TRAINING EVENING.

Slides:



Advertisements
Similar presentations
Protect Our Students Protect Ourselves
Advertisements

NAU HIPAA Awareness Training
Educational Measurement and School Accountability Directorate Better informed, better positioned, better outcomes.
Queensland University of Technology CRICOS No J Ethical Use of Confidential Student Information Student Success Program Training.
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Technology ICT Option: . Electronic mail is the transmission of mainly text based messages across networks This can be within a particular.
CPS Acceptable Use Policy Day 2 – Technology Session.
E-commerce Law Consumer Protection. This lecture will examine legislation protecting consumers. We will look specifically at: –Consumer Protection (Distance.
HIPAA PRIVACY AND SECURITY AWARENESS.
Pack Company Procedures. Accepting a HIP request from a supplier Allocating the Component Providers Sending the instruction through to the Component Providers.
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
Data protection—training materials [Name and details of speaker]
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
Visibook is instant, simple, and dynamic appointment booking We're headquartered in San Francisco, California "Visibook is awesome. My entire studio was.
Screening for Patients’ Health Insurance and Confidentiality Needs
First step: Research Colleges and Programs
Protect Our Students Protect Ourselves
The Provincial Grand Lodge and Chapter of East Lancashire
Agent Services Making Tax digital for Business
PET-CT e-referral portal Referrers Guide
Office of Information Technology October 18, 2016
General Data Protection Regulations: what you really need to know
General Data Protection Regulations Preparing for the upcoming changes in data protection law David Jones & Angharad Williams.
General Data Protection Regulations
Technology ICT Option: .
Data Protection Reform in Local Government
GDPR General Data Protection Regulation EU: Coming May 25, 2018
Move this to online module slides 11-56
In Partnership With. In Partnership With Create one that can be sent to your entire membership! Marketing Create one that can be.
ISE Website Encourage International Service Employees to regularly check the website to view financial reports (e.g. payroll information), download.
Stepping Forward Together Financially
Records management and data security
G.D.P.R General Data Protection Regulations
Disability Services Agencies Briefing On HIPAA
Ocean Transportation Intermediary License Renewal System February 2017
Data Protection and GDPR – An introduction for Baptist Churches
The new data protection rules
General Data Protection Regulations
The Rolls-Royce Heritage Trust
IEEE-SA and GDPR Implementation
VIND – Officer Training
Data Protection What’s new about The General Data Protection Regulation (GDPR) May 2018? Call Kerry on Or .
Mathew Norman, Policy & Public Affairs Officer, RLA Wales
GDPR (General Data Protection Regulation)
KASC – Registration Guide For Swimmers
How we’ll prepare for the General Data Protection Regulation (GDPR)
Information management and communication
Stay ahead of the customs curve
General Data Protection Regulations 2018
GDPR, PCS UG 15th May 2018, Vienna.
KASC – Registration Guide For Swimmers
THIS PRESENTATION The College Essentials Support from the College
Health Insurance Portability and Accountability Act
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
 GDPR Readiness Quiz Quick Insight: Quick Insight: Quick Insight:
The Health Insurance Portability and Accountability Act
Stay ahead of the customs curve
Technology ICT Option: .
HIPAA & PHI TRAINING & AWARENESS
Have you downloaded Groupcall Xpressions yet?
THIS PRESENTATION The College Essentials Support from the College
Move this to online module slides 11-56
General Data Protection Regulation (GDPR)
Handling Information Securely
Handling information 14 Standard.
Presented by: Steve Gerdes 26 January 2019
FERPA Training Quiz.
GDPR Information and Consent
NSVFA Membership Renewal
Protecting Student Data
Presentation transcript:

TRAINING EVENING

GDPR General Data Protection Regulation May 25th 2018

DATA PROTECTION POLICY PRIVACY POLICY DATA PROTECTION POLICY

PRIVACY Why do we need the data? In order to provide EU3A activities and services to you. For the administration, planning and management of EU3A. To communicate with you about group and other EU3A and national U3A activities. To monitor, develop and improve the provision of our U3A activities.

we NEED TO share your DATA Internally - with Committee members, officers, authorised technical support and group leaders Externally – we use an external membership management system and use products and services such as direct mailing for Third Age Matters and Sources and EU3A’s newsletters. We judge that their digital and physical systems and procedures are secure. If we have a statutory duty to disclose it for HMRC and other legal and regulatory reasons.  

Implementing our data protection policy ensures that EU3A: Complies with data protection law and follows good practice. Protects the rights of members, suppliers and partners. Is open about how it stores and processes member data. Protects itself from the risks of a data breach.  

FOR HOW LONG DO WE KEEP THE DATA? HOW DO WE ENSURE IT IS CORRECT AND UP TO DATE? HOW CAN YOU CHANGE IT?

WHAT CAN YOU/SHOULD YOU DO? Keep your members’ data secure (preferably use Beacon, passwords, no pieces of paper left around, BCC) Ask for explicit consent for it to be shown outside the group (e.g. for visits) Don’t show any member’s data to another without explicit prior consent Except, of course, for your own details

BEACON FOR GROUP LEADERS

THE FIRST SCREEN AFTER LOG ON

THE GROUPS LIST

A GROUP’S RECORD

THE GROUP’S MEMBERS

A GROUP LEDGER

TOKENS #TITLE is replaced by the member’s title #FORENAME is replaced by the member’s forename #SURNAME is replaced by the member’s surname #FAM is replaced by the member’s familiar (nick/known as) name #MEMNO is replaced by the member’s member number #EMAIL is replaced by the member’s email address #TELEPHONE is replaced by the member’s land-line telephone number #MOBILE is replaced by the member’s mobile number #EMERGENCY is replaced by the member’s emergency contact information #AFFILIATION is not used by Elmbridge U3A #RENEW is replaced by the date on which the member is next due to renew his or her membership #FEE is replaced by the current Fee that the member would have to pay if paid on time #MEMCLASS is replaced by the member’s membership class (Individual, Joint, Honorary) #ADDRESSH is replaced by the member’s address shown in a single line #ADDRESSV is replaced by the member’s address shown over several lines #POSTCODE is replaced by the member’s postcode #TODAY is replaced by today’s date #U3ANAME is replaced by Elmbridge

EMAIL DELIVERY Despatched i.e. sent to the Beacon email agent Processed i.e. received by the Beacon email agent but not yet forwarded Dropped i.e. rejected -this may be because the email address was in an invalid format. Delivered i.e. accepted by the recipient's email provider Deferred i.e. the Beacon email agent is unable as yet to establish communication with the recipient's email provider Bounced i.e. rejected by the recipient's email provider Opened i.e. received by the recipient who has downloaded it onto his/her computer. Clicked i.e. a website link within the message has been clicked on by the recipient. The link clicked is indicated Spam report i.e. the message (or perhaps an attachment associated with it) has been rejected as spam

WHY AREN’T YOU USING IT?