Project Title. Project Number. Privacy Impact Assessment

Size: px
Start display at page:

Download "Project Title. Project Number. Privacy Impact Assessment"

Transcription

1 Project Title Project Number Privacy Impact Assessment This document is classified as Official and is disclosable under the terms of the Freedom of Information Act. No part of the report should be disseminated or copied without prior approval of the author. For further information as to what to disclose if required under FOI please contact the Information Management (Kent Police). 1

2 DOCUMENT CONTROL SRO Business Lead Project Manager Author Role Department Contributors Role Department Version Version date Requester of change Summary of change(s) Sign-Off Authority Role Date Signature SRO Business Lead Project Manager Data Protection Officer DOCUMENT REFERENCES Ref Document Name Version Number 2

3 Table of contents 1. Guidance Introduction... 4 What is Privacy?...4 Purpose of the PIA 5 Who should conduct a PIA and when 5 Consultation Guidance.6 2. PIA Step by Step.6 3. Screening Questions.8 4. Report Overview Data Protection Act 1998 Checklist 10 Linking the PIA to the DPA Principles Data Flow Mapping Conclusions Sign Off Related Information Sources.. 13 (Red numbers likely to change upon completion of document) 3

4 1. Guidance Introduction The responsibility for conducting the PIA lies with the Senior Responsible Owner (SRO) for a project and is produced as part of the business case however; this activity can be delegated to an appropriate person such as the Project Manager. Once initiated please contact your Data Protection Officer (DPO) in to arrange a brief meeting on the PIA Process. A business case developed for a project can be an ideal base for a PIA. The business case should set out the project proposal and explain how the project will benefit the organisation. The consideration of whether a PIA is required is particularly important when a new business process or technology initiative involves the collection, recording, sharing or retention of personal information. The PIA Screening Questions will have identified whether a PIA is necessary or not. Please read the guidance section of this document fully first, before undertaking the next two sections (Report Template and the Data Protection Checklist) as this will assist you; pay particular attention to the PIA Process. Upon completion of Report Template and Data Protection Checklist to the Information Asset Owner as the SPOC for gaining approval from the SIRO; also seek approval from the Programme Manager and the relevant Data Protection team (lucy.power@kent.pnn.police.uk). A Privacy Impact Assessment (PIA) is a process which enables Kent Police to identify and address the likely privacy impact of a new initiative or project. It enables privacy considerations to be made in the early stages of a project where any identified problems can be easier to resolve rather than late or retrospective consideration where solutions can be more costly or delay implementation. It can also identify, following completion of the PIA, whether the project should be continued when balanced with the rights of persons affected. What is Privacy? Privacy is about the integrity of the individual Privacy of the person Privacy of personal information Privacy of personal behaviour Privacy of personal communications Purpose of PIA 4

5 The purpose of a PIA is to identify where an individual s privacy will be impacted by a new business or technological initiative. Identify and manage risk to individuals privacy Avoid unnecessary costs Avoid inadequate solutions Avoid loss of trust and reputation Support communications strategy Meet legal requirements Identity Management and Privacy Principles Who should conduct a PIA and when The responsibility for ensuring that a PIA is undertaken as part of the business case lies with the Senior Responsible Officer or Project Chair. This activity can be delegated to the Project Manager who will be responsible for ensuring that the appropriate expertise such as a Business Analyst/Consultant, has contributed to the PIA. A Senior Stakeholder from the business (as identified and agreed by the Project Board) will own any residual information risks as the information Asset Owner at the projects closure. It is imperative that the Information Asset Owner is identified at this early stage as they will need to have an overview of, or involvement in, the PIA and Report. The consideration of whether a PIA is required is particularly important when a new business process or technology initiative involves the collection, recording, sharing or retention of personal information. Personal information can be split into 2 types: Personal information is that which is about an identifiable and living individual. Sensitive personal information (as defined by the Data Protection Act 1998) is personal information which pertains to an individual s: commissioned or alleged offending, legal proceedings, racial or ethnic origins, political opinions, religious beliefs, trade union membership, health and sexual life. The PIA screening questions will identify whether a PIA is necessary or not. The PIA process is most valuable when used in the early stages of a project as any identified privacy issues that require solutions can be easier to resolve. Where possible the PIA and Report should be completed in line with the following timescales. Commenced prior to the procurement of the proposed solution; Completed before the proposed solution is put forward for security approval. 5

6 Consultation Guidance Project Manager to brief PIA Stakeholders. Examples of such stakeholders: Internal Stakeholders External Stakeholders Project Board Engineers, developers ICT Procurement Suppliers / Data Processors Communications Team Frontline Staff / Officers Corporate Governance End Users Data Subjects Representative Groups Interest Groups General Public Regulators 2. PIA - Step by step Senior Management Step 1 Senior Responsible Officer to identify the need for PIA Explain what the project aims to achieve, what the benefits will be to the organisation, to individuals and to other parties. It is helpful to link to other relevant documents related to the project, for example a project proposal. Also summarise why the need for a PIA was identified (this can draw on your answers to the screening questions). Screening questions Establish objectives, outcomes and outputs early Does PIA affect Kent only / Essex only / both? Management support Step 2 Identify the privacy and related risks Explain what practical steps you will take to ensure that you identify and address privacy risks. Who should be consulted internally and externally? How will you carry out the consultation? You should link this to the relevant stages of your project management process. You can use consultation at any stage of the PIA process. Risk management tools/ methodology ICO guidance on particular risk areas 6

7 Other standards and guidance Types of risk o Individuals o Compliance o Corporate Step 3 Identify privacy solutions Identify the key privacy risks and the associated compliance and corporate risks. PIAs might record this information on risk register. Identify DPA compliance risks. (Refer to Section 5) (Privacy issue, Risk to individuals, Compliance risk, associated organisation/corporate risk) Accept Reduce Eliminate Step 4 Describe information flows Describe the collection, use and deletion of personal data here and it may also be useful to refer to a flow diagram or another way of explaining data flows. How many individuals are likely to be affected by the project? Types of personal data Use of those data Information asset register Data controller Step 5 Record PIA outcomes, sign-off Who has approved the privacy risks involved in the project? What solutions need to be implemented? Document status of each risk Determine solutions Record reasons Sign-off Publication 7

8 Step 6 Integrate PIA into project plan Project Manager is responsible for integrating the PIA outcomes back into the project plan and updating any project management paperwork. He/she is also responsible for implementing the solutions that have been approved. Project Manager is the contact for any privacy concerns that may arise in the future. Recommendations integrated into project plan Review PIA at key stages or project stage boundaries. Review PIA should the scope of the project change. 3. Screening questions The following questions are intended to help you decide whether a Privacy Impact Assessment (PIA) is necessary. The guidance section of this document (Section 1) will assist you during the project lifecycle. Answering yes to any of the following screening questions is an indication that a PIA would be a useful exercise. You can expand on your answers as the project develops if you need to. If there is no personal data involved then go to section 7. Conclusions Personal data means data which relate to a living individual who can be identified (a) from those data, or (b) from those data and other information which is in the possession of, or is likely to come into the possession of, the data controller, and includes any expression of opinion about the individual and any indication of the intentions of the data controller or any other person in respect of the individual. 1) Will the project involve the collection of new information about individuals? Yes, No How? Why? 2) Will the project compel individuals to provide information about them? Yes, No How? Why? 3) Will information about individuals be disclosed to organisations or people who have not previously had routine access to the information? Yes, No How? Why? 4) Are you using information about individuals for a purpose it is not currently used for, or in a way it is not currently used? 8

9 Yes, No How? Why? 5) Does the project involve you using new technology that might be perceived as being privacy intrusive? For example, the use of biometrics or facial recognition. Yes, No How? Why? 6) Will the project result in you making decisions or taking action against individuals in ways that can have a significant impact on them? Yes, No How? Why? 7) Is the information about individuals of a kind particularly likely to raise privacy concerns or expectations? For example, health records, criminal records or other information that people would consider to be private. Yes, No How? Why? 8) Will the project require you to contact individuals in ways that they may find intrusive? Yes, No How? Why? 4. Report Overview Project Title / Number: Does the Project affect Kent only / Essex only / Joint (Kent/Essex): PIA Author s name / role: Date of PIA completion: Outline of the project and objectives (if statutory, provide reference): Project: NB: If this is not a new process but a change to an existing project, system, technology then describe the current process and how the proposed changes will effect this Objectives/activities for completion: Primary Objective 9

10 Secondary objectives Consultation carried out: Internal: (can include informal discussions and s, project management meetings and discussion on agenda of other regular meetings) Project team Data Protection/ Information compliance officer can provide specialist knowledge on privacy issues. Information technology can advise on security risks that may impact on security External: The scope of external consultation should be assessed in the context of the development that is proposed. There are 2 main aims from external consultation. Firstly to enable understanding of the concerns of external stakeholders and secondly to improve transparency by making people aware of how potential new systems will be used. The extent of consultation should be determined in relation to the assessment of the privacy related risks in the context of the project. The ICO Code indicates that where possible, existing consultation tools should be used to gain a better understanding of privacy expectations and experiences. Note - A record should be maintained of the consultation process and findings Outline of the privacy impact and the justification of privacy intrusion: Name and position of nominated Information Asset Owner: List of stakeholders consulted during Privacy Impact Assessment process: 5. Data Protection Act Checklist Linking the PIA to the Data Protection Act (DPA) Principles: Completing this section during the PIA process will help you to identify where there is a risk 10

11 that the project will fail to comply with the DPA or other relevant legislation, for example the Human Rights Act N.B. ** = Refer this section to your force DPO to explain Principle 1 Personal data shall be processed fairly and lawfully and, in particular, shall not be processed unless: a) at least one of the conditions in Schedule 2 is met, and b) in the case of sensitive personal data, at least one of the conditions in Schedule 3 is also met. Consider the following: Have you identified the purpose of the project? How will you tell individuals about the use of their personal data? Do you need to amend your privacy notices? Have you established which conditions for processing apply? If you are relying on consent to process personal data, how will this be collected and what will you do if it is withheld or withdrawn? If your organisation is subject to the Human Rights Act, you also need to consider: Will your actions interfere with the right to privacy under Article 8? Have you identified the social need and aims of the project? Are your actions a proportionate response to the social need? What categories of personal data will be processed?** Schedule 2 conditions relied upon** What categories of sensitive personal data will be processed (if any)?** 11

12 Schedule 3 conditions relied upon** Principle 2 Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes. Consider the following: Does your project plan cover all of the purposes for processing personal data? Have you identified potential new purposes as the scope of the project expands? Principle 3 Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed. Consider the following: Is the quality of the information good enough for the purposes it is used? Which personal data could you not use, without compromising the needs of the project? Principle 4 Personal data shall be accurate and, where necessary, kept up-to-date Consider the following: 12

13 If you are procuring new software does it allow you to amend data when necessary? What processes will this entail? How are you ensuring that personal data obtained from individuals or other organisations is accurate? Principle 5 Personal data processed for any purpose or purposes shall not be kept for longer than necessary for that purpose or those purposes. Consider the following: What retention periods are suitable for the personal data you will be processing? Are you procuring software that will allow you to delete information in-line with your retention periods? Principle 6 Personal data shall be processed in accordance with the rights of data subjects under this Act. Consider the following: Will the systems you are putting in place allow you to respond to subject access requests more easily? Will any decisions that affect individuals be made via automatically processing? If yes, what? Principle 7 Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or 13

14 damage to, personal data. Consider the following: Do any new systems provide protection against the security risks you have identified? What training and instructions are necessary to ensure that staff knows how to operate a new system securely? What risk management procedures / policies will be in place to prevent any breach or damage/loss of data form occurring? Can include human error, hacking, network failure, theft, destruction of hardware etc. How will the force ensure the Data Processor (if used) will also comply with the DPA? Principle 8 Personal data shall not be transferred to a country or territory outside the European Economic Area unless that country of territory ensures and adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data. Consider the following: Will the project require you to transfer data outside of the EEA? If yes, which countries If you will be making transfers, how will you ensure that the data is adequately protected? What types of data will be transferred? What measures are/will be in place to provide an adequate level of security during transfer and processing 14

15 6. Data flow mapping How is the data going to be collected, processed, utilised legally/lawfully? (For example the following is a basic illustration of ANPR - delete and replace) Car ANPR Camera Image Local database Data back to Kent Police Positive / Negative result Vehicle Registration Kent Police Required to enforce / provide crime prevention. Able to be accessed by Kent Police Only Criminal Investigation ANPR database required to be reviewed to identify suspect Local Authority Require information for (X) reasons. Make Data flow charts pinpoint where data is collected and processed to illustrate whom has access to data, why and under what legal authority. It can also identify points of potential risk for further research including potential for security / data protection breaches 7. Conclusions Please provide a summary of the conclusions that have been reached in relation to this projects overall compliance with the DPA. Includes references to any changes that were introduced as a result of the PIA process. 8. Sign off Approval required by Programme Manager: Senior Information Risk Owner: Data Protection Officer: 15

16 9. Related information Information Commissioner's Office (ICO) College of Policing Human Rights Act

Conducting privacy impact assessments code of practice

Conducting privacy impact assessments code of practice ICO lo Conducting privacy impact assessments code of practice Data Protection Act Contents Data Protection Act... 1 About this code... 3 Chapter 1 - Introduction to PIAs... 5 What the ICO means by PIA...

More information

Human Resources. Data Protection Policy IMS HRD 012. Version: 1.00

Human Resources. Data Protection Policy IMS HRD 012. Version: 1.00 Human Resources Data Protection Policy IMS HRD 012 Version: 1.00 Disclaimer While we do our best to ensure that the information contained in this document is accurate and up to date when it was printed

More information

Conducting privacy impact assessments code of practice

Conducting privacy impact assessments code of practice Conducting privacy impact assessments code of practice Data Protection Act Contents Data Protection Act... 1 Information Commissioner s foreword... 2 About this code... 3 Chapter 1 Introduction to PIAs...

More information

Data Protection Policy

Data Protection Policy Data Protection Policy University of London Data Protection UoL website link: http://www.london.ac.uk/238.html Email: records.managament@london.ac.uk Contents 1 Policy statement... 3 2 Introduction and

More information

UK Research and Innovation (UKRI) Data Protection Policy

UK Research and Innovation (UKRI) Data Protection Policy UK Research and Innovation (UKRI) Data Protection Policy Document Information Revision History Version Comment Date By 0.1 Draft Policy created July 2017 DH 0.2 Revision post review by information manager

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Name of Chair: Mr David Mann Name of Headteacher: Mrs Eileen Bissell Name of person Responsible: Mrs Eileen Bissell Adopted and Agreed on: October 2015 Date of Review: October 2018

More information

Data protection (GDPR) policy

Data protection (GDPR) policy Data protection (GDPR) policy January 2018 Version: 1.0 NHS fraud. Spot it. Report it. Together we stop it. Version control Version Name Date Comment 1.0 Trevor Duplessis 22/01/18 Review due Dec 2018 OFFICIAL

More information

Tourettes Action Data Protection Policy

Tourettes Action Data Protection Policy Tourettes Action Data Protection Policy Effective date: 01/01/2018 Review date: 01/01/2020 Approved: Suzanne Dobson, CEO Tourettes Action Author: Pippa McClounan, Office Manager Tourettes Action Version

More information

PRIVACY IMPACT ASSESSMENT (PIA) TEMPLATE

PRIVACY IMPACT ASSESSMENT (PIA) TEMPLATE PRIVACY IMPACT ASSESSMENT (PIA) TEMPLATE Reference No: IG40 Version: 1.2 Purpose of Document: Ratified by: Date ratified: 27 th September 2013 Review Date September 2014 Name of originator/author: Contact

More information

Data Protection Audit Self-assessment toolkit

Data Protection Audit Self-assessment toolkit Data Protection Audit Self-assessment toolkit online preferences security passport details emergency contact details blood group email account number accuracy CCTV images tax records rights payroll number

More information

St Mark s Church of England Academy Data Protection Policy

St Mark s Church of England Academy Data Protection Policy St Mark s Church of England Academy Data Protection Policy 1 Contents Purpose:... Error! Bookmark not defined. Scope:... Error! Bookmark not defined. Procedure:... Error! Bookmark not defined. Definitions:...

More information

Data Protection. Policy

Data Protection. Policy Data Protection Policy Why do we need this policy? What does the policy apply to? Which parts of SQA are affected? SQA is committed to adopting best practice in protecting the personal information of all

More information

Foundation trust membership and GDPR

Foundation trust membership and GDPR 05 April 2018 Foundation trust membership and GDPR In the last few weeks, we have received a number of enquiries from foundation trusts concerned about the implications of the new General Data Protection

More information

Data Protection Policy

Data Protection Policy Data Protection Policy StCH Data Protection Policy - POL 53 vs1 - July 2016 1 Document Control Table Document Title: Data Protection Policy Document Ref: POL 53 Author (name and job title): Karen Anderson,

More information

General Optical Council. Data Protection Policy

General Optical Council. Data Protection Policy General Optical Council Data Protection Policy Authors: Lisa Sparkes Version: 1.2 Status: Live Date: September 2013 Review Date: September 2014 Location: Internet / Intranet Document History Version Date

More information

Data Protection Policy

Data Protection Policy THE CIPPENHAM SCHOOLS TRUST Data Protection Policy *Date for revision: Summer Term 2018 Responsibility for policy: Responsibility for operational: Trustees Trustees Reviewed by Directors: *subject to any

More information

General Data Protection Regulation. What should community energy organisations be doing to prepare?

General Data Protection Regulation. What should community energy organisations be doing to prepare? General Data Protection Regulation What should community energy organisations be doing to prepare? The implementation date of 25 May 2018 for the General Data Protection Regulation (GDPR) is fast approaching.

More information

PREPARING YOUR ORGANISATION FOR THE GENERAL DATA PROTECTION REGULATION YOUR READINESS CHECKLIST DATA PROTECTION COMMISSIONER

PREPARING YOUR ORGANISATION FOR THE GENERAL DATA PROTECTION REGULATION YOUR READINESS CHECKLIST DATA PROTECTION COMMISSIONER PREPARING YOUR ORGANISATION FOR THE GENERAL DATA PROTECTION REGULATION YOUR READINESS CHECKLIST DATA PROTECTION COMMISSIONER 1 What will the GDPR mean for your business/organisation? On the 25 th May 2018,

More information

Data Protection Policy

Data Protection Policy Reference: Date Approved: April 2015 Approving Body: Board of Trustees Implementation Date: August 2015 Supersedes: 2.0 Stakeholder groups Governance Committee, Board of Trustees consulted: Target Audience:

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY Title: Data Protection Policy Ref:CP005 Version:2 Approval Body: Corporation via Audit & Risk Committee Date:24th March 2015 Review Date: 24th March 2018 Lead Person: Director, Institutional Effectiveness

More information

Data Protection Policy. Data protection. Date: 28/4/2018. Version: 1. Contents

Data Protection Policy. Data protection. Date: 28/4/2018. Version: 1. Contents Company Name: Document: Topic: System People ( the Company ) Data Protection Policy Data protection Date: 28/4/2018 Version: 1 Contents Introduction Definitions Data processing under the Data Protection

More information

closer look at Definitions The General Data Protection Regulation

closer look at Definitions The General Data Protection Regulation A closer look at Definitions The General Data Protection Regulation September 2017 V1 www.inforights.im Important This document is part of a series, produced purely for guidance, and does not constitute

More information

General Personal Data Protection Policy

General Personal Data Protection Policy General Personal Data Protection Policy Contents 1. Scope, Purpose and Users...4 2. Reference Documents...4 3. Definitions...5 4. Basic Principles Regarding Personal Data Processing...6 4.1 Lawfulness,

More information

Data Protection Strategy Version 1.0

Data Protection Strategy Version 1.0 Data Protection Strategy Version 1.0 Contents 1. Introduction... 4 1.1. Purpose... 4 1.2. The OpenLV Project... 4 1.3. Definition of Personal Data... 6 1.4. The Data Controller... 6 1.5. Document Structure...

More information

GDPR readiness for start-ups, technology businesses and professional practices Martin Cassey

GDPR readiness for start-ups, technology businesses and professional practices Martin Cassey www.nascenta.com GDPR readiness for start-ups, technology businesses and professional practices Martin Cassey Introduction GDPR Key Points GDPR/DPA Differences Start Up, Tech Business Professional Practice?

More information

Regulates the way data controllers process personal data

Regulates the way data controllers process personal data GUIDANCE NOTE ON THE DATA PROTECTION ACT 1998 This guidance note gives an overview of how the Data Protection Act 1998 (the Act ) applies to clubs (including class associations) and recognised training

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY LEEDS BECKETT U NIVERSI T Y DATA PROTECTION POLICY 1. INTRODUCTION 1.1 This policy document explains the framework through which the University ensures compliance with the Data Protection Act 1998 (DPA).

More information

GROUP DATA PROTECTION POLICY

GROUP DATA PROTECTION POLICY GROUP DATA PROTECTION POLICY Conducting business the right way Safeguarding our customer and employee personal data Version 1 [August 2016] CONDUCTING BUSINESS THE RIGHT WAY Our Values, Doing the Right

More information

The (Scheme) Actuary as a Data Controller

The (Scheme) Actuary as a Data Controller The (Scheme) Actuary as a Data Controller Keith Webster and Ian Stevens Partners, CMS Cameron McKenna LLP June 2014 Discussion Areas New IFOA guidance Data Protection Act refresher Compliance obligations

More information

Humber Information Sharing Charter

Humber Information Sharing Charter External Ref: HIG 01 Review date November 2016 Version No. V07 Internal Ref: NELC 16.60.01 Humber Information Sharing Charter This Charter may be an uncontrolled copy, please check the source of this document

More information

THE HEATH ACADEMY TRUST DATA PROTECTION POLICY

THE HEATH ACADEMY TRUST DATA PROTECTION POLICY THE HEATH ACADEMY TRUST DATA PROTECTION POLICY inspire transform together Summary Policy Reference Number: 024 Category: Authorised By: Committee Responsible: Data Protection Board Of Directors Board Of

More information

A Parish Guide to the General Data Protection Regulation (GDPR)

A Parish Guide to the General Data Protection Regulation (GDPR) A Parish Guide to the General Data Protection Regulation (GDPR) What s happening and why is it important? The law is changing. Currently, the Data Protection Act 1998 governs how you process personal data

More information

WHAT PAYROLL PROFESSIONALS NEED TO KNOW ABOUT THE GENERAL DATA PROTECTION

WHAT PAYROLL PROFESSIONALS NEED TO KNOW ABOUT THE GENERAL DATA PROTECTION WHAT PAYROLL PROFESSIONALS NEED TO KNOW ABOUT THE GENERAL DATA PROTECTION REGULATION (GDPR) WHAT PAYROLL PROFESSIONALS NEED TO KNOW ABOUT THE GENERAL DATA PROTECTION REGULATION (GDPR) Published by: The

More information

Breakthrough Data Protection Policy Approved by Lead Organisation: November 2017 Next Review Date: November 2018

Breakthrough Data Protection Policy Approved by Lead Organisation: November 2017 Next Review Date: November 2018 Breakthrough Data Protection Policy Approved by Lead Organisation: November 2017 Next Review Date: November 2018 Introduction The Partner organisations within the Breakthrough Programme need to collect

More information

General Data Protection Regulation. The changes in data protection law and what this means for your church.

General Data Protection Regulation. The changes in data protection law and what this means for your church. General Data Protection Regulation The changes in data protection law and what this means for your church. 1 Contents Page 5 Page 6 Page 7 Page 8 Page 9 Page 10 Page 11 Page 12 Page 18 Page 20 Page 23

More information

EDINBURGH NAPIER UNIVERSITY A GUIDE TO PRIVACY IMPACT ASSESSMENTS

EDINBURGH NAPIER UNIVERSITY A GUIDE TO PRIVACY IMPACT ASSESSMENTS EDINBURGH NAPIER UNIVERSITY A GUIDE TO PRIVACY IMPACT ASSESSMENTS PART ONE ABOUT PIAs... 2 What is this guide for?... 2 What is a PIA and what does it do?... 2 What are the risks of not carrying out a

More information

Data Protection Policy & Procedures

Data Protection Policy & Procedures Data Protection Policy & Procedures Scope In this document, the terms we, us, our and/or Clear Sky refer to Clear Sky Children s Charity. The term you and/or your refer to all employees of Clear Sky, who

More information

TECHNICAL RELEASE TECH 05/14BL. Data Protection Handling information provided by clients

TECHNICAL RELEASE TECH 05/14BL. Data Protection Handling information provided by clients TECHNICAL RELEASE TECH 05/14BL Data Protection Handling information provided by clients ABOUT ICAEW ICAEW is a world leading professional membership organisation that promotes, develops and supports over

More information

Information Governance Assurance Framework

Information Governance Assurance Framework Document Reference POL008 Document Status Approved Version: V4.0 DOCUMENT CHANGE HISTORY Initiated by Date Author IG Toolkit Requirements November 2010 IG Manager Version Date Comments (i.e. viewed, or

More information

How employers should comply with GDPR

How employers should comply with GDPR 02 Mind your business Prepare for GDPR How employers should comply with GDPR Recommendations for employer compliance with GDPR The scope of the impact of the GDPR cannot be overstated. The GDPR will impact

More information

EU Regulation 2016/679, GDPR. GDPR, the DPA98 on Steroids

EU Regulation 2016/679, GDPR. GDPR, the DPA98 on Steroids EU Regulation 2016/679, GDPR GDPR, the DPA98 on Steroids 1 RECAP TITLE Full title REGULATION (EU) 2016/679 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 27 April 2016 What it s about on the protection

More information

General Data Protection Regulation

General Data Protection Regulation General Data Protection Regulation Draft Privacy Notice for employees November 2017 www.uk.coop/gdprtoolkit This is a draft document which provides a widely drafted privacy notice to allow data to be processed

More information

Data Protection Policy

Data Protection Policy Data Protection Policy for The Astor Bannerman Group of Companies Issue Date: 3 rd January 2014 Version: 01 Approval History Name Department Role/Position Date approved Signature James Stuart- Smith Director

More information

Introduction Why is data protection important? How does it apply to volunteers? What volunteers need to do?...

Introduction Why is data protection important? How does it apply to volunteers? What volunteers need to do?... Data Protection Guidance for Volunteers Last update 26/11/17 Contents Introduction... 2 1. Why is data protection important?... 2 2. How does it apply to volunteers?... 2 3. What volunteers need to do?...

More information

General Data Protection Regulation (GDPR) Frequently Asked Questions

General Data Protection Regulation (GDPR) Frequently Asked Questions General Data Protection Regulation (GDPR) Frequently Asked Questions 26 March 2018 0 Contents Introduction... 3 What is GDPR?... 3 Who does the GDPR apply to?... 3 Are tax advisers data controllers or

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY DATA PROTECTION POLICY APRIL 2018 Attendance Policy and Procedures (Pupils) (P3/Policies) Updated January 2018 Page 1 of 11 Title Summary Purpose Operational Date April 2018 Next Review Date April 2019

More information

Data Protection Policy

Data Protection Policy Preston and District Data Protection Policy The University of the Third Age Scope of the policy This policy applies to the work of Preston & District U3A (hereafter the U3A ). The policy sets out the requirements

More information

Auditing data protection

Auditing data protection Data protection Auditing data protection a guide to ICO data protection audits 1 Contents Executive summary 3 1. Audit programme development 5 Audit planning and risk assessment 2. Audit approach 6 Gathering

More information

GDPR DATA PROCESSING NOTICE FOR FS1 RECRUITMENT UK LTD FOR APPLICANTS AND WORKERS

GDPR DATA PROCESSING NOTICE FOR FS1 RECRUITMENT UK LTD FOR APPLICANTS AND WORKERS GDPR DATA PROCESSING NOTICE FOR FS1 RECRUITMENT UK LTD FOR APPLICANTS AND WORKERS What is the purpose of this document? FS1 Recruitment UK Ltd is committed to protecting the privacy and security of your

More information

The EU General Data Protection Regulation (GDPR) A briefing for the digital advertising industry

The EU General Data Protection Regulation (GDPR) A briefing for the digital advertising industry The EU General Data Protection Regulation (GDPR) A briefing for the digital advertising industry 1 Contents Introduction 5 Brexit: GDPR or New UK Law? 8 The eprivacy Directive 10 The GDPR: 10 Key Areas

More information

GDPR Webinar 4: Data Protection Impact Assessments

GDPR Webinar 4: Data Protection Impact Assessments Webinar 4: Data Protection Impact Assessments T-Minus 365 Days (May 25, 2017) Presenters: Peter Blenkinsop peter.blenkinsop@dbr.com Hilary Wandall General Counsel & Chief Data Governance Officer, TRUSTe

More information

Policy Document for: Data Protection (GDPR) Approved by Directors: September Due for Review: September Statement of intent

Policy Document for: Data Protection (GDPR) Approved by Directors: September Due for Review: September Statement of intent Policy Document for: Data Protection (GDPR) Approved by Directors: September 2017 Due for Review: September 2020 1. Statement of intent Timu Academy Trust is required to keep and process certain information

More information

SIGBI DATA PROTECTION PROTOCOLS 2018

SIGBI DATA PROTECTION PROTOCOLS 2018 SIGBI DATA PROTECTION PROTOCOLS 2018 For the purpose of this document, references to Soroptimist International Great Britain and Ireland (SIGBI) Limited and Soroptimist International may be written as

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY 1. Introduction This policy is intended to provide information about how the School will use (or process ) personal data about individuals including: Current, past and prospective pupils; Parents, carers

More information

Broad Run Investment Management, LLC

Broad Run Investment Management, LLC Broad Run Investment Management, LLC GDPR Disclosure The General Data Protection Regulation ( GDPR ) applies to the collection, processing and storage of personal data undertaken by organizations within

More information

General Data Protection Regulation (GDPR) A brief guide

General Data Protection Regulation (GDPR) A brief guide General Data Protection Regulation (GDPR) A brief guide Document compiled by: Terence Clark & Dr. Nathan Matthews June 2017 Acknowledgements This document contains material from the Information Commissioner

More information

INFORMATION GOVERNANCE STRATEGY IMPLEMENTATION PLAN

INFORMATION GOVERNANCE STRATEGY IMPLEMENTATION PLAN INFORMATION GOVERNANCE STRATEGY & IMPLEMENTATION PLAN 2015-2018 Disclaimer The latest version of this document is located on PTHB intranet. Please check the review date and if there are any doubts contact

More information

1. Have you translated principle 1 into clear objectives? Yes No If so what are they?

1. Have you translated principle 1 into clear objectives? Yes No If so what are they? Self assessment tool How well does your organisation comply with the 12 guiding principles of the surveillance camera code of practice? Complete this easy to use self assessment tool to find out if you

More information

Personal data: By Personal data we understand all information about identified or identifiable natural ( data subject ) according to GDPR

Personal data: By Personal data we understand all information about identified or identifiable natural ( data subject ) according to GDPR PRINCIPLES OF PERSONAL DATA PROTECTION In these Principles of Personal Data Protection we inform the subjects of data whose personal data we process about all our activities regarding processing and principles

More information

Data Protection/ Information Security Policy

Data Protection/ Information Security Policy Data Protection/ Information Security Policy Date Policy Reviewed 27 th April 2016 Date Passed to Governors: 27 th April 2016 Approved by Governors: 7 th June 2016 Date of Next Review: June 2018 Data Protection

More information

THE GENERAL DATA PROTECTION REGULATION: GUIDANCE ON THE ROLE OF THE DATA PROTECTION OFFICER

THE GENERAL DATA PROTECTION REGULATION: GUIDANCE ON THE ROLE OF THE DATA PROTECTION OFFICER THE GENERAL DATA PROTECTION REGULATION: GUIDANCE ON THE ROLE OF THE DATA PROTECTION OFFICER Contents 1 Introduction 2 2 Key messages 3 3 The requirement to appoint a Data Protection Officer 4 3.1 Public

More information

Derbyshire Constabulary INFORMATION SHARING POLICY POLICY REFERENCE 06/101. This policy is suitable for Public Disclosure

Derbyshire Constabulary INFORMATION SHARING POLICY POLICY REFERENCE 06/101. This policy is suitable for Public Disclosure Derbyshire Constabulary INFORMATION SHARING POLICY POLICY REFERENCE 06/101 This policy is suitable for Public Disclosure Owner of Doc: Head of Information Management Date Approved: April 2005 Review Date:

More information

Depending on the circumstances, we may collect, store, and use the following categories of personal information about you:

Depending on the circumstances, we may collect, store, and use the following categories of personal information about you: Ignata Group Data Protection / Privacy Notice What is the purpose of this document? Ignata is committed to protecting the privacy and security of your personal information. This privacy notice describes

More information

GDPR. Legalities, Policies and Process Part 3 of our series on GDPR and its impact on the recruitment industry

GDPR. Legalities, Policies and Process Part 3 of our series on GDPR and its impact on the recruitment industry GDPR Legalities, Policies and Process Part 3 of our series on GDPR and its impact on the recruitment industry Who are we? Dillistone Group Plc, a public company listed on the AIM market of the London stock

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY APPENDIX. DATA PROTECTION POLICY Document Status Author Director of Registry Services (Data) Date of Origin 27 th July 2011 This Version July 2014 Review requirements Date of next review July 2016 Approval

More information

INFORMATION GOVERNANCE MANAGEMENT FRAMEWORK POLICY

INFORMATION GOVERNANCE MANAGEMENT FRAMEWORK POLICY INFORMATION GOVERNANCE MANAGEMENT FRAMEWORK POLICY Version: 1.4 Approved by: Date approved: 19 January 2017 Name of Originator/Author: Name of Responsible Committee/Individual: Date issued: Information

More information

The Information Commissioner s response to the Competition and Market Authority s Energy market investigation: notice of possible remedies paper.

The Information Commissioner s response to the Competition and Market Authority s Energy market investigation: notice of possible remedies paper. The Information Commissioner s response to the Competition and Market Authority s Energy market investigation: notice of possible remedies paper. The Information Commissioner s role The Information Commissioner

More information

Information Governance Policy

Information Governance Policy Information Governance Policy Version: 4.0 Ratified by: NHS Bury Clinical Commissioning Group Information Governance Operational Group Date ratified: 19 th September 2017 Name of originator /author (s):

More information

The Data Protection Act NOMS Order. The Freedom of Information Act Environmental Information Regulations 2004 ORDER NUMBER 9020

The Data Protection Act NOMS Order. The Freedom of Information Act Environmental Information Regulations 2004 ORDER NUMBER 9020 NOMS Order The Data Protection Act 1998 The Freedom of Information Act 2000 Environmental Information Regulations 2004 ORDER NUMBER 9020 Date of Update: 29/05/09 Issue number: 313 Date of Initial Issue

More information

Humber Information Sharing Charter

Humber Information Sharing Charter External Ref: HIG 01 Insert here the logo of the signatory organisation Review date November 2016 Version No. V07 Internal Ref: ERYC CFS ILS 02 Humber Information Sharing Charter This Charter may be an

More information

The General Data Protection Regulation: What does it mean for you?

The General Data Protection Regulation: What does it mean for you? The General Data Protection Regulation: What does it mean for you? We are here to help The changes being introduced in the EU General Data Protection Regulation 2016 (GDPR) will be the biggest shake-up

More information

LV Connect & Manage Data Protection Strategy

LV Connect & Manage Data Protection Strategy LV Connect & Manage Data Protection Strategy Report Title : Data Protection Strategy Report Status : FINAL Project Ref : NIA_WPD_014 Date : 15.06.2016 Document Control Name Date Prepared by: Samuel Jupe

More information

Minor adjustments from IG Steering Group 0.3 Neil Taylor September 2013

Minor adjustments from IG Steering Group 0.3 Neil Taylor September 2013 Author(s) Andrew Thomas Version 0.3 Version Date 21 August 2013 Implementation/approval Date Review Date August 2014 Review Body Governing Body Policy Reference Number 014 Version Author Date Reason for

More information

Data Protection Policy

Data Protection Policy Data Protection Policy August 2017 This document will be put into corporate format but, in the interim, please see the updated un-formatted version supplied in the following pages. Document title Data

More information

DATA PROTECTION POLICY WINCHESTER CITY COUNCIL. Data Protection Policy

DATA PROTECTION POLICY WINCHESTER CITY COUNCIL. Data Protection Policy DATA PROTECTION POLICY WINCHESTER CITY COUNCIL Document Title: Author: Fiona Sutherland Revision History Version Revision Date Summary of Change Distribution 1.0 08/03/16 Internet Intranet WINCHESTER CITY

More information

PERSONAL DATA SECURITY GUIDANCE FOR MICROENTERPRISES UNDER THE GDPR

PERSONAL DATA SECURITY GUIDANCE FOR MICROENTERPRISES UNDER THE GDPR PERSONAL DATA SECURITY GUIDANCE FOR MICROENTERPRISES UNDER THE GDPR The General Data Protection Regulation ( the GDPR ) significantly increases the obligations and responsibilities of organisations and

More information

AmCham s HR Committee s

AmCham s HR Committee s AmCham s HR Committee s GDPR / Data Privacy Roundtable 19. SEPTEMBER 2017 THE REGULATION REGULATION (EU) 2016/679 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 27 April 2016 on the protection of natural

More information

General Data Privacy Regulation: It s Coming Are You Ready?

General Data Privacy Regulation: It s Coming Are You Ready? General Data Privacy Regulation: It s Coming Are You Ready? Presenters Tristan North Worldwide ERC Government Affairs Adviser, Moderator William R. Tehan General Counsel, Graebel Companies, Inc. Hank A.

More information

12 STEPS TO PREPARE FOR THE GDPR

12 STEPS TO PREPARE FOR THE GDPR 12 STEPS TO PREPARE FOR THE GDPR Presented by Henshalls Insurance Brokers On 25 May 2018, the General Data Protection Regulation (GDPR) comes into effect in the EU and across the United Kingdom. The GDPR

More information

INFORMATION GOVERNANCE POLICY

INFORMATION GOVERNANCE POLICY INFORMATION GOVERNANCE POLICY Unique Reference / Version Primary Intranet Location Information Management & Governance Secondary Intranet Location Policy Name Information Governance Policy Version Number

More information

Supplemental guide to the GDPR for HR professionals

Supplemental guide to the GDPR for HR professionals Supplemental guide to the GDPR for HR professionals Version 1.0, January 2018 The General Data Protection Regulation (GDPR) will come into force on 25 May 2018, representing the most significant change

More information

GDPR Privacy Notice for Staff

GDPR Privacy Notice for Staff GDPR Privacy Notice for Staff Data controller ( the Company ): All companies collectively known as The Lulworth Estate including: Lulworth Castle Farms; Lulworth Heritage Ltd; Lulworth Landscapes Ltd;

More information

This has been produced as a response to the Data Protection Act 1998 and replaces the MRS Guidelines for Handling Databases.

This has been produced as a response to the Data Protection Act 1998 and replaces the MRS Guidelines for Handling Databases. The Data Protection Act 1998 & Market Research: Guidance for MRS Members September 2003 This has been produced as a response to the Data Protection Act 1998 and replaces the MRS Guidelines for Handling

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY DATA PROTECTION POLICY 1. Introduction This policy sets out how The Robert Gordon University shall comply with the requirements of the Data Protection Act 1998 and was created with reference to the JISC

More information

Privacy Impact Assessment Policy V3.0

Privacy Impact Assessment Policy V3.0 Privacy Impact Assessment Policy V3.0 January 2016 Summary. Although not mandatory the best practice guidance from the information Commissioner is to conduct a Privacy Impact Assessment. Privacy impact

More information

GDPR for the funds industry

GDPR for the funds industry BVCA GUIDES Guide to GDPR for the funds industry Supported by AT THE FOREFRONT IN PRIVACY LAW HIGHLY RANKED IN DATA PROTECTION & INFORMATION LAW Chambers UK 2018 They are fast and responsive, and they

More information

TEN Group Data Protection Policy

TEN Group Data Protection Policy TEN Group Data Protection Policy Policy number: DP01 Version: 2.5 Policy holder: Head of Professional Services Approval board: TEN Group CEO Date of approval: May 2017 Review period 1 : 24 months Date

More information

WHISTLE BLOWING POLICY

WHISTLE BLOWING POLICY WHISTLE BLOWING POLICY Introduction The Tandridge Learning Trust is committed to the highest possible standards of honesty, openness, probity and accountability. It seeks to conduct its affairs in a responsible

More information

Information Governance Management Framework

Information Governance Management Framework Management Framework Summary: This document sets out the framework, structure, system and accountabilities for Management within West Kent CCG Clinical Commissioning Group. APPROVED BY: Chief Finance Officer

More information

EU GENERAL DATA PROTECTION REGULATION

EU GENERAL DATA PROTECTION REGULATION EU GENERAL DATA PROTECTION REGULATION GENERAL INFORMATION DOCUMENT This resource aims to provide a general factsheet to Asia Pacific Privacy Authorities (APPA) members, in order to understand the basic

More information

CANDIDATE DATA PROTECTION STANDARDS

CANDIDATE DATA PROTECTION STANDARDS CANDIDATE DATA PROTECTION STANDARDS I. OBJECTIVE The aim of these Candidate Data Protection Standards ( Standards ) is to provide adequate and consistent safeguards for the handling of candidate data by

More information

Data Protection Act Policy And Operational Procedures For the Trust, Its Academies, And Essa Nursery

Data Protection Act Policy And Operational Procedures For the Trust, Its Academies, And Essa Nursery Data Protection Act Policy And Operational Procedures For the Trust, Its Academies, And Essa Nursery Date approved by the Board of Directors: 7 July 2017 Date adopted by Essa Academy Local Governing Body:

More information

MRS Guidelines for MRS Company Partners: Qualitative Recruitment

MRS Guidelines for MRS Company Partners: Qualitative Recruitment MRS Guidelines for MRS Company Partners: Qualitative Recruitment CONSULTATION DRAFT 1 Introduction Over the years, questions have been asked about whether all qualitative recruiter practices are fully

More information

In the picture: A data protection code of practice for surveillance cameras and personal information

In the picture: A data protection code of practice for surveillance cameras and personal information Data protection In the picture: A data protection code of practice for surveillance cameras and personal information Version 1.2 1 Contents Introduction... 3 About this code... 4 What this code covers...

More information

Incremental Pay Progression Policy and Procedure

Incremental Pay Progression Policy and Procedure Incremental Pay Progression Policy and Procedure Date Impact Assessed: Version No: 1 No of pages: 14 Date of Issue: March 2015 Date of next review: March 2016 Distribution: All employees Published: Contents

More information

TEN Group Data Protection Policy

TEN Group Data Protection Policy TEN Group Data Protection Policy Policy number: DP01 Version: 2.4 Policy holder: Head of Professional Services Approval board: TEN Group CEO Date of approval: May 2017 Review period 1 : 24 months Date

More information

Managing Work Performance Policy

Managing Work Performance Policy MWP001 April 2014 Managing Work Performance Policy Policy Number Target Audience Approving Committee MWP001 CCG staff CCG Executive Date Approved 9 th April 2014 Last Review Date April 2014 Next Review

More information

Data Flow Mapping and the EU GDPR

Data Flow Mapping and the EU GDPR Data Flow Mapping and the EU GDPR Adrian Ross LLB (Hons), MBA GRC Consultant IT Governance Ltd 29 September 2016 www.itgovernance.co.uk Introduction Adrian Ross GRC Consultant Infrastructure services Business

More information

//DATA INNOVATION FOR DEVELOPMENT GUIDE DATA INNOVATION RISK ASSESSMENT TOOL

//DATA INNOVATION FOR DEVELOPMENT GUIDE DATA INNOVATION RISK ASSESSMENT TOOL CHECKLIST Rationale for the checklist: Large-scale social or behavioural data may not always contain directly identifiable personal data and/or may be derived from public sources. Nevertheless, its use

More information