Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.

Slides:



Advertisements
Similar presentations
Principle 1 Principle 1 Processed fairly and lawfully + only with a legitimate basis There should be no surprises, so … inform data subjects why you are.
Advertisements

The Gathering Cloud computing - Legal considerations David Goodbrand, Partner 28 February 2013 Aberdeen Edinburgh Glasgow.
Confidentiality & Records Management. What is Information Governance? What is Records Management?
The Data Protection (Jersey) Law 2005.
Getting data sharing right for every child
Data Protection webinar: Data Protection & Volunteers 19 th June 2014 Welcome. We’re just making the last few preparations for the webinar to start at.
Data Protection & Freedom of Information The Practical Implications of Data Protection and Freedom of Information Caroline Dominey Data Protection Officer.
Audiences NI Data Protection Workshop
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Data Protection Overview
The Data Protection Act
The ICO and the DPA Ken Macdonald Assistant Commissioner Information Commissioner’s Office ScotStat Public Sector Analysts Network 30 th September 2010.
CENTRAL SCOTLAND POLICE Data Protection & Information Security Stuart Macfarlane Information Governance Unit Police Service of Scotland.
Administrative Practices Outcome 1
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
The Information Commissioner’s Office David Evans.
Implementation of Security and Confidentiality in GP Practices.
Handling information 14 Standard.
Health & Social Care Apprenticeships & Diploma
Computers, the law and ethics  Lesson Objective: Understand some of the legal & ethical issues in developing computer systems  Learning Outcome: Know.
NOT PROTECTIVELY MARKED Data Protection Information Management & Information Security.
The Data Protection Act 1998 The Eight Principles.
Information Sharing Sheila Logan Information Commissioner’s Office Employability Partnership Event Glasgow 13 August 2009.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
Data Protection: An enabler? David Freeland, Senior Policy Officer 23 October 2014.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Investigating Rights and Responsibilities at work
Data Protection Act AS Module Heathcote Ch. 12.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
Data Protection Act ‘ What you need to know’ Corporate Information Governance Team Strategic Intelligence.
Processing personal health data: the regulator’s perspective Ken Macdonald Assistant Commissioner Information Commissioner’s Office.
The Data Protection Act - Confidentiality and Associated Problems.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
Local Government Reform and Compliance with the DPA Ken Macdonald Assistant Commissioner (Scotland & Northern Ireland) Information Commissioner’s Office.
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
Data Protection Property Management Conference. What’s it got to do with me ? As a member of a management committee responsible for Guiding property you.
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
The Data Protection Act What the Act covers The misuse of personal data by organisations and businesses.
12/12/2015 Data Protection Act /12/2015 The DP Act A law that protects personal privacy and upholds individual’s rights Anyone who handles personal.
Data Protection - Rights & Responsibilities Information Commissioner’s Office Orkney Practice Forum 4 th July 2007.
Data Protection Act The Data Protection Act (DPA) is a balance between rights of the DATA SUBJECT and obligations of the DATA CONTROLLER DATA CONTROLLER.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Computing, Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
Data Protection and research Rachael Maguire Records Manager.
Session 12 Information management and security. 1 Contents Part 1: Introduction Part 2: Legal and regulatory responsibilities Part 3: Our Procedures Part.
DATA PROTECTION ACT DATA PROTECTION ACT  Gives rights to data subjects (i.e. people who have data stored about them on a computer)  Information.
Can you share? Yes you can!! Angus Council Adult Protection Maureen H Falconer, Senior Policy Officer Information Commissioner’s Office.
Getting data sharing right for every child Maureen H Falconer Senior Policy Officer Information Commissioner’s Office.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
Sharing Personal Data ‘What you need to know’ Corporate Information Governance Team Strategic Intelligence.
Scientific data storage: How are computers involved in the following?
Commissioning Services: with the DPA in mind South Yorkshire Information and Data Sharing Group Sheffield 14 th August 2014 Lynne Shackley Lead Policy.
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
Data protection act. During the second half of the 20th century, businesses, organisations and the government began using computers to store information.
The Data Protection Act 1998
PowerPoint presentation
CISI – Financial Products, Markets & Services
Trevor Ellis Trainee Programmer (1981 – 28 years ago)
Privacy Impact Assessments (PIAs)
Current ‘Hot Topics’ in Information Security Governance Auditing
Data Protection Act.
The Data Protection Act 1998
Data Protection Legislation
G.D.P.R General Data Protection Regulations
Data Protection principles
General Data Protection Regulations 2018
Data Protection What can I do? GDPR Principles General Data Protection
Handling information 14 Standard.
Presentation transcript:

Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008

The Data Protection Principles All data controllers must comply with the Data Protection Act 1998

The 8 Principles Fair and lawful. Only used for specified purposes. Adequate, relevant and not excessive. Accurate and up to date. Not kept longer than necessary. Individual rights. Kept secure. Not transferred outside European Economic Area without adequate protection.

Information Security The Data Protection Act 1998 requires all organisations to have appropriate security to protect personal information against unlawful or unauthorised use or disclosure, and accidental loss destruction or damage. Principle 7

7th Data Protection Principle Security contraventions can have BIG implications Potential harm to individuals when things go wrong. Damage to business reputation.

Risk based assessment Information is an organisation’s second most important asset. Do you know what information the organisation possesses? Do you have detailed security procedures? Does your asset register include hard wear and portable media?

How valuable or sensitive is the information? What effect would a security breach have on your organisation? In costs? To your reputation? To the trust of your customers, clients and stakeholders? What damage or distress could be caused to individuals if there were a security breach?

Who is responsible? Day to day responsibility for security. Written procedures for staff to follow. Excellent staff training. Regular audits. Monitoring changes. Investigating a security incident.

Organisational measures Has a risk assessment been carried out? How effective are your current security measures? Where are the weaknesses?

Organisational measures Senior management commitment. Making resources available. Know where responsibility lies. Do staff understand security the procedures? Are changes required?

Staff High proportion of security incidents are staff related. What background checks are carried out? Valid qualifications. Disclosures - accidental, procured or deliberate? Contract of employment. Access to internet and policies.

Examples of good practice Transparent and appropriate vetting procedures. Risk assessment for staff who have access to large volumes of customer data. Not wearing company passes outside the workplace. Changing computer access when changing roles.

Physical security

General vulnerability – isolated, ground floor, poor lighting, previous incidents. Entry and exit points. Laptops and external devices. Paper – including disposal of confidential waste.

Examples of good practice Configure equipment so data cannot be copied. Disable drives so corrupt data cannot be introduced to your system. Restrict access to areas of high risk. Visitor policy for ALL visitors. A key register. Lockers for staff use.

Examples of good practice Portable Media: Genuine business need to have device. Encryption for customer information. Safe storage. Who has these devices? What happens when they leave the organisation. Company mobile phones.

Examples of good practice Disposal of personal information Using contractor to dispose of paper and computer equipment. Guidance for home workers and mobile staff. Audits and spot checks. Storage in secure and controlled area.

What are the real benefits? Organisational efficiency. Fewer complaints and less compensation. Business reputation. Customer confidence. Overall reduction in costs.

Information Commissioner’s Office 28 Thistle Street Edinburgh EH2 1EN Telephone Website – – CONTACT DETAILS