TITLE:- “How To Ensure Effective compliance with the Data Protection Act” PRESENTED BY:- The Commissioner, {Mrs D. Madhub} TO:- Lamco Insurance Ltd ON.

Slides:



Advertisements
Similar presentations
IMPS Information Management and Policy Services Information Services Directorate A briefing for all University staff November 2004 New Information Legislation.
Advertisements

DATA PROTECTION and Research University Research Ethics Committee – David Cauchi David Cauchi Office of the Commissioner for Data Protection.
MRS D. CAULLYCHURN-MADHUB DATA PROTECTION COMMISSIONER
1 The Data Protection Officer at work Experience, good practices and lessons learnt Pierre Vernhes – former DPO at the Council of the EU Workshop on Data.
MAKING SENSE OF IT:- WHAT IS DATA PROTECTION? Presented by the Data Protection Commissioner (Mrs D. Madhub) To the Truth and Justice Commission on
Training on Data Protection Functions of the Data Protection Office.
Data Protection.
PROSPECTUS AND COMMENCEMENT OF BUSINESS
What does the Data Protection Act do? It sets standards which must be satisfied when obtaining, recording, holding, using, disclosing or disposing of.
6/1/2015MINISTRY OF ENERGY, COMMUNICATIONS AND MULTIMEDIA 1 PRESENTATION OF PERSONAL DATA PROTECTION BILL PRESENTATION OF PERSONAL DATA PROTECTION BILL.
Higher Administration and IT Administrative Practices.
Introduction to the APPs and the OAIC’s regulatory approach Presented by: Este Darin-Cooper Director, Regulation and Strategy May 2015.
INTERNET and CODE OF CONDUCT
DATA PROTECTION OFFICE
8/9/20151 DATA PROTECTION OFFICE TITLE:- HOW TO INCORPORATE DATA PROTECTION RULES TO SAFEGUARD SHAREHOLDERS’ PERSONAL DATA OF THE SUGAR INVESTMENT TRUST?
Minimum Wages Act History of Minimum Wages ILO Convention no26 in1928 Recommended Machinery for Fixation of minimum wages The Standing Labour Committee.
Data protection office(PMO)
4 TH FLOOR, E MMANUEL A NQUETIL B UILDING, P ORT L OUIS TEL: FAX: mail.gov.mu 8/12/
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Data Protection Overview
An overview of the Data Protection Act Legal framework The Data Protection Act 1998 came into force in March 2001, replacing the Data Protection.
The ICO and the DPA Ken Macdonald Assistant Commissioner Information Commissioner’s Office ScotStat Public Sector Analysts Network 30 th September 2010.
DATA PROTECTION OFFICE
DATA PROTECTION OFFICE
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
HIPAA PRIVACY AND SECURITY AWARENESS.
Data Protection and You Your Rights & The Law Registration Basics Other Activities Disclaimer: This presentation only provides an introductory info. Please.
DATA PROTECTION OFFICE {PMO} “OVERVIEW OF THE FUNDAMENTAL ASPECTS OF THE RIGHT OF ACCESS“ Presented by The Commissioner Mrs D. Madhub To Mutual Aid Association.
Lecture 4. OUTCOMES What must the equity plan include?. What must affirmative action measures include? Which factors are taken into account in determining.
Data Protection Act AS Module Heathcote Ch. 12.
Data protection office (PMO) Title:- An overview of the Data Protection Act and its implications as regards registration and data subject access requests.
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
DATA PROTECTION ACT 1998 Became law on 1 March 2000 Only applies to the use of personal data, that is data which relates to an identifiable living individual,
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
The Framework for Privacy Policies in the UK: Is telling people what information is gathered about them part of the framework? Does it need to be? Emma.
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
Tax Administration Bill (B ) Ettiene Retief, Chairperson for National Tax Committee 16 August 2011.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Session 8 Confidentiality and disclosure. 1 Contents Part 1: Introduction Part 2: The duty of confidentiality Part 3: The duty of disclosure Part 4: Confidentiality.
Minimum Wages Act 1948.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
Be Prepared For Change Are you Prepared?. Be Prepared For Change Are you Prepared?
Partners in improving local health Slide 1 Information Governance & IT Security in the NHS Ian Davison, Director of Business Information Services Alison.
The EU General Data Protection Regulation Frank Rankin.
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
Data protection—training materials [Name and details of speaker]
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
May 5, 2016 May 5, Reporting obligations for  Investment banks,  Stockbrokers and dealers  FM and Investment advisers 2. Publication financial.
Presented by Ms. Teki Akuetteh LLM (IT and Telecom Law) 16/07/2013Data Protection Act, 2012: A call for Action1.
Clark Holt Limited (Co. No ), Hardwick House, Prospect Place, Swindon, SN1 3LJ Authorised and regulated by the Solicitors Regulation.
Disclaimer This presentation is intended only for use by Tulane University faculty, staff, and students. No copy or use of this presentation should occur.
Every employer must ensure, as far as is reasonable practicable, the health, safety and welfare of all his employees More specifically, employers must.
Nassau Association of School Technologists
(Portfolio Committee on Justice and Correctional Services)
Privacy principles Individual written policies
Managing Data Protection
Threats and Challenges to Data Protection and Privacy :-
Data Protection Legislation
PERSONAL DATA PROTECTION ACT 2010
Radar Watchkeeping: Have you monitored your Communication department’s radar to avoid collisions with the new Regulation? 43rd EDPS-DPO meeting, 31 May.
BVI Business Companies Act Workshop
G.D.P.R General Data Protection Regulations
Employee Privacy and Privacy of Employee Information
General Data Protection Regulation
Data Protection principles
Neopay Practical Guides #2 PSD2 (Should I be worried?)
DATA PROTECTION OFFICE{PMO}
Getting Ready For GDPR Simon Marks Director
Presentation transcript:

TITLE:- “How To Ensure Effective compliance with the Data Protection Act” PRESENTED BY:- The Commissioner, {Mrs D. Madhub} TO:- Lamco Insurance Ltd ON TEL:-TEL: , FAX , -PMO-

The Data Protection Office has been officially instituted since 2009, the same year the Data Protection Act was entirely promulgated. Our mission is to protect the processing of the personal data of all living individuals, for example, employees, customers, clients, suppliers, patients, etc. 8/3/2015

One of the main obligations of a data controller and data processor is to register with the Data Protection Office. However, for the time being only data controllers are being registered by the Data Protection Office. Registration is mandatory and a means to ascertain compliance of controllers and processors with the Data Protection Act. 8/3/2015

Are you a data controller?  If you, as an individual or an organisation, public or private, collect, store, process or carry out any activity on any data about living people on any type of computer or in a structured filing system, then you are a data controller. Data controllers are thus, the natural or legal persons, who determine the purposes and the means of the processing of personal data, both in the public and in the private sector. 8/3/2015

Are you a data processor? The data processor is the person, other than an employee of the data controller, who has a written contract with the data controller and who processes personal data on behalf of the data controller. It may be a BPO, consultancy, insurance agent company or sole trader. 8/3/2015

Where the data controller is using the services of a data processor, he must ensure that the data processor is providing sufficient guarantees in respect of security and organisational measures. A data processor is also required to take all reasonable steps to ensure that any person employed by him is aware of and complies with relevant security measures. 8/3/2015

The written contract must provide that the data processor will act only on the instructions received from the data controller and the data processor will be bound by the obligations devolving on the data controller. Under section 29 of the DPA, any data processor, who without lawful excuse, discloses personal data processed by him without the prior authority of the data controller shall commit an offence, the penalty of which is a fine not exceeding Rs 200, 000 and imprisonment for a term not exceeding 5 years. 8/3/2015

What are the powers of the Commissioner? to issue or approve codes of practice or guidelines; create and maintain a register of all data controllers; promote self-regulation among data controllers; take such measures as may be necessary so as to bring to the knowledge of the general public the provisions of this Act; undertake research into, and monitor developments in, data processing and information technology, including data-matching and data linkage; examine any proposal for data matching or data linkage that may involve an interference with, or may otherwise have adverse effects on the privacy of individuals and, ensure that any adverse effects of such proposal on the privacy of individuals are minimised; do anything incidental or conducive to the attainment of the objects of, and to the better performance of his duties and functions under this Act. 8/3/2015

What can the Data Protection Office do when a data controller or a data processor contravenes the Data Protection Act? Where the Commissioner finds that a data controller or a data processor is acting in violation of the Data Protection Act, she may serve an enforcement notice on the data controller or the data processor requiring him/her to take such steps within the period of time specified in the notice which must not be less than 21 days, to remedy the matter and implement the measures recommended by the Commissioner in the enforcement notice. The data controller or the data processor must then notify the data subject of his compliance with the enforcement notice, not later than 21 days after such compliance. 8/3/2015

Is it an offence not to comply with the enforcement notice? Yes. Any person who does not comply with the enforcement notice and does not have a reasonable excuse for not complying will commit an offence, the penalty of which will be a fine not exceeding Rs 50,000 and imprisonment not exceeding 2 years. 8/3/2015

The Commissioner can also request information from a person whenever it is required for the Commissioner to discharge her functions properly by sending a notice. The Commissioner can also carry out security checks when she believes that the processing or transfer of data by a data controller will entail specific risks to the privacy rights of the data subjects to assess the security measures taken by the data controller prior to the beginning of the processing or transfer. 8/3/2015

A questionnaire has been prepared by the Commissioner also posted on the homepage of the website to assist data controllers to implement the measures required in their respective organisations. The Commissioner can also carry out periodical audits of the systems of data controllers to ensure compliance with the data protection principles. A questionnaire has been prepared by the Commissioner to that effect and also posted on the homepage of the website. 8/3/2015

 An officer of the Data Protection Office may at any reasonable time enter and search the premises where data processing activities are being carried on, subject to a warrant having been issued by a district magistrate.  Who can make a complaint to the Data Protection Office? Any individual or organisation who feels that his privacy rights with regard to the processing of his personal data may have been prejudiced. 8/3/2015

What does the Data Protection Office do when it receives a complaint? It investigates the complaint, unless the complaint is frivolous, and as soon as possible, notify the complainant in writing of its decision. Where the Commissioner is of the view that the investigation reveals the commission of a criminal offence under the Data Protection Act, she can refer the matter to the Police. 8/3/2015

Dealing with Subject Access Requests:- The key right for the individual is the right of access. Essentially this means that you as data controller have to supply to the individual the personal data that you hold if a valid request is made to you under Section 41 of the DPA. The data subject must fill in the request for access to personal data form available at the DPO and send it to you. The time limit for complying with an access request is 28 days. In order to ensure your compliance with the time limit and your other access obligations the following organisational and procedural steps may be effected: 8/3/2015

Appoint a Co-ordinator or a Data Protection Officer who will be responsible for the response to the access request. A description of the functions and responsibilities of the Co-ordinator should be circulated within the organisation and staff should be advised of the necessity for co-operation with the Co-ordinator. All subject access matters should be submitted to the Co-ordinator. Check the validity of the access request. Ensure that it is in writing, that the appropriate fee of Rs 75 is included. Log the date of receipt of the valid request. 8/3/2015

PRIVACY-ENHANCING TECHNOLOGIES (PETs):- In order to implement effectively data protection safeguards in your organisation, PETS are essentials. This office has drafted guidelines on the subject which will be published this year together with guidelines on privacy-impact assessments. These technologies aim at incorporating data protection elements in technologies. There is no widely accepted definition for PETs. However, a PET may be described as something that :- Reduces or eliminates the risk of contravening data protection principles; Minimises the amount of personal data held; Empowers individuals to retain control over their personal data at all times. 8/3/2015

 Privacy Management Tools:-  They enable the user to understand the consequences of the processing of the personal information. There are a number of tools today that cater for the enterprise or the end-user market, for example, P3P and IBM secure perspective software. 8/3/2015

 Privacy Metadata:- Attaching standard tags to our personal information detailing the sources of information, the consent obtained, how it is intended to be used and the policies to which the information will be subjected to, including the length of time the information is retained and whether user consent is obtained prior to passing that information to third parties. 8/3/2015

 Privacy Protection Tools:-  They aim to hide the user’s identity, minimise the personal data revealed and camouflage network connections, for example, the originating IP address is not revealed.  They may also authenticate transactions such as payments whilst making it impossible to trace a connection back to the user, for instance:-  Anonymising tools:- They hide the IP address of the originator and in the case of an anonymous or pseudonymous mail, the source address. 8/3/2015

 Anonymous or pseudonymous payment:- The user uses a prepaid card that is identified by a unique number.  Information Security Tools:-  Such tools are important for data protection but their primary goal is usually more modest:-that of preventing unauthorised access to systems, files or communications over a network, encryption for example. 8/3/2015

THANK YOU ANY QUESTIONS OR COMMENTS? 8/3/2015