2010 Case Study – A Pig of a Day Document Risk Management.

Slides:



Advertisements
Similar presentations
Identifying Data Protection Issues Developing Lifelong Learner Record Systems and ePortfolios in FE and HE: Planning for, and Coping with, Legal Issues.
Advertisements

IMPS Information Management and Policy Services Information Services Directorate A briefing for all University staff November 2004 New Information Legislation.
The Data Protection (Jersey) Law 2005.
Getting data sharing right for every child
Data Protection & Freedom of Information The Practical Implications of Data Protection and Freedom of Information Caroline Dominey Data Protection Officer.
Duncan Woodhouse – Assistant Registrar for Information Security, Risk Management and Business Continuity Helen Wollerton – Administrative Officer (Legal.
Towards a Freedom of Information Law in Qatar Fahad bin Mohammed Al Attiya Executive Chairman, Qatar National Food Security Programme.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Data Protection Overview
An overview of the Data Protection Act Legal framework The Data Protection Act 1998 came into force in March 2001, replacing the Data Protection.
The ICO and the DPA Ken Macdonald Assistant Commissioner Information Commissioner’s Office ScotStat Public Sector Analysts Network 30 th September 2010.
 The Data Protection Act 1998 is an Act of Parliament which defines UK law on the processing of data on identifiable living people and it is the main.
1 OVERVIEW PRESENTATION FREEDOM OF INFORMATION (SCOTLAND) ACT 2002.
Exemptions and the Public Interest Test Louise Townsend - Masons.
Data Protection for Church of Scotland Congregations
CENTRAL SCOTLAND POLICE Data Protection & Information Security Stuart Macfarlane Information Governance Unit Police Service of Scotland.
The Information Commissioner’s Office David Evans.
Regulation of Personal Information Daniel Pettitt, Leon Sewell and Matthew Pallot.
Implementation of Security and Confidentiality in GP Practices.
Health & Social Care Apprenticeships & Diploma
Public rights of access to information Grisilda Ponniah, Corporate Information Governance Manager Mary Elliott, FOI Officer Legal & Democratic Services.
The Data Protection Act 1998 The Eight Principles.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
Data Protection: An enabler? David Freeland, Senior Policy Officer 23 October 2014.
Data Protection Act AS Module Heathcote Ch. 12.
Data Protection Act & Freedom of Information Simon Mansell Corporate Governance and Information Team.
Data Protection Corporate training Data Protection Act 1998 Replaces DPA 1994 EC directive 94/46/EC The Information Commissioner The courts.
Processing personal health data: the regulator’s perspective Ken Macdonald Assistant Commissioner Information Commissioner’s Office.
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
The Data Protection Act - Confidentiality and Associated Problems.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
The Framework for Privacy Policies in the UK: Is telling people what information is gathered about them part of the framework? Does it need to be? Emma.
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
Local Government Reform and Compliance with the DPA Ken Macdonald Assistant Commissioner (Scotland & Northern Ireland) Information Commissioner’s Office.
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
Data Protection Property Management Conference. What’s it got to do with me ? As a member of a management committee responsible for Guiding property you.
The Data Protection Act What the Act covers The misuse of personal data by organisations and businesses.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Data Protection - Rights & Responsibilities Information Commissioner’s Office Orkney Practice Forum 4 th July 2007.
Data Protection Act The Data Protection Act (DPA) is a balance between rights of the DATA SUBJECT and obligations of the DATA CONTROLLER DATA CONTROLLER.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
DATA PROTECTION ACT INTRODUCTION The Data Protection Act 1998 came into force on the 1 st March It is more far reaching than its predecessor,
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
DATA PROTECTION AND RUNNING A COMPLIANT PUB WATCH SCHEME Nigel Connor Head of Legal –JD Wetherspoon PLC.
© University of Reading Lee Shailer 06 June 2016 Data Protection the basics.
Can you share? Yes you can!! Angus Council Adult Protection Maureen H Falconer, Senior Policy Officer Information Commissioner’s Office.
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
Getting data sharing right for every child Maureen H Falconer Senior Policy Officer Information Commissioner’s Office.
Workshop Understanding your responsibilities under the Data Protection Act 1998 and the Freedom of Information Act 2000 Adele Rhodes Girling.
Data protection—training materials [Name and details of speaker]
Sharing Personal Data ‘What you need to know’ Corporate Information Governance Team Strategic Intelligence.
Presented by Ms. Teki Akuetteh LLM (IT and Telecom Law) 16/07/2013Data Protection Act, 2012: A call for Action1.
Freedom of Information Act ‘What you need to know’ Corporate Information Governance Team Strategic Intelligence.
Protection of Personal Information Act An Analysis on the impact.
Clark Holt Limited (Co. No ), Hardwick House, Prospect Place, Swindon, SN1 3LJ Authorised and regulated by the Solicitors Regulation.
Data Protection and Freedom of Information. Objectives Describe the main points of the Data Protection Act 1998 and Freedom of Information Act 2000 Illustrate.
Introduction to Data Protection Plan »Brief Introduction to Data Protection  Example  Principles  P3, 4, 7  Sensitive Data  Conditions for Processing.
Data Protection Laws in the European Union John Armstrong CMS Cameron McKenna.
The Data Protection Act 1998
CISI – Financial Products, Markets & Services
General Data Protection Regulation
The Data Protection Act 1998
Data Protection Legislation
Data Protection & Freedom of Information- An Introduction
G.D.P.R General Data Protection Regulations
Data Protection and Running a Compliant Pub Watch SCHeme
Data Protection principles
Data Protection What’s new about The General Data Protection Regulation (GDPR) May 2018? Call Kerry on Or .
General Data Protection Regulations 2018
Presentation transcript:

2010 Case Study – A Pig of a Day Document Risk Management

Statistics are like bikinis. What they reveal is suggestive, but what they conceal is vital. ~Aaron Levenstein

Monday Morning – First Thing Due Diligence Fidelity Guarantee Insurance References. Pre-Employment Checks Know How Source: Article in Birketts LLP Public Opinion pages 2 & 3

Monday Mid Morning Denny Grate The letter should be treated as a subject access request The University is required to inform DG if it keeps personal information about him, provide a description of this information, the purposes for which it is used and provide him with a hard copy of it (unless it would involve disproportionate effort. Hard copy documents are only discloseable if they are filed in a ‘relevant filing system’ so whether his personal file is discloseable depends on how organised that file is.

Monday Mid Morning s are discloseable insofar as they are about DG. It is not sufficient he is just a recipient of them – the content of the must relate to him In respect of references – the DPA provides an exemption from disclosure of any reference in the hands of the provider, but this does not extend to any reference in the hands of the recipient. An employer has 40 days to comply with a subject access request. The remedies for non-compliance include the IC issuing an enforcement notice or the employee applying to the courts for an order of disclosure and/or damages for the breach (but only if the employee has suffered any damage/distress).

Monday Mid Morning Code Red The University should conduct an impact assessment before deciding to monitor an employee by any means. The University needs to weigh up the needs of the University versus the adverse impact it will have on the individual and should consider: The purpose behind the monitoring and the benefits it is likely to deliver What likely adverse impact the monitoring will have on the employee

Monday Mid Morning What alternatives are available to monitoring or the different ways in which it could be carried out The obligations that arise from monitoring Whether the monitoring is justified. The University would also need to consider other legal obligations. For example, DS’s right to privacy under the Human Rights Act and The Regulation of Investigatory Powers Act which applies to monitoring of electronic communications

Monday Afternoon The Freedom of Information Act 2000 (“FOIA”) Providing a right of access to the general public to information by public authorities. Who can make an information request? any individual, partnership, unincorporated body or company, whether or not they are UK national or resident, and regardless of the purpose of the application. To whom can a request be made? to a “public authority”. This is a wide ranging definition, which includes most UK colleges and universities.

Monday Afternoon What information is covered by the FOIA? all information and records held in whatever media is potentially discloseable subject to exemption (see below). What formality is required in making the request? the request must be made in writing; it must include name and address of applicant; and it must describe in as much detail as possible the required information.

Monday Afternoon Publication Schemes In summary:- HE institutions must adopt and maintain a publication scheme approved by the Information Commissioner; and may adopt the model scheme which has been approved by the Information Commissioner. The schemes must set out the classes of information the institution publishes: the manner of publication of the information; details of any charges for accessing information. Charges relating to publication are not subject to a set charging scheme, unlike requests for information under the Act, where a set charging scheme applies.

Monday Afternoon Exemptions 3 types:- Absolute Qualified – public interest test Qualified – public interest test and prejudice test

Monday Afternoon Absolute Exemptions If one applies, it is not necessary to consider whether disclosure is in the public interest. Commonly claimed absolute exemptions which might apply to a University include: Accessible to applicant by other means (eg. Publication Scheme) – even if it applies, only releases the University from the duty to disclose and not to the duty to confirm or deny possession of the information; Personal Information: if the applicant should be making a subject access request under the Data Protection Act then he should pursue his request under the correct legislation. Confidential Information: if it applies the University need not confirm or deny that it holds the information or supply the information.

Monday Afternoon Confidential Information Often claimed, but less often succeeds as an exemption. Not sufficient that a document is marked as “confidential”: must have been obtained from outside the University; and disclosure would be an actionable breach of confidence. Therefore the information must have the necessary quality of confidence to justify the assertion of a contractual or equitable obligation of confidence.

Monday Afternoon Public Interest Test Commonly claimed exemptions under this category include: information intended for future publication; investigations and proceedings conducted by public authorities; and trade secrets. In order to rely on this test, the institution must conclude that the public interest in withholding the exempt information outweighs the public interest in releasing it. The Act does not define public interest.

Monday Afternoon Public Interest Test and Prejudice The exemptions can only be relied on where the public interest test is met and, in addition, the disclosure of particular information would, or would be held to, prejudice (in general terms) the interest of the United Kingdom abroad or law enforcement.

Monday Afternoon 8 Data Protection principles: The personal data must be fairly and lawfully processed Personal data must be processed for limited purposes Personal data must be adequate, relevant and not excessive Personal data must be accurate and up-to-date Personal data must not be kept longer than necessary It should be processed in accordance with the individual’s rights It must be kept secure It must not be transferred outside the European Economic Area unless the transferee country has adequate protection for the individual

Monday Afternoon Responding to a subject access request under the Act For a DPA subject access request the University can charge a nominal fee of £10 Request must be in writing (includes ) 40 calendar day time limit to respond by providing relevant information

Monday Afternoon The Legal Position The seventh data publication principle, often called the Security Principle, requires data controllers to take appropriate technical and organisational measures against: unauthorised processing of personal data; unlawful processing of personal data; and accidental loss or destruction of, or damage to, personal data.

Monday Afternoon Guidance on Data Security Breach Management Containment and recovery (initial response, investigation, containment and recovery plan including damage limitation). Assessing the risks. Notification of breaches (whether the breach of security should be notified, who should be notified, what information should be provided in the notification). Evaluation and response (evaluation of the causes of the breach and the effectiveness of the organisation’s response to it).

Monday Afternoon If Information Commissioner office notified, what will it do? It can provide guidance and assistance in dealing with the security breach. If it considers that there has been a breach of the Seventh Data Protection Principle, it may carry out enforcement action. It may “name and shame”. It may negotiate legally binding undertakings from the organisation in breach and publish the undertakings on the website of the Information Commissioner’s office and issue a press release. Typical undertakings include:- obligation to admit a breach; and agreement to implement remedial action specified by Information Commissioner, including agreement to be audited by Information Commissioner.

Monday Afternoon What preventative measures should be taken to reduce the risk of a breach? No definition in the DPA of what actually constitutes “appropriate” technical or organisational measures. But will depend on the likely harm from unlawful or unauthorised processing or accidental loss or destruction, and the nature of the data. Therefore, carry out a risk assessment. Devise a security policy. Apply security standards that take account of the risks of unauthorised access to, accidental loss or destruction of, or damage to personal data.

Monday Afternoon Institute a system of secure cabinets, access controls and passwords. Use the audit trail capabilities of automated systems to trade who accesses and amends personal data. Take steps to ensure reliability of staff who have access to workers’ records. Ensure appropriate control of records being taken off site (eg. on laptops). Make sure only necessary information is taken and there are security rules for staff to follow. Take account of risks of transmitting confidential personal information by fax or – make sure a secure network or comparable arrangements are in place.

Birketts LLP Contact Details Abigail Trencher – Head of Employment Education Direct Dial: Mobile: Sara Sayer – Head of Education Dispute Management and Student Issues Direct Dial: Mobile: