Data Protection Act, Summary Of Consequences
|
|
|
- Cecil Simpson
- 5 years ago
- Views:
Transcription
1 DATA PROTECTION ACT 1998 UNDERTAKING Data Controller: Caerphilly County Borough Council/ Cyngor Bwrdeistref Sirol Caerffili Penallta House Tredomen Park Ystradmynach Hengoed Mid Glamorgan CF82 7PG I, Chris Burns, Interim Chief Executive of Caerphilly County Borough Council hereby acknowledge the details set out below and undertake to comply with the terms of the following Undertaking: 1. Caerphilly County Borough Council is the data controller as defined in section 1(1) of the Data Protection Act 1998 (the Act ), in respect of the processing of personal data carried out by Caerphilly County Borough Council and is referred to in this Undertaking as the data controller. Section 4(4) of the Act provides that, subject to section 27(1) of the Act, it is the duty of a data controller to comply with the data protection principles in relation to all personal data in respect of which it is a data controller. 2. The Information Commissioner (the Commissioner ) received a data breach notification on 28 November 2013 relating to covert surveillance which had been undertaken on an employee suspected of defrauding the data controller in breach of the sickness absence policy. 3. The Commissioner accepts that the use of covert surveillance to monitor employee behaviour can be justified in some circumstances. However, as set out in s of the Commissioner s Employment Code of Practice, in order to justify such action the employer must be satisfied that there are grounds for suspecting criminal activity or equivalent malpractice, and that notifying individuals about the monitoring would prejudice its prevention or detection. Abuses of an organisation s sickness policies can amount to such malpractice, but covert surveillance should only be used in exceptional circumstances as a last resort when alternatives which respect the employee s privacy have been considered and are not viable/ appropriate. 1
2 4. On the specific facts of this case the Commissioner does not consider that the data controller had sufficient evidence to warrant the authorisation of covert surveillance on an employee. In this case the employee had only been off work with a sick note for anxiety and stress for four weeks at the time the surveillance was authorised. The surveillance was authorised on the basis that the employee had told a few people that she felt housebound and the data controller believed the employee would use the absence to avoid attending meetings she was required to attend at work. 5. However there was no medical indication that the employee was housebound and no other measures were taken to discuss the employee s sickness absence and potential attendance at meetings before resorting to covert surveillance at such an early stage. The data controller has accepted that there had been no evidence to suggest that the employee would use the sickness policy as a basis for not attending the meetings she was required to attend. In fact the employee attended a meeting which took place shortly after the surveillance had been carried out without being aware that the surveillance had been conducted. 6. The data controller has also confirmed that the report which was produced by the surveillance company was never used. This was despite the report verifying that the employee was not housebound. 7. Given the above it is the Commissioner s view that there were not sufficient grounds at this early stage of the employee s sickness absence to justify the authorisation of covert surveillance. The Commissioner therefore considers that the covert surveillance of the employee s activities was unfair and in breach of the First Data Protection Principle which is set out in Schedule 1 Part I to the Act. 8. In consideration of the Commissioner not exercising his powers to serve an Enforcement Notice under section 40 of the Act, after he has taken into account the data controller s suspension of the covert surveillance of employees pending a review, the data controller undertakes as follows: 2
3 The data controller shall, as from the date of this Undertaking and for so long as similar standards are required by the Act or other successor legislation, ensure that personal data are processed in accordance with the First Data Protection Principle in Part I of Schedule 1 to the Act, and, in particular: (1) Follow the ICO s Employment Practices Code (available at es/employment) when reviewing the employee surveillance policies, procedures, guidance and training, and conducting any covert surveillance in the future. (2) In particular follow the guidance provided in section 3 of the ICO s Employment Practices code covering the use of impact assessments and covert monitoring which includes the following guidance in particular: Impact Assessments In order to ascertain whether covert surveillance could be justified the data controller should conduct an impact assessment to determine whether the adverse impact on the employee(s) is justified by the benefits to the employer and others. This is to ensure that any covert surveillance is a proportionate response to the problem it seeks to address. Such an impact assessment must: clearly identify the purpose(s) behind the surveillance and the benefits it is likely to deliver, identify any likely adverse impact of the surveillance, consider alternatives to surveillance or different ways in which it can be carried out, take into account the obligations that arise from the surveillance, and judge whether the surveillance is justified. Covert Monitoring: Senior management should authorise any covert monitoring. In doing so they must satisfy themselves that there are grounds for suspecting criminal activity or equivalent malpractice (i.e. serious but non-criminal employee misbehaviour such as fraudulently claiming sick pay) and that notifying individuals about the monitoring would prejudice its prevention or detection. Such covert monitoring should only be used in exceptional circumstances as it will be rare for covert 3
4 monitoring of employees to be justified. Ensure that any covert monitoring is strictly targeted at obtaining evidence within a set timeframe and that the covert monitoring does not continue after the investigation is complete. Do not use covert audio or video monitoring in areas which workers would genuinely and reasonably expect to be private. If a private investigator is employed to collect information on workers covertly make sure there is a contract in place that requires the private investigator to only collect information in a way that satisfies the employer s obligations under the Act. Check any arrangements for employing private investigators to ensure your contracts with them impose requirements on the investigator to only collect and use information on workers in accordance with your instructions and to keep the information secure. Ensure that information obtained through covert monitoring is used only for the prevention or detection of criminal activity or equivalent malpractice. Disregard and, where feasible, delete other information collected in the course of monitoring unless it reveals information that no employer could reasonably be expected to ignore. (3) Ensure that in every case an appropriate written impact assessment is completed. Signed: Chris Burns Interim Chief Executive Caerphilly County Borough Council Dated: 4
5 Signed: Stephen Eckersley Head of Enforcement For and on behalf of the Information Commissioner Dated: 5
Quick guide to the employment practices code
Data protection Quick guide to the employment practices code Ideal for the small business Contents 3 Contents Section 1 About this guidance 4 Section 2 What is the Data Protection Act? 5 Section 3 Recruitment
CCTV CODE OF PRACTICE
CCTV CODE OF PRACTICE Policy area: Operation of CCTV on University Premises Definitions CCTV means Closed Circuit Television. Control Room(s) means those Control Rooms manned by Security staff at the City,
Privacy and Electronic Communications Regulations
ICO lo Notification of PECR security breaches Privacy and Electronic Communications Regulations Contents Introduction... 2 Overview... 2 Relevant security breaches... 3 What is a service provider?... 3
technical factsheet 176
technical factsheet 176 Data Protection CONTENTS 1. Introduction 1 2. Register with the Information Commissioner s Office 1 3. Period protection rights and duties remain effective 2 4. The data protection
University of Birmingham. Closed Circuit Television (CCTV) Code of Practice
University of Birmingham Closed Circuit Television (CCTV) Code of Practice University of Birmingham uses closed circuit television (CCTV) images to provide a safe and secure environment for students, staff
This policy applies equally to all full time and part time employees on a permanent or fixed-term contract.
Discipline Policy 1. Introduction This policy set outs how Monitor will deal with employee conduct which falls below the expected standard. It is Monitor s aim to use the policy as a means of encouraging
Disciplinary and Dismissals Policy
Policy Purpose/statement/reason for being Disciplinary and Dismissals Policy E.G - MIP is designed to strengthen the effectiveness of individual s contribution to the Council s success. Purpose The Disciplinary
Data Security and Extranet
Data Security and Extranet Derek Crabtree Schools ICT Support Manager [email protected] Target Operating Model 2011 Merton Audit Organisation name: London Borough of Merton Periodic plan date:
VIDEO SURVEILLANCE GUIDELINES
VIDEO SURVEILLANCE GUIDELINES Introduction Surveillance of public spaces has increased rapidly over recent years. This growth is largely attributed to the significant advances in surveillance technology
Information and Privacy Commissioner of Ontario. Guidelines for the Use of Video Surveillance Cameras in Public Places
Information and Privacy Commissioner of Ontario Guidelines for the Use of Video Surveillance Cameras in Public Places Ann Cavoukian, Ph.D. Commissioner September 2007 Acknowledgements This publication
LOCAL DISCIPLINARY PROCEDURE
LOCAL DISCIPLINARY PROCEDURE 1 2 LOCAL DISCIPLINARY PROCEDURE 1. Introduction... 4 2. Aims and objectives... 4 3. The procedure... 4 4. Officers responsible for taking disciplinary action are as follows...
SURVEILLANCE AND PRIVACY
info sheet 03.12 SURVEILLANCE AND PRIVACY Info Sheet 03.12 March 2012 This Information Sheet applies to Victorian state and local government organisations that are bound by the Information Privacy Act
Disciplinary Procedure
Correct at: 1 April 2011 Author & Owner: Strategic HR, Employee Relations Contact: [email protected] 0117 35 21400 Date Adopted: June 1999 The audience of this document is made aware
Merthyr Tydfil County Borough Council. Data Protection Policy
Merthyr Tydfil County Borough Council Data Protection Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of the
UNIVERSITY COLLEGE LONDON CCTV POLICY. Endorsed by the Security Working Group - 17 October 2012
UNIVERSITY COLLEGE LONDON CCTV POLICY Endorsed by the Security Working Group - 17 October 2012 Endorsed by the Infrastructure IT Services Strategy Group - 18 October 2012 Reviewed and endorsed (with one
METLIFE SINGLE LIFE RELEVANT LIFE POLICY TERMS AND CONDITIONS
METLIFE SINGLE LIFE RELEVANT LIFE POLICY TERMS AND CONDITIONS Contents 1 The MetLife Single Life Relevant Life policy 4 2 Definitions 4 3 Minimum requirements for the MetLife Single Life Relevant Life
SEN15-P69b 24 June 2015. University Ordinances
SEN15-P69b 24 June 2015 University Ordinances Ordinance XXXV Staff Disciplinary Policy and Procedure (Version effective from 27 November 2014) This ordinance shall apply to all staff to whom paragraph
DRUGS AND ALCOHOL POLICY
DRUGS AND ALCOHOL POLICY Date of last review: April 2015 Review period: 2 years Date of next review: April 2017 Owner: Head of HR Type of policy: Network LGB or Board approval: Board Policy Agreed by Ark
Data Protection Policy
Data Protection Policy Document Ref: DPA20100608-001 Version: 1.3 Classification: UNCLASSIFIED (IL 0) Status: ISSUED Prepared By: Ian Mason Effective From: 4 th January 2011 Contact: Governance Team ICT
Data Protection Breach Management Policy
Data Protection Breach Management Policy Please check the HSE intranet for the most up to date version of this policy http://hsenet.hse.ie/hse_central/commercial_and_support_services/ict/policies_and_procedures/policies/
WEST MIDLANDS POLICE Force Policy Document
WEST MIDLANDS POLICE Force Policy Document POLICY TITLE: POLICY REFERENCE NO: POLICE STAFF DISCIPLINARY PROCEDURE HR/06 Executive Summary The Force expects certain standards of conduct to be maintained
Data Protection Policy
Data Protection Policy Owner : Head of Information Management Document ID : ICT-PL-0099 Version : 2.0 Date : May 2015 We will on request produce this Policy, or particular parts of it, in other languages
DISCIPLINE RUTLAND. limited by guarantee. Registered in England and Wales.
DISCIPLINE POLICY FOR STAFF OCTOBER 2014 HARINGTON SCHOOL RUTLAND [email protected] www. haringtonschool.com Harington School. Registered Company Number 9031174. Company limited by guarantee.
1 LAWS of MINNESOTA 2015 Ch 67, s 2. CHAPTER 67--S.F.No. 86 BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF MINNESOTA:
1 LAWS of MINNESOTA 2015 Ch 67, s 2 CHAPTER 67--S.F.No. 86 An act relating to data practices; classifying data related to automated license plate readers and requiring a governing policy; requiring a log
Employment Policies, Procedures & Guidelines for Schools
DEALING WITH ALLEGATIONS OF ABUSE AGAINST TEACHERS, OTHER STAFF AND VOLUNTEERS GUIDANCE FOR LOCAL AUTHORITIES, HEAD TEACHERS, SCHOOL STAFF AND GOVERNING BODIES July 2014 1 ABOUT THIS GUIDANCE This is statutory
2010THE LEGISLATIVE ASSEMBLY FOR THEAUSTRALIAN CAPITAL TERRITORY. WORKPLACE PRIVACY BILL 2010EXPLANATORY STATEMENT Circulated by Amanda Bresnan MLA
2010THE LEGISLATIVE ASSEMBLY FOR THEAUSTRALIAN CAPITAL TERRITORY WORKPLACE PRIVACY BILL 2010EXPLANATORY STATEMENT Circulated by Amanda Bresnan MLA OVERVIEW The objects of this Bill are to ensure that employers
Terms and conditions of use
Terms and conditions of use 1. Introduction 1.1 These terms and conditions govern your use of our website. 1.2 By using our website, you accept these terms and conditions in full; accordingly, if you disagree
Terms and conditions of use
Terms and conditions of use 1. Introduction 1.1 These terms and conditions govern your use of our website. 1.2 By using our website, you accept these terms and conditions in full; accordingly, if you disagree
Good Decision-Making Guide Good decisions make good sense
Good Decision-Making Guide Good decisions make good sense Introduction Today s community expects that public agencies will operate consistently and fairly and that government at all levels will have systems
Records Retention and Disposal Schedule. Information Management
Records Retention and Disposal Schedule Information Management Version control Version Author Policy Approved By Approval Date Publication Date Review Due V 1.0 Information Governance Unit Philip Jones,
London Borough of Brent Joint Regulatory Services ENFORCEMENT POLICY
London Borough of Brent Joint Regulatory Services ENFORCEMENT POLICY Date of implementation: 01/11/05 Issue No:01 Issued by: Stephen Moore Executive approval: 12/09/2005 INTRODUCTION 1. This document sets
Disciplinary Procedure
Disciplinary Procedure 1. Purpose and Scope This procedure is designed to help and encourage employees to achieve and maintain acceptable standards of conduct and performance whilst ensuring the fair and
ELECTRONIC TRADING FACILITIES SUPPLEMENTAL TERMS AND CONDITIONS OF TRADING
ELECTRONIC TRADING FACILITIES SUPPLEMENTAL TERMS AND CONDITIONS OF TRADING This Supplemental Terms and Conditions of Trading is supplemental to and forms part of the terms and conditions set out in the
Global investigations: what employers need to know about investigating employees
Global investigations: what employers need to know about investigating employees Plan carefully to minimise riskbe su Given increasing globalisation, multinational companies are facing new levels of risk.
Information and Privacy Commissioner of Ontario. Guidelines for Using Video Surveillance Cameras in Schools
Information and Privacy Commissioner of Ontario Guidelines for Using Video Surveillance Cameras in Schools Ann Cavoukian, Ph.D. Commissioner Revised July 2009 This publication is an updated version of
STATUTORY INSTRUMENTS. S.I. No. 336 of 2011
STATUTORY INSTRUMENTS. S.I. No. 336 of 2011 EUROPEAN COMMUNITIES (ELECTRONIC COMMUNICATIONS NETWORKS AND SERVICES) (PRIVACY AND ELECTRONIC COMMUNICATIONS) REGULATIONS 2011 (Prn. A11/1165) 2 [336] S.I.
FACS Community Complaints Guidelines for Ageing and Disability Direct Services
FACS Community Complaints Guidelines for Ageing and Disability Direct Services Summary: This is designed to guide FACS staff when handling community complaints and is an extension of the FACS Community
SUBJECT ACCESS REQUEST PROCEDURE
SUBJECT ACCESS REQUEST PROCEDURE Document History Document Reference: Document Purpose: IG31 This procedure sets out the responsibility for staff when receiving requests for information provided under
Dealing with Allegations of Abuse Against Staff in Schools. Practice Guidance
Dealing with Allegations of Abuse Against Staff in Schools Practice Guidance About this guidance This is statutory guidance from the Department for Education. Schools and colleges must have regard to it
Disciplinary Policy and Procedure
Disciplinary Policy and Procedure Policy 1. Purpose of the policy and procedure Disciplinary rules are important for the running of the University so that everyone understands what is expected of them
Disciplinary Policy and Procedure
Disciplinary Policy and Procedure Policy The success of the University is dependent on its most important resource, its staff. It is therefore vital that all employees are encouraged to work to the best
work Privacy Your Your right to Rights Know
Your right to Privacy Know Your Rights www.worksmart.org.uk at work Everyone has the right to a private life even when they re at work. But new technology is making it easier than ever for employers to
SUPPLEMENTARY INTERNAL RULES IMPLEMENTING REGULATION (EC) N 45/2001 IN RELATION TO THE DATA PROTECTION OFFICER
SUPPLEMENTARY INTERNAL RULES IMPLEMENTING REGULATION (EC) N 45/2001 IN RELATION TO THE DATA PROTECTION OFFICER 10 September 2009 page 1 / 8 SUPPLEMENTARY INTERNAL RULES IMPLEMENTING REGULATION (EC) N 45/2001
Council Tax Reduction Anti-Fraud Policy
Council Tax Reduction Anti-Fraud Policy Richard Davies Head of Revenues and Benefits, Torfaen Head of Benefits, Monmouthshire April 2015 1 Contents Section 1. 3 Background 3 Legislation and Governance
005ASubmission to the Serious Data Breach Notification Consultation
005ASubmission to the Serious Data Breach Notification Consultation (Consultation closes 4 March 2016 please send electronic submissions to [email protected]) Your details Name/organisation
STANDARDS OF PRACTICE (2013)
STANDARDS OF PRACTICE (2013) COLLEGE OF ALBERTA PSYCHOLOGISTS STANDARDS OF PRACTICE (2013) 1. INTRODUCTION The Health Professions Act (HPA) authorizes and requires the College of Alberta Psychologists
CCTV Cameras Policy. Policy Guidelines
CCTV Cameras Policy Policy Guidelines To assist in providing the safe physical environment a CCTV surveillance system has been installed at Sydney Central on the ground floor. The area covered includes
SUPPORT STAFF DISCIPLINARY AND DISMISSAL PROCEDURE
SUPPORT STAFF DISCIPLINARY AND DISMISSAL PROCEDURE SUPPORT STAFF DISCIPLINARY AND DISMISSAL PROCEDURE 1. INTRODUCTION 1.1 The Procedure has been established to help and encourage members of staff to achieve
Document Name Disciplinary Policy Accountable Body RADIUS Trust Reference HR.P2 Date Ratified 13 th August 2015 Version 1.5 Last Update August 2015
Category Human Resources Document Name Disciplinary Policy Accountable Body RADIUS Trust Reference HR.P2 Date Ratified 13 th August 2015 Version 1.5 Last Update August 2015 Related Documents Name Support
Data Protection Policy
Data Protection Policy 1. INTRODUCTION 1.1. The Data Protection Act gives you as an individual the right to know what information is held about you. It provides a framework to ensure that personal information
Policy C11 Staff Disciplinary Policy and Procedure
Policy C11 Staff Disciplinary Policy and Procedure Providing a Clear Framework to Help Promote Good Employment Relations Disciplinary rules and procedures provide guidance to employees on the standards
Disciplinary Policy & Procedure
Appendix A Title Disciplinary Policy & Procedure Type: Employment Policy Distribution All managers and staff via SBCNet Approved by: Employment & Appeals Sub-committee 7 April 2008 Issue Date: April 2008
UNIVERSITY OF MANITOBA POLICY CLOSED CIRCUIT TV (CCTV) MONITORING. Part I Reason for Policy
UNIVERSITY OF MANITOBA POLICY Policy: Effective Date: October 1, 2012 Revised Date: November 20, 2012 Review Date: October 1, 2022 Approving Body: Authority: Responsible Executive Officer: Delegate: Contact:
Discipline. Managing People. VOIP 2000 - HR Direct Fife Council April 2015 1 DI02. P o l i c y a n d P r o c e d u r e. 1 Purpose and Scope
Discipline P o l i c y a n d P r o c e d u r e 1 Purpose and Scope This procedure is designed to help and encourage all employees to achieve and maintain standards of conduct. This procedure applies to
THE CLAIMS MANAGEMENT CODE ( the Code )
THE CLAIMS MANAGEMENT CODE ( the Code ) CONTENTS 1 Introduction 2 Principles 3 Publishing the Code 4 Training and Competence 5 Advertising, Marketing and Promotional Activities 6 Charges 7 Information
The potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
SCHOOLS FRAUD RESPONSE PLAN
SCHOOLS FRAUD RESPONSE PLAN Author Jean Gleave, Chief Internal Auditor Date Last Agreed May 2012 Review Date May 2014 1 WARRINGTON BOROUGH COUNCIL SCHOOLS FRAUD RESPONSE PLAN Introduction The purpose of
Data controllers and data processors: what the difference is and what the governance implications are
ICO lo : what the difference is and what the governance implications are Data Protection Act Contents Introduction... 3 Overview... 3 Section 1 - What is the difference between a data controller and a
Self assessment tool. Using this tool
Self assessment tool How well does your organisation comply with the 12 guiding principles of the surveillance camera code of practice? Complete this easy to use self assessment tool to find out if you
CCMS Software Provider Business Assurance Statement Deed Poll
CCMS Software Provider Business Assurance Statement Deed Poll I, the of (Name of CCMS Software Provider s representative) (insert position/title) ( the Software Provider ), (insert legal entity name and
Victorian Training Guarantee Compliance Framework
Victorian Training Guarantee Compliance Framework Published by the Communications Division for Higher Education and Skills Group Department of Education and Early Childhood Development Melbourne October
Act on the Protection of Privacy in Working Life (759/2004)
NB: Unofficial translation Ministry of Labour, Finland Chapter 1 - General provisions Section 1 Purpose of the act Act on the Protection of Privacy in Working Life (759/2004) The purpose of this Act is
NHS COUNTER-FRAUD AND SECURITY MANAGEMENT
Restricted Appendix 17 Adult and Community Services County Hall, Colliton Park Dorchester Dorset DT1 1XJ Direct Line: 01305 22 Fax: 01305 224325 Minicom: 01305 267933 We welcome calls via text Relay NHS
SECURITY ENCRYPTION DATA PROTECTION. The Complete Guide to Body Worn Camera Data Protection BODY WORN CAMERA STORAGE
SECURITY DATA PROTECTION ENCRYPTION BODY WORN CAMERA STORAGE The Complete Guide to Body Worn Camera Data Protection Overview Edesix has been providing technology solutions to organisations for over ten
MODEL DISCIPLINARY PROCEDURE FOR SMALL ORGANISATIONS
MODEL DISCIPLINARY PROCEDURE FOR SMALL ORGANISATIONS Employers should comply with the Acas Code of Practice for disciplinary and grievance procedures which can be downloaded from www.acas.org.uk/dgcode2009.
How To Protect Your Privacy In The Workplace
Review of the Workplace Surveillance Act 2005 (NSW) Submission to the NSW Attorney- General s Department January 2011 e m a i l: m a i l @ p r i v a c y. o r g. a u w e bsite : w w w. p r i v a c y. o
Align Technology. Data Protection Binding Corporate Rules Processor Policy. 2014 Align Technology, Inc. All rights reserved.
Align Technology Data Protection Binding Corporate Rules Processor Policy Confidential Contents INTRODUCTION TO THIS POLICY 3 PART I: BACKGROUND AND ACTIONS 4 PART II: PROCESSOR OBLIGATIONS 6 PART III:
DATA PROTECTION POLICY
Reference number Approved by Information Management and Technology Board Date approved 14 th May 2012 Version 1.1 Last revised N/A Review date May 2015 Category Information Assurance Owner Data Protection
Exception: If the player is already in possession of a FIBA Identity Card, the card number should be indicated on the list.
Exception: If the player is already in possession of a FIBA Identity Card, the card number should be indicated on the list. H.4.4 Responsibility of national member federations H.4.4.1 H.4.4.2 H.4.4.3 H.4.4.4
COMMITTEE: HUMAN RESOURCES REF NO: HR/13/47 DATE: 12 MARCH 2014 ORGANISATIONAL CHANGE MANAGEMENT AND REDEPLOYMENT POLICY
10 COMMITTEE: HUMAN RESOURCES REF NO: HR/13/47 DATE: 12 MARCH 2014 SUBJECT: PORTFOLIO HOLDER: HEAD OF SERVICE: ORGANISATIONAL CHANGE MANAGEMENT AND REDEPLOYMENT POLICY CLLR MARTIN COOK DAVID FIELD Short
NHS North Somerset Clinical Commissioning Group. HR Policies Managing Discipline
NHS North Somerset Clinical Commissioning Group HR Policies Managing Discipline Approved by: Quality and Assurance Group Ratification date: May 2013 Review date: May 2016 1 Contents 1 Policy Statement...
OBJECTS AND REASONS. (a) the regulation of the collection, keeping, processing, use or dissemination of personal data;
OBJECTS AND REASONS This Bill would provide for (a) the regulation of the collection, keeping, processing, use or dissemination of personal data; (b) the protection of the privacy of individuals in relation
Align Technology. Data Protection Binding Corporate Rules Controller Policy. 2014 Align Technology, Inc. All rights reserved.
Align Technology Data Protection Binding Corporate Rules Controller Policy Contents INTRODUCTION 3 PART I: BACKGROUND AND ACTIONS 4 PART II: CONTROLLER OBLIGATIONS 6 PART III: APPENDICES 13 2 P a g e INTRODUCTION
Prescription Drugs and Alcohol Policy and Procedure
APPENDIX Prescription Drugs and Alcohol Policy and Procedure Purpose Scope Principles Roles and Responsibilities Definition of Substance Misuse Management Expectation Employee Disclosure Addressing the
On the edge Lexis PSL Restructuring & Insolvency
On the edge Lexis PSL Restructuring & Insolvency Data protection law for insolvency practitioners November 2014 Welcome to your third edition of On the edge, a series of guides highlighting a selection
Data Protection Procedures
Data Protection Procedures PROCEDURE OVERVIEW: This Procedure outlines Down District Council s ( the Council ) commitment to the Data Protection Act 1998 ( the Act ) and provides a framework for the Council
Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect.
PRIVACY POLICY 1. Introduction Catalyst Consulting & Events (CCE) takes seriously its commitment to preserve the privacy of the personal information that we collect. We will only collect information that
b. Other serious crimes, including organized crime, that are transnational in nature; and
Frequently Asked Questions Regarding Customs and Border Protection Receipt of Passenger Name Records Related to Flights between the European Union and the United States United States law requires airlines
COUNCIL TAX REDUCTION, DISCOUNT & EXEMPTION ANTI- FRAUD POLICY
COUNCIL TAX REDUCTION, DISCOUNT & EXEMPTION ANTI- FRAUD POLICY December 2014 1 Contents Section Page Council Tax Reduction, Discount & Exemption Anti-Fraud Policy 1 Introduction 3 2 Definition of Council
SERVICES AGREEMENT Agreement Consultant MBA SERVICES Consultancy Terms Consultant Notification Form FEES EXPENSES
SERVICES AGREEMENT This Services Agreement ( Agreement ) is a contract between you (the Consultant ) and MBA & Company Consultancy Limited ( MBA ), a company incorporated and registered in England and
POLICY. on the Protection of Personal Data of Persons of Concern to UNHCR DATA PROTECTION POLICY
POLICY on the Protection of Personal Data of Persons of Concern to UNHCR DATA PROTECTION POLICY CONTENTS 2 DATA PROTECTION POLICY 1 GENERAL PROVISIONS... 6 1.1 Purpose... 7 1.2 Rationale... 7 1.3 Scope...
High Peak CVS Disciplinary Policy and Procedure
High Peak CVS Disciplinary Policy and Procedure The effectiveness and credibility of HIGH PEAK CVS and its employees is dependent to a large extent on the ability to achieve and preserve high standards
Public Consultation regarding Data Sharing and Governance Bill. Contribution of Office of the Data Protection Commissioner
Submission of the Office of the Data Protection Commissioner (DPC) on the data-sharing and Governance Bill: - Policy Proposals (dated the 1 st of August 2014) Public Consultation regarding Data Sharing
NHS WALES. Local Health Boards DISCIPLINARY PROCEDURE AND RULES
NHS WALES Local Health Boards DISCIPLINARY PROCEDURE AND RULES 1. POLICY STATEMENT 1.1 It is the policy of Local Health Boards to promote good employment relations between them and their staff. Consequently
