Identifying Data Protection Issues Developing Lifelong Learner Record Systems and ePortfolios in FE and HE: Planning for, and Coping with, Legal Issues.

Slides:



Advertisements
Similar presentations
PRIVACY ASPECTS OF RE-USE OF PSI: BETWEEN PRIVATE AND PUBLIC SECTOR
Advertisements

Administrative Systems and the Law What you need to know to produce an oral presentation for Unit 7 When the presentations will take place Resources you.
Introduction to basic principles of Regulation (EC) 45/2001 Sophie Louveaux María Verónica Pérez Asinari.
TEAM 4 Case Study Mauritius: Mrs Nandini Kissoon-Luckputtya
The Data Protection (Jersey) Law 2005.
Getting data sharing right for every child
DATA PROTECTION and Research University Research Ethics Committee – David Cauchi Office of the Data Protection Commissioner.
What does the Data Protection Act do? It sets standards which must be satisfied when obtaining, recording, holding, using, disclosing or disposing of.
Data Protection & Freedom of Information The Practical Implications of Data Protection and Freedom of Information Caroline Dominey Data Protection Officer.
Data Protection Data Protection Acts 1988 & 2003 Directive 95/46/EC Privacy.
Training on Data Protection Roles of the Data Protection Office.
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Data Protection Overview
 The Data Protection Act 1998 is an Act of Parliament which defines UK law on the processing of data on identifiable living people and it is the main.
The Information Commissioner’s Office David Evans.
Implementation of Security and Confidentiality in GP Practices.
Health & Social Care Apprenticeships & Diploma
EHRs and the European Union – current legislation and future directions. Dr Richard Fitton.
Computers, the law and ethics  Lesson Objective: Understand some of the legal & ethical issues in developing computer systems  Learning Outcome: Know.
The Data Protection Act 1998 The Eight Principles.
Data Protection: An enabler? David Freeland, Senior Policy Officer 23 October 2014.
GEOG3025 Confidentiality and social implications.
Data Protection Act AS Module Heathcote Ch. 12.
Data Protection Corporate training Data Protection Act 1998 Replaces DPA 1994 EC directive 94/46/EC The Information Commissioner The courts.
Processing personal health data: the regulator’s perspective Ken Macdonald Assistant Commissioner Information Commissioner’s Office.
The Data Protection Act [1998]
What is personal data? Personal data is data about an individual which they consider to be private.
The Data Protection Act - Confidentiality and Associated Problems.
DATA PROTECTION ACT 1998 Became law on 1 March 2000 Only applies to the use of personal data, that is data which relates to an identifiable living individual,
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
Local Government Reform and Compliance with the DPA Ken Macdonald Assistant Commissioner (Scotland & Northern Ireland) Information Commissioner’s Office.
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
Data Protection Property Management Conference. What’s it got to do with me ? As a member of a management committee responsible for Guiding property you.
The Data Protection Act What the Act covers The misuse of personal data by organisations and businesses.
Data Protection - Rights & Responsibilities Information Commissioner’s Office Orkney Practice Forum 4 th July 2007.
Data Protection Act The Data Protection Act (DPA) is a balance between rights of the DATA SUBJECT and obligations of the DATA CONTROLLER DATA CONTROLLER.
Computing, Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
Data Protection and research Rachael Maguire Records Manager.
Data Protection Philip Reed. Introduction What is data? What is data protection? Who needs your data? Who wants your data? Who does not need your data?
DATA PROTECTION ACT INTRODUCTION The Data Protection Act 1998 came into force on the 1 st March It is more far reaching than its predecessor,
DATA PROTECTION ACT DATA PROTECTION ACT  Gives rights to data subjects (i.e. people who have data stored about them on a computer)  Information.
Session 11 Data protection. 1 Contents Part 1: Introduction Part 2: Applicability and responsibility Part 3: Our procedures on data protection Part 4:
© University of Reading Lee Shailer 06 June 2016 Data Protection the basics.
Can you share? Yes you can!! Angus Council Adult Protection Maureen H Falconer, Senior Policy Officer Information Commissioner’s Office.
Getting data sharing right for every child Maureen H Falconer Senior Policy Officer Information Commissioner’s Office.
Presented by Ms. Teki Akuetteh LLM (IT and Telecom Law) 16/07/2013Data Protection Act, 2012: A call for Action1.
Clark Holt Limited (Co. No ), Hardwick House, Prospect Place, Swindon, SN1 3LJ Authorised and regulated by the Solicitors Regulation.
Introduction to Data Protection Plan »Brief Introduction to Data Protection  Example  Principles  P3, 4, 7  Sensitive Data  Conditions for Processing.
Students’ Unions 2011 Data Protection and Students’ Unions Mairead O’Reilly 19 July 2011.
General Data Protection Regulation (EU 2016/679)
The Data Protection Act 1998
The Data Protection Act 1998
CISI – Financial Products, Markets & Services
Trevor Ellis Trainee Programmer (1981 – 28 years ago)
Level 2 Diploma in Customer Service
Privacy Impact Assessments (PIAs)
Data Protection The Current Regime
General Data Protection Regulation
Data Protection Act.
The Data Protection Act 1998
Data Protection Legislation
GDPR Overview GDPR - General Data Protection Regulations
GDPR Road map to Compliance.
GENERAL DATA PROTECTION REGULATION (GDPR)
The General Data Protection Regulation (GDPR)
G.D.P.R General Data Protection Regulations
General Data Protection Regulation
Data Protection principles
Dr Elizabeth Lomas The General Data Protection Regulation (GDPR): Changing the data protection landscape Dr Elizabeth Lomas
Presentation transcript:

Identifying Data Protection Issues Developing Lifelong Learner Record Systems and ePortfolios in FE and HE: Planning for, and Coping with, Legal Issues.

Centre for IT & Law, University of Bristol Knowing what we know… Development of LLR/ePortfolio systems will inevitably increase personal data holdings and electronic transfers between institutions Development of LLR/ePortfolio systems will inevitably increase personal data holdings and electronic transfers between institutions DP law will require institutions to meet certain standards with regard to that processing. DP law will require institutions to meet certain standards with regard to that processing. Institutions (and groups of institutions) need to understand the: Institutions (and groups of institutions) need to understand the: –purposes, nature and scope of their processing –flows of data within the LLR/ePortfolio system –appropriate administrative & technical responsibilities –legal relationships arising from those responsibilities.

Centre for IT & Law, University of Bristol The Data Protection Principles Personal data shall be: Personal data shall be: –processed fairly and lawfully & only if certain conditions are met (Schedules 2 & 3 DPA); –obtained only for specified & lawful purposes; –adequate, relevant and not excessive. –accurate and, where necessary, kept up to date. –kept for no longer than is necessary. –processed in accordance with data subjects rights. –protected against unauthorised or unlawful processing & accidental loss, destruction, or damage. –only transferred to non-EEA countries ensuring an adequate level of protection.

Centre for IT & Law, University of Bristol Planning Compliance Build compliance into the planning/design process. Build compliance into the planning/design process. –Proposed uses of personal data –3 rd parties from whom data may be received –3 rd parties to whom data may be transferred –Risks identified & institutional responses documented. Institutional data protection officers should always be involved in this process – notification. Institutional data protection officers should always be involved in this process – notification. Later changes to the system, technical & administrative, should also be reviewed and DP implications documented before implementation Later changes to the system, technical & administrative, should also be reviewed and DP implications documented before implementation

Centre for IT & Law, University of Bristol Mapping a System - UEO I Identifying the data protection actors Identifying the data protection actors Identifying proposed purposes for data transfers and processing Identifying proposed purposes for data transfers and processing Determining data protection roles Determining data protection roles Considering categories of personal data to be processed/transferred Considering categories of personal data to be processed/transferred Identifying personal data that is sensitive personal data Identifying personal data that is sensitive personal data

Centre for IT & Law, University of Bristol Mapping a System - UEO II Determining which processing conditions might justify the processing/transfer Determining which processing conditions might justify the processing/transfer Choosing processing conditions Choosing processing conditions Dealing data subject consent Dealing data subject consent Determining when collection notices should be provided to data subjects Determining when collection notices should be provided to data subjects Dealing with data subject access Dealing with data subject access

Centre for IT & Law, University of Bristol Mapping a System - UEO III Plotting necessary contractual agreements between data protection actors Plotting necessary contractual agreements between data protection actors Considering necessary administrative documentation Considering necessary administrative documentation Plotting the necessary institutional infrastructures Plotting the necessary institutional infrastructures Identifying probable information dissemination and training needs Identifying probable information dissemination and training needs

Centre for IT & Law, University of Bristol Lessons from the UEO Example Most FE/HE institutions will be largely compliant with DP obligations as regards internal learner records/ePortfolio systems Most FE/HE institutions will be largely compliant with DP obligations as regards internal learner records/ePortfolio systems Problems are likely to arise where PD is transferred between institutions, if data controller staff are not clear what conditions attach to its processing Problems are likely to arise where PD is transferred between institutions, if data controller staff are not clear what conditions attach to its processing One key element of the mapping process is to identify responsibility and liability – see also the NIIMLE project. One key element of the mapping process is to identify responsibility and liability – see also the NIIMLE project. The other key element is ensuring that the rights of data subjects are adequately protected – a system that data subjects dont trust to protect their personal data is unlikely to be used effectively. The other key element is ensuring that the rights of data subjects are adequately protected – a system that data subjects dont trust to protect their personal data is unlikely to be used effectively.

Centre for IT & Law, University of Bristol Processes and Practices Creating processes for DP compliance is relatively straightforward Creating processes for DP compliance is relatively straightforward Ensuring that staff practice conforms with those processes is perhaps more difficult Ensuring that staff practice conforms with those processes is perhaps more difficult Proper process utilisation may require other institutional changes – employment contract clauses, information audit, compulsory training Proper process utilisation may require other institutional changes – employment contract clauses, information audit, compulsory training Both processes and practice will require re- evaluation on a regular basis, as technologies and data subject expectations evolve. Both processes and practice will require re- evaluation on a regular basis, as technologies and data subject expectations evolve.