SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Data Protection for CYP
organisations
This presentation is intended to help you
understand aspects of the Data Protection
Act 1998 and related legislation.
It is not intended to provide detailed advice
on specific points, and is not necessarily a full
statement of the law.
Data Protection overview


    ∗ Prevent harm to the individuals whose data we hold,
      or other people (How?)
    ∗ Reassure people that we use their information
      responsibly, so that they trust us (How?)
    ∗ Comply with specific legal requirements (Such as?)




3
Preventing harm


    ∗ Keep information only in the right hands
    ∗ Hold accurate, good quality data




4
Reassuring people so that they
               trust us

    ∗ Be transparent – open and honest, don’t hide things
      or go behind people’s back
    ∗ Offer people a reasonable choice over how you use
      their data, and what for




5
Additional legal obligations


    ∗   Right to opt out of direct marketing
    ∗   Right of Subject Access
    ∗   Notification
    ∗   (And others)




6
The Data Protection Principles

1. Data ‘processing’ must be ‘fair’ and legal
2. You must limit your use of data to the purpose(s) you
   obtained it for
3. Data must be adequate, relevant & not excessive
4. Data must be accurate & up to date
5. Data must not be held longer than necessary
6. Data Subjects’ rights must be respected
7. You must have appropriate security
8. Special rules apply to transfers abroad

7
Security (Principle 7)


    Security is about ensuring that the boundaries set by your
    confidentiality policies are protected, so that information
    does not fall into the wrong hands.
    The Data Protection Act says you must prevent:
       ∗ unauthorised access to personal data
       ∗ accidental loss or damage of personal data
    The security measures must be appropriate.
    They must also be technical and organisational.
    The Information Commissioner can impose a penalty of up
    to £500,000 for gross breaches of security.
8
Penalties for security breaches

∗ Herts. County Council twice faxed details of child abuse cases to the
  wrong people
∗ Ealing & Hounslow councils were jointly responsible for the theft of an
  unencrypted laptop containing 1700 clients’ details from an employee’s
  house
∗ Worcs. County Council e-mailed highly sensitive data about a large
  number of vulnerable people to 23 unintended recipients
∗ Powys County Council mixed up two child protection reports and
  posted part of one to someone who recognised the people involved
∗ A lawyer’s website was hacked and details of at least 6000 people
  leaked
Lessons from security breaches


∗ ‘Data in transit’ is where most serious breaches occur
∗ Simple mistakes are usually the cause:
  ∗ Sending things to the wrong people – by fax, e-mail or in
    the post – or losing laptops, USB sticks, etc.
∗ Disclosing confidential material, even about only one
  or two people is serious
∗ Laptops must be encrypted
∗ Your website security is your responsibility
Cloud computing
                  ISP


       E-mail
                          Web site
                Backup
       Word
     processing

          Database
                  ?      Photos
Cloud computing
                  ISP


       E-mail
                          Web site
                Backup


                    ?
       Word              Photos
     processing

          Database
Cloud computing characteristics


Cheap and flexible, especially for small organisations:
∗ Standard offering
∗ Available anywhere there is an internet connection
∗ Suppliers claim good security and service levels
Based on:
∗ Shared facilities
∗ Location of data irrelevant (and may be obscure)
∗ May be layers of sub-contract
Cloud examples


∗   Office programs (Microsoft 365, Google Apps)
∗   Storage & processing capacity (Amazon)
∗   Contact management database (Salesforce, CiviCRM)
∗   Photo/video storage and sharing (Picasa, YouTube)
∗   Online meetings & phone calls (GoToMeeting, Skype)
∗   Social networking sites when used by organisations
Security and the cloud

∗ Breaches do occur
∗ Standard terms and conditions often non-negotiable
∗ Due diligence
  ∗ Understand what you are checking
  ∗ International standards
    ∗   ISO 27000 series (from British Standards Institute)
    ∗   self-assessed less reliable than certified
    ∗   check credentials of certifying company
    ∗   relevance & scope (ISO 27000 Statement of Applicability)
  ∗ HMG Security Framework substantially based on ISO 27000
  ∗ SAS70 (US) – auditing process, not security
What else can go wrong?

∗ Loss of service
  ∗ at their end
  ∗ at your end
∗ Retrieving your data if the service ceases or you get
  into a dispute
∗ Contract terms which allow the supplier to make use
  of your data (mainly consumer-oriented services)
∗ Unclear ownership/location of data and the
  equipment it is stored on (within Europe, no problem)
∗ Unilateral changes in policy by provider
And finally …


∗ Most countries have laws allowing authorities to
  access data
∗ US Patriot Act ostensibly anti-terrorist
  ∗ has also been used in non-terrorist cases
  ∗ supplier may not agree (or even be allowed) to inform
    customer of access
∗ Include in risk assessment
So what do you need to do?


∗ Check the contract (or standard terms and conditions) very
  carefully on areas like:
  ∗ security
  ∗ location of data (especially if it could be outside the EEA)
  ∗ liability/sub contractors
  ∗ back-up/access
  ∗ copyright (e.g. Google)
∗ Use your findings to make and record a risk assessment and get
  authorisation to proceed
∗ Be transparent with your Data Subjects
The new cookie law


∗ Privacy and Electronic Communications (EC Directive)
  (Amendment) Regulations 2011 came into force on
  26th May 2011
∗ Information Commissioner announced a year’s grace
  before enforcement action would be taken
∗ Information Commissioner issued guidance in
  December 2011, updated May 2012
What the Regulations say


∗ You must not store information (e.g. through a
  cookie) on someone else’s computer unless:
  ∗ they have clear information about the purpose; and
  ∗ they have given consent
∗ You only have to ask them the first time
∗ They can consent through browser settings (but …)
∗ You don’t need consent for cookies that are ‘strictly
  necessary’ for the functioning of a website
What the Information
         Commissioner says

∗ He wants ‘good solutions rather than rushed ones’.
∗ No ‘wave of knee-jerk formal enforcement action’ as
  long as people are making the effort to comply.
∗ There are ‘pockets of good practice’ and while he
  ‘cannot endorse specific products or services’, there
  are ‘people going about this the right way’.
∗ Analytics cookies are covered, but not a priority.
What do we need to do?


∗   Document what cookies we have
∗   Assess how intrusive they are
∗   Decide whether we really need them all
∗   Provide appropriate information
    ∗ In the privacy statement
    ∗ At appropriate points on the website
∗ Decide what we need consent for and how to get it
∗ Work out how people can withdraw consent
“After-sales service”


∗ Any queries:
  ∗ paul@paulticher.com
  ∗ www.paulticher.com
  ∗ 0116 273 8191

Weitere ähnliche Inhalte

Was ist angesagt?

Privacy by design
Privacy by designPrivacy by design
Privacy by designblogzilla
 
EU GDPR - 12 Steps To Compliance
EU GDPR - 12 Steps To Compliance EU GDPR - 12 Steps To Compliance
EU GDPR - 12 Steps To Compliance Tom Haynes
 
Data Privacy & Compliance Considerations on Using Cloud Services
Data Privacy & Compliance Considerations on Using Cloud ServicesData Privacy & Compliance Considerations on Using Cloud Services
Data Privacy & Compliance Considerations on Using Cloud ServicesAmazon Web Services
 
Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Acquia
 
Modelling the General Data Protection Regulation
Modelling the General Data Protection RegulationModelling the General Data Protection Regulation
Modelling the General Data Protection RegulationSabrina Kirrane
 
GDPR The New Data Protection Law coming into effect May 2018. What does it me...
GDPR The New Data Protection Law coming into effect May 2018. What does it me...GDPR The New Data Protection Law coming into effect May 2018. What does it me...
GDPR The New Data Protection Law coming into effect May 2018. What does it me...eHealth Forum
 
EU US Privacy Shield vs. GDPR Infographic from TRUSTe
EU US Privacy Shield vs. GDPR Infographic from TRUSTeEU US Privacy Shield vs. GDPR Infographic from TRUSTe
EU US Privacy Shield vs. GDPR Infographic from TRUSTeTrustArc
 
VMTN6642E - GDPR Slide Deck
VMTN6642E - GDPR Slide DeckVMTN6642E - GDPR Slide Deck
VMTN6642E - GDPR Slide DeckKyle Davies
 
Gdpr action plan - ISSA
Gdpr action plan - ISSAGdpr action plan - ISSA
Gdpr action plan - ISSAUlf Mattsson
 
The EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to knowThe EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to knowSophos Benelux
 
GDPR Awareness for YOU
GDPR Awareness for YOUGDPR Awareness for YOU
GDPR Awareness for YOUCliff Gibson
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Qualsys Ltd
 
Introduction to gdpr
Introduction to gdprIntroduction to gdpr
Introduction to gdpr3GDR
 
GDPR: More reasons for information security
GDPR: More reasons for information securityGDPR: More reasons for information security
GDPR: More reasons for information securityJisc
 

Was ist angesagt? (18)

Diretiva Comunitária Proteção de Dados Pessoais
Diretiva Comunitária Proteção de Dados Pessoais Diretiva Comunitária Proteção de Dados Pessoais
Diretiva Comunitária Proteção de Dados Pessoais
 
Privacy by design
Privacy by designPrivacy by design
Privacy by design
 
EU GDPR - 12 Steps To Compliance
EU GDPR - 12 Steps To Compliance EU GDPR - 12 Steps To Compliance
EU GDPR - 12 Steps To Compliance
 
Data Privacy & Compliance Considerations on Using Cloud Services
Data Privacy & Compliance Considerations on Using Cloud ServicesData Privacy & Compliance Considerations on Using Cloud Services
Data Privacy & Compliance Considerations on Using Cloud Services
 
Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)
 
Modelling the General Data Protection Regulation
Modelling the General Data Protection RegulationModelling the General Data Protection Regulation
Modelling the General Data Protection Regulation
 
GDPR The New Data Protection Law coming into effect May 2018. What does it me...
GDPR The New Data Protection Law coming into effect May 2018. What does it me...GDPR The New Data Protection Law coming into effect May 2018. What does it me...
GDPR The New Data Protection Law coming into effect May 2018. What does it me...
 
EU US Privacy Shield vs. GDPR Infographic from TRUSTe
EU US Privacy Shield vs. GDPR Infographic from TRUSTeEU US Privacy Shield vs. GDPR Infographic from TRUSTe
EU US Privacy Shield vs. GDPR Infographic from TRUSTe
 
VMTN6642E - GDPR Slide Deck
VMTN6642E - GDPR Slide DeckVMTN6642E - GDPR Slide Deck
VMTN6642E - GDPR Slide Deck
 
Gdpr action plan - ISSA
Gdpr action plan - ISSAGdpr action plan - ISSA
Gdpr action plan - ISSA
 
The EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to knowThe EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to know
 
What does GDPR mean for your charity?
What does GDPR mean for your charity?What does GDPR mean for your charity?
What does GDPR mean for your charity?
 
GDPR Awareness for YOU
GDPR Awareness for YOUGDPR Awareness for YOU
GDPR Awareness for YOU
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
 
Data protection
Data protectionData protection
Data protection
 
GDPR for dummies
GDPR for dummies  GDPR for dummies
GDPR for dummies
 
Introduction to gdpr
Introduction to gdprIntroduction to gdpr
Introduction to gdpr
 
GDPR: More reasons for information security
GDPR: More reasons for information securityGDPR: More reasons for information security
GDPR: More reasons for information security
 

Ähnlich wie Data protection For CYP Organisations

Blake Lapthorn's In-House Lawyer and Decision Maker's forum - 12 September 2013
Blake Lapthorn's In-House Lawyer and Decision Maker's forum - 12 September 2013Blake Lapthorn's In-House Lawyer and Decision Maker's forum - 12 September 2013
Blake Lapthorn's In-House Lawyer and Decision Maker's forum - 12 September 2013Blake Morgan
 
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 Introduction to EU General Data Protection Regulation: Planning, Implementat... Introduction to EU General Data Protection Regulation: Planning, Implementat...
Introduction to EU General Data Protection Regulation: Planning, Implementat...Financial Poise
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Financial Poise
 
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...Brian Miller, Solicitor
 
Kawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the CloudKawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the CloudGurbir Singh
 
Cross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive dataCross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive dataUlf Mattsson
 
CASE STUDY: New EU legislation: how to avoid data disaster
CASE STUDY: New EU legislation: how to avoid data disasterCASE STUDY: New EU legislation: how to avoid data disaster
CASE STUDY: New EU legislation: how to avoid data disasterB2B Marketing
 
CHASE 2014 data protection presentation Paul Ticher
CHASE 2014 data protection presentation Paul TicherCHASE 2014 data protection presentation Paul Ticher
CHASE 2014 data protection presentation Paul Ticheramy_hatton
 
Isaca new delhi india - privacy and big data
Isaca new delhi india - privacy and big dataIsaca new delhi india - privacy and big data
Isaca new delhi india - privacy and big dataUlf Mattsson
 
Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1Dione McBride, CISSP, CIPP/E
 
Safe Harbor Webinar
Safe Harbor WebinarSafe Harbor Webinar
Safe Harbor WebinarEthisphere
 
The EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organizationThe EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organizationSophos Benelux
 
Data Protection: Transitioning to the GDPR
Data Protection: Transitioning to the GDPRData Protection: Transitioning to the GDPR
Data Protection: Transitioning to the GDPRImogenRutherford
 
9 Practical Steps 2 GDPR Compliance
9 Practical Steps 2 GDPR Compliance9 Practical Steps 2 GDPR Compliance
9 Practical Steps 2 GDPR ComplianceAndreas Batsis
 
Scott Appleton: GDPR - Big Bang or Data Evolution?
Scott Appleton: GDPR - Big Bang or Data Evolution?Scott Appleton: GDPR - Big Bang or Data Evolution?
Scott Appleton: GDPR - Big Bang or Data Evolution?Emily Jones
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion
 
GDPR webinar presentation | LawBite
GDPR webinar presentation | LawBiteGDPR webinar presentation | LawBite
GDPR webinar presentation | LawBiteClive Rich
 
What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...Brian Miller, Solicitor
 

Ähnlich wie Data protection For CYP Organisations (20)

Blake Lapthorn's In-House Lawyer and Decision Maker's forum - 12 September 2013
Blake Lapthorn's In-House Lawyer and Decision Maker's forum - 12 September 2013Blake Lapthorn's In-House Lawyer and Decision Maker's forum - 12 September 2013
Blake Lapthorn's In-House Lawyer and Decision Maker's forum - 12 September 2013
 
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 Introduction to EU General Data Protection Regulation: Planning, Implementat... Introduction to EU General Data Protection Regulation: Planning, Implementat...
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...
 
GDPR Part 1: Quick Facts
GDPR Part 1: Quick FactsGDPR Part 1: Quick Facts
GDPR Part 1: Quick Facts
 
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
 
Kawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the CloudKawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the Cloud
 
Cross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive dataCross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive data
 
CASE STUDY: New EU legislation: how to avoid data disaster
CASE STUDY: New EU legislation: how to avoid data disasterCASE STUDY: New EU legislation: how to avoid data disaster
CASE STUDY: New EU legislation: how to avoid data disaster
 
CHASE 2014 data protection presentation Paul Ticher
CHASE 2014 data protection presentation Paul TicherCHASE 2014 data protection presentation Paul Ticher
CHASE 2014 data protection presentation Paul Ticher
 
Isaca new delhi india - privacy and big data
Isaca new delhi india - privacy and big dataIsaca new delhi india - privacy and big data
Isaca new delhi india - privacy and big data
 
Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1
 
Gdpr action plan
Gdpr action plan Gdpr action plan
Gdpr action plan
 
Safe Harbor Webinar
Safe Harbor WebinarSafe Harbor Webinar
Safe Harbor Webinar
 
The EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organizationThe EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organization
 
Data Protection: Transitioning to the GDPR
Data Protection: Transitioning to the GDPRData Protection: Transitioning to the GDPR
Data Protection: Transitioning to the GDPR
 
9 Practical Steps 2 GDPR Compliance
9 Practical Steps 2 GDPR Compliance9 Practical Steps 2 GDPR Compliance
9 Practical Steps 2 GDPR Compliance
 
Scott Appleton: GDPR - Big Bang or Data Evolution?
Scott Appleton: GDPR - Big Bang or Data Evolution?Scott Appleton: GDPR - Big Bang or Data Evolution?
Scott Appleton: GDPR - Big Bang or Data Evolution?
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event
 
GDPR webinar presentation | LawBite
GDPR webinar presentation | LawBiteGDPR webinar presentation | LawBite
GDPR webinar presentation | LawBite
 
What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...
 

Mehr von Cliff Ashcroft

Facebook for Charities
Facebook for CharitiesFacebook for Charities
Facebook for CharitiesCliff Ashcroft
 
Google Analytics for charities
Google Analytics for charitiesGoogle Analytics for charities
Google Analytics for charitiesCliff Ashcroft
 
EU General Data Protection Regulation - Update 2017
EU General Data Protection Regulation - Update 2017EU General Data Protection Regulation - Update 2017
EU General Data Protection Regulation - Update 2017Cliff Ashcroft
 
Webinar: Office 365 for Beginners
Webinar: Office 365 for BeginnersWebinar: Office 365 for Beginners
Webinar: Office 365 for BeginnersCliff Ashcroft
 
Using Technology to Help deliver Advice Services
Using Technology to Help deliver Advice ServicesUsing Technology to Help deliver Advice Services
Using Technology to Help deliver Advice ServicesCliff Ashcroft
 
Google Analytics for Charities
Google Analytics for CharitiesGoogle Analytics for Charities
Google Analytics for CharitiesCliff Ashcroft
 
Office 365 and using SharePoint Online
Office 365 and using SharePoint OnlineOffice 365 and using SharePoint Online
Office 365 and using SharePoint OnlineCliff Ashcroft
 
Top 10 social media tips
Top 10 social media tipsTop 10 social media tips
Top 10 social media tipsCliff Ashcroft
 
Community IT resources
Community IT resourcesCommunity IT resources
Community IT resourcesCliff Ashcroft
 
Using technology to help deliver Advice Services
Using technology to help deliver Advice ServicesUsing technology to help deliver Advice Services
Using technology to help deliver Advice ServicesCliff Ashcroft
 
Connecting Care @ National Care Forum
Connecting Care @ National Care ForumConnecting Care @ National Care Forum
Connecting Care @ National Care ForumCliff Ashcroft
 
Lasa esolutions campaigning and awareness
Lasa esolutions campaigning and awarenessLasa esolutions campaigning and awareness
Lasa esolutions campaigning and awarenessCliff Ashcroft
 
Better Digital Marketing
Better Digital MarketingBetter Digital Marketing
Better Digital MarketingCliff Ashcroft
 

Mehr von Cliff Ashcroft (20)

Facebook for Charities
Facebook for CharitiesFacebook for Charities
Facebook for Charities
 
Google Analytics for charities
Google Analytics for charitiesGoogle Analytics for charities
Google Analytics for charities
 
EU General Data Protection Regulation - Update 2017
EU General Data Protection Regulation - Update 2017EU General Data Protection Regulation - Update 2017
EU General Data Protection Regulation - Update 2017
 
Webinar: Office 365 for Beginners
Webinar: Office 365 for BeginnersWebinar: Office 365 for Beginners
Webinar: Office 365 for Beginners
 
Using Technology to Help deliver Advice Services
Using Technology to Help deliver Advice ServicesUsing Technology to Help deliver Advice Services
Using Technology to Help deliver Advice Services
 
Google Analytics for Charities
Google Analytics for CharitiesGoogle Analytics for Charities
Google Analytics for Charities
 
Office 365 and using SharePoint Online
Office 365 and using SharePoint OnlineOffice 365 and using SharePoint Online
Office 365 and using SharePoint Online
 
Top 10 social media tips
Top 10 social media tipsTop 10 social media tips
Top 10 social media tips
 
Community IT resources
Community IT resourcesCommunity IT resources
Community IT resources
 
Computanews 07
Computanews 07Computanews 07
Computanews 07
 
Computanews 02
Computanews 02Computanews 02
Computanews 02
 
Computanews #1 (1984)
Computanews #1 (1984)Computanews #1 (1984)
Computanews #1 (1984)
 
Using technology to help deliver Advice Services
Using technology to help deliver Advice ServicesUsing technology to help deliver Advice Services
Using technology to help deliver Advice Services
 
E access13
E access13E access13
E access13
 
Connecting Care @ National Care Forum
Connecting Care @ National Care ForumConnecting Care @ National Care Forum
Connecting Care @ National Care Forum
 
Cloudsourcing2013
Cloudsourcing2013Cloudsourcing2013
Cloudsourcing2013
 
Lasa esolutions campaigning and awareness
Lasa esolutions campaigning and awarenessLasa esolutions campaigning and awareness
Lasa esolutions campaigning and awareness
 
User experience
User experienceUser experience
User experience
 
Better Digital Marketing
Better Digital MarketingBetter Digital Marketing
Better Digital Marketing
 
Lucy Buck
Lucy BuckLucy Buck
Lucy Buck
 

Kürzlich hochgeladen

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Kürzlich hochgeladen (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

Data protection For CYP Organisations

  • 1. Data Protection for CYP organisations
  • 2. This presentation is intended to help you understand aspects of the Data Protection Act 1998 and related legislation. It is not intended to provide detailed advice on specific points, and is not necessarily a full statement of the law.
  • 3. Data Protection overview ∗ Prevent harm to the individuals whose data we hold, or other people (How?) ∗ Reassure people that we use their information responsibly, so that they trust us (How?) ∗ Comply with specific legal requirements (Such as?) 3
  • 4. Preventing harm ∗ Keep information only in the right hands ∗ Hold accurate, good quality data 4
  • 5. Reassuring people so that they trust us ∗ Be transparent – open and honest, don’t hide things or go behind people’s back ∗ Offer people a reasonable choice over how you use their data, and what for 5
  • 6. Additional legal obligations ∗ Right to opt out of direct marketing ∗ Right of Subject Access ∗ Notification ∗ (And others) 6
  • 7. The Data Protection Principles 1. Data ‘processing’ must be ‘fair’ and legal 2. You must limit your use of data to the purpose(s) you obtained it for 3. Data must be adequate, relevant & not excessive 4. Data must be accurate & up to date 5. Data must not be held longer than necessary 6. Data Subjects’ rights must be respected 7. You must have appropriate security 8. Special rules apply to transfers abroad 7
  • 8. Security (Principle 7) Security is about ensuring that the boundaries set by your confidentiality policies are protected, so that information does not fall into the wrong hands. The Data Protection Act says you must prevent: ∗ unauthorised access to personal data ∗ accidental loss or damage of personal data The security measures must be appropriate. They must also be technical and organisational. The Information Commissioner can impose a penalty of up to £500,000 for gross breaches of security. 8
  • 9. Penalties for security breaches ∗ Herts. County Council twice faxed details of child abuse cases to the wrong people ∗ Ealing & Hounslow councils were jointly responsible for the theft of an unencrypted laptop containing 1700 clients’ details from an employee’s house ∗ Worcs. County Council e-mailed highly sensitive data about a large number of vulnerable people to 23 unintended recipients ∗ Powys County Council mixed up two child protection reports and posted part of one to someone who recognised the people involved ∗ A lawyer’s website was hacked and details of at least 6000 people leaked
  • 10. Lessons from security breaches ∗ ‘Data in transit’ is where most serious breaches occur ∗ Simple mistakes are usually the cause: ∗ Sending things to the wrong people – by fax, e-mail or in the post – or losing laptops, USB sticks, etc. ∗ Disclosing confidential material, even about only one or two people is serious ∗ Laptops must be encrypted ∗ Your website security is your responsibility
  • 11. Cloud computing ISP E-mail Web site Backup Word processing Database ? Photos
  • 12. Cloud computing ISP E-mail Web site Backup ? Word Photos processing Database
  • 13. Cloud computing characteristics Cheap and flexible, especially for small organisations: ∗ Standard offering ∗ Available anywhere there is an internet connection ∗ Suppliers claim good security and service levels Based on: ∗ Shared facilities ∗ Location of data irrelevant (and may be obscure) ∗ May be layers of sub-contract
  • 14. Cloud examples ∗ Office programs (Microsoft 365, Google Apps) ∗ Storage & processing capacity (Amazon) ∗ Contact management database (Salesforce, CiviCRM) ∗ Photo/video storage and sharing (Picasa, YouTube) ∗ Online meetings & phone calls (GoToMeeting, Skype) ∗ Social networking sites when used by organisations
  • 15. Security and the cloud ∗ Breaches do occur ∗ Standard terms and conditions often non-negotiable ∗ Due diligence ∗ Understand what you are checking ∗ International standards ∗ ISO 27000 series (from British Standards Institute) ∗ self-assessed less reliable than certified ∗ check credentials of certifying company ∗ relevance & scope (ISO 27000 Statement of Applicability) ∗ HMG Security Framework substantially based on ISO 27000 ∗ SAS70 (US) – auditing process, not security
  • 16. What else can go wrong? ∗ Loss of service ∗ at their end ∗ at your end ∗ Retrieving your data if the service ceases or you get into a dispute ∗ Contract terms which allow the supplier to make use of your data (mainly consumer-oriented services) ∗ Unclear ownership/location of data and the equipment it is stored on (within Europe, no problem) ∗ Unilateral changes in policy by provider
  • 17. And finally … ∗ Most countries have laws allowing authorities to access data ∗ US Patriot Act ostensibly anti-terrorist ∗ has also been used in non-terrorist cases ∗ supplier may not agree (or even be allowed) to inform customer of access ∗ Include in risk assessment
  • 18. So what do you need to do? ∗ Check the contract (or standard terms and conditions) very carefully on areas like: ∗ security ∗ location of data (especially if it could be outside the EEA) ∗ liability/sub contractors ∗ back-up/access ∗ copyright (e.g. Google) ∗ Use your findings to make and record a risk assessment and get authorisation to proceed ∗ Be transparent with your Data Subjects
  • 19. The new cookie law ∗ Privacy and Electronic Communications (EC Directive) (Amendment) Regulations 2011 came into force on 26th May 2011 ∗ Information Commissioner announced a year’s grace before enforcement action would be taken ∗ Information Commissioner issued guidance in December 2011, updated May 2012
  • 20. What the Regulations say ∗ You must not store information (e.g. through a cookie) on someone else’s computer unless: ∗ they have clear information about the purpose; and ∗ they have given consent ∗ You only have to ask them the first time ∗ They can consent through browser settings (but …) ∗ You don’t need consent for cookies that are ‘strictly necessary’ for the functioning of a website
  • 21. What the Information Commissioner says ∗ He wants ‘good solutions rather than rushed ones’. ∗ No ‘wave of knee-jerk formal enforcement action’ as long as people are making the effort to comply. ∗ There are ‘pockets of good practice’ and while he ‘cannot endorse specific products or services’, there are ‘people going about this the right way’. ∗ Analytics cookies are covered, but not a priority.
  • 22. What do we need to do? ∗ Document what cookies we have ∗ Assess how intrusive they are ∗ Decide whether we really need them all ∗ Provide appropriate information ∗ In the privacy statement ∗ At appropriate points on the website ∗ Decide what we need consent for and how to get it ∗ Work out how people can withdraw consent
  • 23. “After-sales service” ∗ Any queries: ∗ paul@paulticher.com ∗ www.paulticher.com ∗ 0116 273 8191