webinar: Data Protection & Volunteers 19 th June 2014 Welcome. We’re just making the last few preparations for the webinar to start at Keep your speakers or headphones turned on and you will shortly hear a voice!

Please note:  If you want to make the links and animations in this presentation work, you need to Show it as a slideshow (press F5)  If you can see this slide, you are not in Show mode and the links and animations won’t work

This presentation is intended to help you understand aspects of the Data Protection Act 1998 and related legislation. It is not intended to provide detailed advice on specific points, and is not necessarily a full statement of the law.

The main topics for this webinar:  The roles volunteers play  Quick overview of Data Protection  The legal background  Data Protection & Confidentiality  Responsibilities  The Data Protection Principles in practice 4

The roles volunteers play Volunteers work in a range of settings, including:  Running the whole organisation  Working in the office alongside paid staff  Delivering part or all of the organisation’s service  Running local branches  Acting as trustees on the Board or Management Committee

6 What Data Protection is about: 1  Prevent harm to the individuals whose data we hold, or other people  Keep information in the right hands  Hold good quality data Protecting people   Protecting data

7 What Data Protection is about: 2  Reassure people that we use their information responsibly, so that they trust us  Be transparent – open and honest, don’t hide things or go behind people’s back  Offer people a reasonable choice over how you use their data, and what for Give us more money! Support our campaign! We sold your details to someone else

 Comply with specific legal requirements, such as: 8 What Data Protection is about: 3   Right to opt out of direct marketing  Right of Subject Access  (And others)

9 The Data Protection Principles 1.Data ‘processing’ must be ‘fair’ and legal 2.You must limit your use of data to the purpose(s) you obtained it for 3.Data must be adequate, relevant & not excessive 4.Data must be accurate & up to date 5.Data must not be held longer than necessary 6.Data Subjects’ rights must be respected 7.You must have appropriate security 8.Special rules apply to transfers abroad

The legal background: 1  An organisation is “vicariously liable” for most actions of an employee  The situation with volunteers is not so clear cut, but measures can be put in place to emphasise their responsibilities in regard to Data Protection and Confidentiality without creating a contract of employment

The legal background: 2  Most information about people is “personal data” as soon as it is recorded somewhere  If the organisation fails to comply with the Data Protection Principles, it may face:  A penalty from the Information Commissioner  A claim for compensation from affected individuals  Reputational damage  The Principles on their own are not enough: policies and procedures must ensure compliance

12 Confidentiality Clear boundaries Data Protection and Confidentiality overlap a lot, but they are not the same Data Protection

Confidentiality  Define the boundaries: who has access to what information for what purposes  Employees have an implied duty of confidentiality  Volunteers are subject to the common law duty of confidentiality (as long as they know what information is confidential)  A signed confidentiality pledge should underpin all volunteers’ responsibilities

Ways of breaking confidentiality  Discussing confidential information with partner  Talking about confidential information in public  Working on confidential material in public  Giving out information carelessly over the phone  Sharing or disclosing computer access details  Losing confidential documents/leaving them around  Sharing information about people who have not given permission  Disposing of information carelessly

Responsibilities: Internal  The organisation is responsible for Data Protection compliance  Where volunteers work alongside paid staff they should be following exactly the same procedures  Volunteers should also be subject to the same checks, supervision and monitoring as paid staff would be if they were in the same role(s)

Responsibilities: Branches  Branches are part of the parent organisation or they are autonomous; there is no half-way house  In a unified structure, full responsibility lies with the parent organisation:  The volunteers running the branch must be given clear procedures and instructions, and held to account  In a federal structure, full responsibility lies with each branch:  The volunteers running the branch must know this; they may be given guidance

17 Security (Principle 7) The Data Protection Act says you must prevent:  unauthorised access to personal data  accidental loss or damage of personal data The security measures must be appropriate. They must also be technical and organisational. The Information Commissioner can impose a penalty of up to £??????? for gross breaches of security. £500,000

Key security areas  Security in the office  IT security (data at rest)  IT security (data in transit)  Website security  Non-electronic data in transit  Personnel

Data quality (Principles 3 & 4) The Data Protection Act says that data must be:  Adequate  Relevant  Not excessive  Accurate  Up to date (where necessary)

Guidance volunteers might need  Use centrally-produced materials where possible  What information to collect, and in what format  How to design data collection forms  How to ensure that the information they record is as neutral and accurate as possible  How to keep information up to date – including how and when to offer people the chance to check that the information held about them is correct

21 ‘Fair’ processing (Principles 1 & 2): Transparency & Choice  People generally need to know:  who is collecting their information  what purposes you hold their data for  who you might pass the data on to  how to contact you if they want to stop you from using their data or check what you are doing  They also must be given a reasonable choice over how their information is used, especially regarding Direct marketing

Guidance volunteers might need  Use centrally-produced materials wherever possible  Use standard wording provided by the organisation  Record people’s preferences carefully, and respect their preferences  Use the Information Commissioner’s Privacy Notices Code of Practice if designing own materials

Retention periods (Principle 5)  Data must not be held longer than ‘necessary’  Volunteers who hold data do so on behalf of the organisation  They must follow the organisation’s retention schedule  When their role ends they must not retain any confidential information  Return it for archiving if required  Otherwise destroy it securely

Data Subject Rights (Principle 6)  Volunteers must be aware of any restrictions on marketing, resulting from choices the Data Subject has made  Most volunteers (or other staff) should not normally handle Subject Access Requests; these should be referred to the organisation’s Data Protection Officer

Transfers abroad (Principle 8)  Most UK voluntary organisations do not transfer information outside Europe. However, transfer may take place if:  cloud computing (online applications such as Dropbox or SurveyMonkey) is used and the location of the data storage is outside Europe  information is published on a website that is designed to be accessible throughout the world  Volunteers should be given guidance on the risks

26 The Data Protection Principles 1.Data ‘processing’ must be ‘fair’ and legal 2.You must limit your use of data to the purpose(s) you obtained it for 3.Data must be adequate, relevant & not excessive 4.Data must be accurate & up to date 5.Data must not be held longer than necessary 6.Data Subjects’ rights must be respected 7.You must have appropriate security 8.Special rules apply to transfers abroad ( )

27 Data Protection: the absolute basics We are trying to:  Prevent harm by  Keeping data only in the right hands (and being clear what ‘the right hands’ are)  Holding good quality data (accurate, up to date and adequate)  Reassure people so that they trust us  Making sure people know enough about what we are doing  Giving people a choice where possible

Many thanks Follow-up questions: To come by *Link to evaluation questionnaire *Link to download the presentation, after you have completed the questionnaire