Subject Access Request Protocol
|
|
|
- Miles Chambers
- 9 years ago
- Views:
Transcription
1 Data Protection Subject Access Request Protocol Policy control Reference Subject Access Request Protocol Date approved 5 th May 2015 Approving Bodies Executive Group Implementation Date 5 th May 2015 Supporting policy Data Protection Policy Review date December 2017 Author Colin Watson
2 Data Protection Subject Access Request Protocol for Glasgow School of Art Scope Who should use this protocol? This protocol should be used by any member of staff who receives a request from an individual asking for a copy of any personal data which is held by GSA (i.e. a Subject Access Request) Background What is a Subject Access Request? A Subject Access Request (SAR) is a written request made by or on behalf of an individual for information about them which GSA holds on record. He or she is entitled to ask for this personal information under the Data Protection Act 1998 (DPA). The request does not have to be in any particular form. Nor does it have to include the words subject access or make any reference to the DPA. However the request must be submitted in writing. What information is an individual entitled to? Subject access is most often used by individuals who want to see a copy of the information an organisation holds about them. However, subject access goes further than this and an individual is entitled to be: told whether any personal data is being processed; given a description of the personal data, the reasons it is being processed, and whether it will be given to any other organisations or people; given a copy of the personal data; and given details of the source of the data (where this is available). Often the easiest way to provide the relevant information is to supply copies of original documents, but you are not obliged supply complete documents. Subject access provides a right for the requester to see their own personal data only. What is the time limit for responding? In most cases you must respond to a subject access request promptly and in any event within 40 calendar days of GSA receiving it. Definitions Data Subject The Data Subject is the individual about whom data is being kept. e.g. a student, member of staff, supplier, etc. This is usually also the person who submits the subject access request; however it is 2
3 possible that the Data Subject will engage a third-party, such as a solicitor, to make the request on their behalf. Personal data Personal data is any information held on a living individual which will allow that individual to be identified. Data items that allow identification include: name, address, date of birth, National Insurance number, etc. It includes all information which is obviously about the Data Subject or their activities, or has some biographical connection to them. Personal data covers both facts and expressed opinions about the individual. Personal data can take the form of text and images (photos and videos). It can be held on a computer, on paper or on electronic media. correspondence which involves or mentions the Data Subject is considered personal data. PROCEDURE FOR DEALING WITH SUBJECT ACCESS REQUESTS When a Subject Access Request is received by any member of GSA staff, the following procedure should be followed. If the request is a normal part of the day-to-day business of the department, it should simply be treated as day-to-day business. For example if a member of staff asks for their payroll number this should be answered as a normal business query. There is no need to follow the formal procedure below. However if a request goes beyond the normal business transactions of a department, it must be dealt with formally according to the following procedure. Notification of the Receipt of Request 1. Inform GSA s Data Protection Officer Any member of staff receiving a Subject Access Request must inform GSA s Data Protection Officer immediately via GSA s Data Protection Officer is currently Colin Watson, the Head of IT ([email protected]). The Data Protection Officer will be able to provide you with guidance regarding the appropriate response to the request. If necessary the Data Protection Officer will be able to call upon legal advice to inform GSA s response. Validate and Substantiate the Request 2. Confirm the Identity of the Requester The Data Protection Officer will ask the requester for any evidence GSA reasonably needs to confirm their identity. If the requester is acting on behalf of another person, GSA will ask for evidence that they have authorisation from the Data Subject to act on their behalf. 3
4 3. Promptly ask the Requester to pay the 10 admin fee GSA charges a 10 administration fee for processing any Subject Access Request. The Data Protection Officer will ask the individual promptly to pay the fee. The 40 calendar day time limit starts when the fee has been received. 4. Establish whether more information is needed to clarify the request Has the requester been clear about exactly what information they wish to see? If not, the Data Protection Officer will contact them promptly for the other information that GSA reasonably needs to find the information they want. For example, this might involve them clarifying the identities of people or departments whom they expect to hold relevant information. 5. Identify the Responsible Departments Any general SAR can involve an extended search by many departments. Consequently, when you receive a request, and it is apparent that the information is held by more than one department, the Data Protection officer must be informed. The Data Protection Officer will consult with departments and individuals within GSA to establish where the data is held, and establish who will be involved in the search. Once the extent of the search has been determined the Data Protection Officer will convey this, via the Director of IT, to the Registrar (or other member of the Executive if the Registrar is not available) who will issue the instruction to all relevant departments to undertake the search for information. The departments who hold the data are responsible for processing their part of the request as follows. Processing the Request 6. Collate the information If GSA holds relevant information, the department (or departments) that hold the information must gather the information requested. See ANNEX 1 for Guidance to be followed by any staff who are required to conduct a search of their files for personal information relating to a Subject Access Request. Members of GSA s Executive Group have overall responsibility for ensuring that the information in their management area is collated. Heads of School/Department (academic and service) have responsibility for ensuring that the information in their respective areas is collated. See ANNEX 3 for a checklist to be completed by the responsible Head of School/Department before returning the data to the Data Protection Officer. If GSA does not hold the information that the requester wants, the Data Protection Officer will inform them at this stage, and this null response will be recorded. 4
5 7. Changing information after the request has been received It is permissible to make routine amendments and deletions to personal data after the request has been received, but only if these would normally happen. You are not permitted to make changes to the data as a result of receiving the request. 8. Remove information about other people If the data includes information about other people, you must not supply it to the requester unless the other people mentioned have given consent for the disclosure. You must still disclose as much information as possible by redacting the references to other people. i.e. the data must be edited to remove references to others. See ANNEX 1 for guidance on redaction. 9. Remove any information which is exempt Certain types of information, such as examination scripts and confidential references, are exempt from disclosure by Subject Access Request. See ANNEX 2 for information about exemptions. 10. Explain any complex terms or codes If the data includes any complex terms or codes, you must make sure that these are explained so the data can be understood. For example if your data includes course codes, these should be explained giving the full title of the course. 11. Prepare the Response Departments must provide two copies of the information in a permanent form. This usually means a printed copy, unless the individual agrees otherwise, or doing so would be impossible or involve disproportionate effort. One copy will be retained by the Data Protection Officer as a record of the response; the other copy will be sent to the requester. In cases where the material is to be supplied from a number of different departments or areas of GSA, the material should be collated in full by each Department/School first. The checklist in ANNEX 3 must be completed, signed and included with each departmental response. The response and accompanying checklist must then be sent to the Data Protection Officer for final collation. 12. Keep a record of the Response The Data Protection Officer will retain the record of the response. This may be referred to if there is any dispute. Such records should be retained for six months, and destroyed promptly thereafter. 13. Dispatch the Response Send the response to the requester, and ask for confirmation of receipt. If the data is collated from multiple departments, the response will be sent by the Data Protection Officer. If the data is held by a single department then that department should send the response, and the Data Protection Officer must be notified so the response can be recorded. Where there is a large amount of material, it might be appropriate to arrange for collection by the requester. If third-party is uplifting the response on behalf of the requester, their identity and authorisation to act on the behalf of the requester must be confirmed. 5
6 ANNEX 1: GUIDANCE FOR STAFF UNDERTAKING A SEARCH FOR PERSONAL INFORMATION IN RESPONSE TO A SUBJECT ACCESS REQUEST Staff may be required to search their files, including s and paper files, for Personal data pertinent to a Subject Access Request. The relevant information should be printed out in hardcopy where possible. (If the result of the search produces a very large amount of data, other methods of disclosure may be considered, but hardcopy is preferred.) Regarding the scope of the search: 1 The search should only include materials pertinent to the request. This might be very specific or very general depending on the detail of the request. 2 The search will normally only cover systems owned by GSA. However if there are reasonable grounds to assume that relevant data might be held on personal devices which are not owned by GSA, but which are used by GSA staff for work, (phones, personal laptops, etc.) then these should also be included in the search. Once such documents have been identified consideration must be given to whether there is any data relating to third parties also contained within them, which must not be divulged. 1 Where there is no information relating to third parties, no redaction (i.e. blanking out ) is required and the document should be printed as it is. 2 There will be some documents which contain data relating to third parties, but which the Data Subject was already privy to (because, for example, the document is one that was created or seen by them in the ordinary course of his work). In these circumstances no redaction is required and the document should be printed as it is. In all other cases where there is data relating to third parties, you must supply only the personal data relating to the Data Subject along with the context of the document. This can be done in two ways: by copying and pasting only the section relevant to the Subject, along with the title and date of the original, into another document to be printed out; or by blanking out (redacting) the information relating to third-parties so that it cannot be read. 6
7 ANNEX 2: DATA WHICH IS EXEMPT FROM DISCLOSURE There are several classes of information which are exempt from disclosure under the Data Protection Act. GSA s Data protection Officer can advise on this, but some important examples include: Examination scripts. Information comprising the answers given by a candidate during an examination is exempt from the right of subject access. So a SAR cannot be used to obtain a copy of an individual s examination script. (However this exemption does not extend to an examiner s comments on a candidate s performance in an examination, or details of marks awarded. There are special rules governing this.) References about an individual, which you have given to a third party, are exempt from subject access if you give them in confidence and for the purposes of an individual s education, training or employment or the provision of a service by them. There is no such exemption for references you receive from a third party. Personal data that is processed for management forecasting or management planning (such as planning redundancies) is exempt from the right of subject access to the extent that complying with a SAR would be likely to prejudice the business or other activity of the organisation. Personal data that consists of a record of GSA s intentions in negotiations with an individual is exempt from the right of subject access to the extent that complying with a SAR would be likely to prejudice the negotiations. Information that comprises confidential communications between GSA and a professional legal adviser may be withheld under the legal privilege exemption. 7
8 ANNEX 3 CHECKLIST TO BE COMPLETED BY HoD/HoS WHEN DATA IS COLLATED This checklist must be completed, signed, and attached to the response submitted by each Department. Academic Departments should return the completed response to their Head of School along with this checklist confirming that the response is complete. The Head of School will then collate all responses from their departments, and return the combined response to GSA s Data Protection Officer along with all checklists confirming that the response is complete. Non-academic Departments should pass the completed response directly to GSA s Data Protection Officer along with this checklist confirming that the response is complete. Completed by Department: Relating to the following Subject Access Request: ACTION TICK All relevant individuals have been consulted All relevant data is included in the enclosed response No relevant data has been changed except for routine amendments (see step 7) All reference to other individuals has been removed/redacted (see step 8) No relevant data has been omitted unless it is exempt (see step 9) Any complex terms of codes have been explained (attach as necessary) (see step 10) All relevant data has been printed (enclosed) (see step 11) Two copies are enclosed one for the response; one for retention by DPO Signed (Head of Dept/School): Date: 8
Align Technology. Data Protection Binding Corporate Rules Controller Policy. 2014 Align Technology, Inc. All rights reserved.
Align Technology Data Protection Binding Corporate Rules Controller Policy Contents INTRODUCTION 3 PART I: BACKGROUND AND ACTIONS 4 PART II: CONTROLLER OBLIGATIONS 6 PART III: APPENDICES 13 2 P a g e INTRODUCTION
SUBJECT ACCESS REQUEST
DATA PROTECTION ACT 1998 SUBJECT ACCESS REQUEST Procedure Manual 1 Invest NI Subject Access Request Procedure Manual 1. Introduction 1.1 What is a Subject Access Request? 1.2 Routine Requests 1.3 What
Child and Adult Services Subject Access Requests Guidance
Child and Adult Services Subject Access Requests Guidance This Guidance is not applicable to Access to Information requests about Adoption. For requests about Adoption please consult the Adoption and Children
Data Protection Act a more detailed guide
Data Protection Act a more detailed guide What does the Act do? The Data Protection Act 1998 places considerable duties on organisations which process personal data; increases the rights of access by data
Subject access code of practice
Data protection Subject access code of practice Dealing with requests from individuals for personal information Contents 3 Contents 1. About this code of practice 4 Purpose of the code 4 Who should use
DATA PROTECTION AND DATA STORAGE POLICY
DATA PROTECTION AND DATA STORAGE POLICY 1. Purpose and Scope 1.1 This Data Protection and Data Storage Policy (the Policy ) applies to all personal data collected and dealt with by Centre 404, whether
DATA AND PAYMENT SECURITY PART 1
STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of
Information Integrity & Data Management
Group Standard Information Integrity & Data Management Serco recognises its responsibility to ensure that any information and data produced meets customer, legislative and regulatory requirements and is
Access to Health Records
Access to Health Records Crown Heights Medical Centre Procedure Access to Health Records ACCESS TO MEDICAL RECORDS (DATA PROTECTION) POLICY INTRODUCTION The Access to Health Records Act 1990 gave individuals
DATA PROTECTION POLICY
DATA PROTECTION POLICY Version 1.3 April 2014 Contents 1 POLICY STATEMENT...2 2 PURPOSE....2 3 LEGAL CONTEXT AND DEFINITIONS...2 3.1 Data Protection Act 1998...2 3.2 Other related legislation.....4 3.3
Combar/CLLS Guidance note on the Agreement for the Supply of Services by a Barrister in a Commercial Case
Combar/CLLS Guidance note on the Agreement for the Supply of Services by a Barrister in a Commercial Case Introduction... 2 Background... 2 Entering into an agreement incorporating the Terms... 3 The Services...
DATA PROTECTION CORPORATE POLICY
DATA PROTECTION CORPORATE POLICY Information Management V1.1 03 July 2012 Not protectively marked This policy must be complied with fully by all Members, Officers Agents and Contractors of Plymouth City
DATA PROTECTION POLICY
Title Author Approved By and Date Review Date Mike Pilling Latest Update- Corporation May 2008 1 Aug 2013 DATA PROTECTION ACT 1998 POLICY FOR ALL STAFF AND STUDENTS 1.0 Introduction 1.1 The Data Protection
Data Protection for the Guidance Counsellor. Issues To Plan For
Data Protection for the Guidance Counsellor Issues To Plan For Author: Hugh Jones Data Protection Specialist Longstone Management Ltd. Published by the National Centre for Guidance in Education (NCGE)
SUPPLEMENTARY INTERNAL RULES IMPLEMENTING REGULATION (EC) N 45/2001 IN RELATION TO THE DATA PROTECTION OFFICER
SUPPLEMENTARY INTERNAL RULES IMPLEMENTING REGULATION (EC) N 45/2001 IN RELATION TO THE DATA PROTECTION OFFICER 10 September 2009 page 1 / 8 SUPPLEMENTARY INTERNAL RULES IMPLEMENTING REGULATION (EC) N 45/2001
Subject Access Request Procedure (Data Protection) Doc No IMPR04 Rev 2 27/07/11. 1.0 Scope. 2.0 Responsibilities and Definitions
Doc No IMPR04 1.0 Scope The Data Protection Act 1998 (DPA) provides individuals with rights in connection with personal data held about them. It provides those individuals with a right of access to that
Caedmon College Whitby
Caedmon College Whitby Data Protection and Information Security Policy College Governance Status This policy was re-issued in June 2014 and was adopted by the Governing Body on 26 June 2014. It will be
Employee Payroll Deduction Scheme. Protocol for direct deductions from wages between. [ ] ( the Credit Union ) and
Employee Payroll Deduction Scheme Protocol for direct deductions from wages between [ ] ( the Credit Union ) and Cumbria County Council of the Courts, English Street, Carlisle, CA3 8LZ ( the Council )
Information Governance Policy
Information Governance Policy Reference: Information Governance Policy Date Approved: April 2013 Approving Body: Board of Trustees Implementation Date: April 2013 Version: 6 Supersedes: 5 Stakeholder groups
DATA RETENTION POLICY
DATA RETENTION POLICY Contents 1. Key Principles... 3 2. Introduction to the Policy and Guidelines... 3 3. Policy and Guidelines... 4 4. Scottish Ministers Requirements... 5 5. Access to information...
Merthyr Tydfil County Borough Council. Data Protection Policy
Merthyr Tydfil County Borough Council Data Protection Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of the
Zinc Recruitment Pty Ltd Privacy Policy
1. Introduction Zinc Recruitment Pty Ltd Privacy Policy We manage personal information in accordance with the Privacy Act 1988 and Australian Privacy Principles. This policy applies to information collected
Fairness at Work (Grievance Policy & Procedure)
Fairness at Work (Grievance Policy & Procedure) Publication Scheme Y/N Department of Origin Policy Holder Author Related Documents Can be Published on Force Website HR Operations Head of HR Operations
PERSONAL INJURIES ASSESSMENT BOARD DATA PROTECTION CODE OF PRACTICE
PERSONAL INJURIES ASSESSMENT BOARD DATA PROTECTION CODE OF PRACTICE ADOPTED ON 9 th January 2008 TABLE OF CONTENTS Page No. 1 Introduction...3 2 Glossary...3 3 Types of Personal Data held by Us...3 4 Obligations
Data Protection Act 1998 Subject Access Request - Application Form
Data Protection Act 1998 Subject Access Request - Application Form Subject to certain exemptions, you have a right to information held about you i.e. your personal data. You as the Data Subject have a
Subject Access Request (SAR) Procedure
Subject Access Request (SAR) Procedure East and North Hertfordshire Clinical Commissioning Group Page 1 of 16 DOCUMENT CONTROL SHEET Document Owner: Chief Finance Officer Document Author(s): Anne Ephgrave
ATMD Bird & Bird. Singapore Personal Data Protection Policy
ATMD Bird & Bird Singapore Personal Data Protection Policy Contents 1. PURPOSE 1 2. SCOPE 1 3. COMMITMENT TO COMPLY WITH DATA PROTECTION LAWS 1 4. PERSONAL DATA PROTECTION SAFEGUARDS 3 5. ATMDBB EXCEPTIONS:
Negotiated Relationship Agreement between the International Criminal Court and the United Nations. Preamble
Negotiated Relationship Agreement between the International Criminal Court and the United Nations Preamble The International Criminal Court and the United Nations, Bearing in mind the Purposes and Principles
3. Consent for the Collection, Use or Disclosure of Personal Information
PRIVACY POLICY FOR RENNIE MARKETING SYSTEMS Our privacy policy includes provisions of the Personal Information Protection Act (BC) and the Personal Information Protection and Electronic Documents Act (Canada),
Subject Access Request, Procedure, Guidance and Information
Subject Access Request, Procedure, Guidance and Information Updated: July 2015 Page 1 of 61 CONTENTS 1. Introduction 5 2. Legal Context 5 3. Subject Access Request to Personal Records Guidance 6 Guidance
ROYAL AUSTRALASIAN COLLEGE OF SURGEONS
1. SCOPE This policy details the College s privacy policy and related information handling practices and gives guidelines for access to any personal information retained by the College. This includes personal
SUBJECT ACCESS REQUEST PROCEDURE
SUBJECT ACCESS REQUEST PROCEDURE Document History Document Reference: Document Purpose: IG31 This procedure sets out the responsibility for staff when receiving requests for information provided under
Data Protection and Data security Policy
Data Protection and Data security Policy Statement of policy and purpose of Policy 1. Somer Valley Community Radio Ltd (the Employer) is committed to ensuring that all personal information handled by us
technical factsheet 176
technical factsheet 176 Data Protection CONTENTS 1. Introduction 1 2. Register with the Information Commissioner s Office 1 3. Period protection rights and duties remain effective 2 4. The data protection
Code of Practice on Data Protection for the Insurance Sector
Code of Practice on Data Protection for the Insurance Sector (Approved by the Data Protection Commissioner under Section 13 (2) of the Data Protection Acts, 1988 and 2003) Forward I am very happy to be
MULTILATERAL MEMORANDUM OF UNDERSTANDING CONCERNING CO-OPERATION IN THE EXCHANGE OF INFORMATION FOR AUDIT OVERSIGHT
MULTILATERAL MEMORANDUM OF UNDERSTANDING CONCERNING CO-OPERATION IN THE EXCHANGE OF INFORMATION FOR AUDIT OVERSIGHT INTERNATIONAL FORUM OF INDEPENDENT AUDIT REGULATORS Adopted on June 30, 2015 1 Table
Data Processing Agreement for Oracle Cloud Services
Data Processing Agreement for Oracle Cloud Services Version December 1, 2013 1. Scope and order of precedence This is an agreement concerning the Processing of Personal Data as part of Oracle s Cloud Services
Human Resources Policy No. HR46
Human Resources Policy No. HR46 Maintaining Personal Files and ESR Records Additionally refer to HR04 Verification of Professional Registration HR33 Recruitment and Selection HR34 Policy for Carrying Out
Appendix A. Call-off Terms and Conditions for the Provision of Services
Appendix A Call-off Terms and Conditions for the Provision of Services Where an Order Form is issued by the Authority that refers to the Framework Agreement, the Contract is made between the Authority
Scottish Rowing Data Protection Policy
Revision Approved by the Board August 2010 1. Introduction As individuals, we want to know that personal information about ourselves is handled properly, and we and others have specific rights in this
HOME TRUST COMPANY PRIVACY NOTICE/PRIVACY CODE for Creditworx/Home Owner Merchant Express
HOME TRUST COMPANY PRIVACY NOTICE/PRIVACY CODE for Creditworx/Home Owner Merchant Express This Privacy Notice and Privacy Code detail how Home Trust Company ( Home Trust, we, us, our ) collects, uses and
DATA PROTECTION POLICY. Examples of personal data which TWM may require from clients include the following and for the reasons ascribed to each;
DATA PROTECTION POLICY Introduction TWM Solicitors maintain certain personal data about individuals for the purposes of satisfying operational and legal obligations. The Data Protection Act sets rules
University of Limerick Data Protection Compliance Regulations June 2015
University of Limerick Data Protection Compliance Regulations June 2015 1. Purpose of Data Protection Compliance Regulations 1.1 The purpose of these Compliance Regulations is to assist University of Limerick
Information Sharing Policy
Information Sharing Policy REFERENCE NUMBER IG 010 / 0v3 February 2013 VERSION V1.0 APPROVING COMMITTEE & DATE Clinical Executive Committee 5.2.13 REVIEW DUE DATE February 2016 West Lancashire CCG is committed
Protection. Code of Practice. of Personal Data RPC001147_EN_WB_L_1
Protection of Personal Data RPC001147_EN_WB_L_1 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Responsibility of Employees
Guidance on Requesting Personal Information.
Guidance on Requesting Personal Information. The following is a guidance to help make sure you get everything you want and need from Vodafone, when you request your personal information. If you need help
Reedy Lagoon Corporation Limited (ABN 41 006 639 514) (the Company )
Disclosure and communication policy Reedy Lagoon Corporation Limited (ABN 41 006 639 514) (the Company ) Disclosure and communication policy Contents 1 Introduction 1 1.1 Company s commitment to disclosure
Data protection policy
Data protection policy Introduction The College is required to keep certain information about employees, students and other users to allow it to monitor performance, achievements, health and safety, recruitment
DATA PROTECTION POLICY
DATA PROTECTION POLICY Approval date: June 2014 Approved by: Board Responsible Manager: Executive Director of Resources Next Review June 2016 Data Protection Policy 1. Introduction Data Protection Policy
Align Technology. Data Protection Binding Corporate Rules Processor Policy. 2014 Align Technology, Inc. All rights reserved.
Align Technology Data Protection Binding Corporate Rules Processor Policy Confidential Contents INTRODUCTION TO THIS POLICY 3 PART I: BACKGROUND AND ACTIONS 4 PART II: PROCESSOR OBLIGATIONS 6 PART III:
Data Protection Policy
Data Protection Policy Introduction The Data Protection Act 1998 gives individuals the right to know what personal information is held about them. It provides a framework to ensure that the Office of the
1.4 For information about our management of your other personal information, please see our Privacy Policy available at www.iba.gov.au.
Indigenous Business Australia Credit Information Policy 1 Purpose and application of this policy 1.1 This credit reporting policy (Credit Information Policy) describes and establishes how Indigenous Business
Office 365 Data Processing Agreement with Model Clauses
Enrollment for Education Solutions Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Enrollment for Education Solutions number Microsoft to complete 7392924 GOLDS03081
Information Governance Policy
Information Governance Policy 1 Introduction Healthwatch Rutland (HWR) needs to collect and use certain types of information about the Data Subjects who come into contact with it in order to carry on its
BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS
BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS Mat Wright www.britishcouncil.org CONTENTS Purpose of the code 1 Scope of the code 1 The British Council s data protection commitment and
CREDIT REPORTING POLICY
CREDIT REPORTING POLICY The Clean Energy Finance Corporation ("CEFC", we, us, our in this Credit Reporting Policy) respect the privacy of personal information and credit information you may provide to
Data Protection Policy
Data Protection Policy Owner : Head of Information Management Document ID : ICT-PL-0099 Version : 2.0 Date : May 2015 We will on request produce this Policy, or particular parts of it, in other languages
DATA PROTECTION POLICY
DATA PROTECTION POLICY Rev No. 0 New Document 1 2 3 4 5 6 7 Revision Status Details of Amendments Name Date Update of College DPA statement New Reference to Appendix 4 Staff Guidelines ESF document retention
MENTAL HEALTH TRIBUNAL FOR SCOTLAND: RECORDS MANAGEMENT POLICY. Ensuring Information is Accurate and Fit for Purpose
MENTAL HEALTH TRIBUNAL FOR SCOTLAND: RECORDS MANAGEMENT POLICY Index: Introduction Information is a Corporate Resource Personal Responsibility Information Accessibility Keeping Records of what we do Ensuring
Health & Wellbeing Framework. Absence Management Policy
Health & Wellbeing Framework Absence Management Policy 1 Introduction This Policy is part of the Health & Wellbeing Framework which is made up of a number of elements which together encompass all formal
Disclosure and communication policy. nib holdings limited ACN 125 633 856 (the Company )
Disclosure and communication policy nib holdings limited ACN 125 633 856 (the Company ) Dated 23 July 2015 Disclosure and communication policy Contents 1 Introduction 1 1.1 Company s commitment to disclosure
Data Protection and Privacy Policy
Data Protection and Privacy Policy 1. General This policy outlines Conciliation Resources commitments to respect the privacy of people s personal information and observe the relevant data protection legislation.
Human Resources Policy documents. Data Protection Policy
Policy documents Aims of the Policy apetito is committed to meeting its obligations under data protection law. As a business, apetito handles a range of Personal Data relating to its customers, staff and
1. Introduction... 3. 2. Statement of Policy. 3. 3. The Eight Principles of Data Protection... 4. 4. Scope... 5. 5. Roles and Responsibilities.
Data Protection Policy 2011 Contents Page 1. Introduction... 3 2. Statement of Policy. 3 3. The Eight Principles of Data Protection...... 4 4. Scope.... 5 5. Roles and Responsibilities. 5 6. Development
John Leggott College. Data Protection Policy. Introduction
John Leggott College Data Protection Policy Introduction The College needs to keep certain information about its employees, students and other users to allow it to monitor performance, achievements, and
University of Birmingham. Closed Circuit Television (CCTV) Code of Practice
University of Birmingham Closed Circuit Television (CCTV) Code of Practice University of Birmingham uses closed circuit television (CCTV) images to provide a safe and secure environment for students, staff
How To Protect Your Personal Information At A College
Data Protection Policy Policy Details Produced by Assistant Principal Information Systems Date produced Approved by Senior Leadership Team (SLT) Date approved July 2011 Linked Policies and Freedom of Information
Data Protection Consent Clause and Policy Background
Data Protection Consent Clause and Policy Background The Singapore Personal Data Protection Act - 2012 (PDPA) establishes a data protection law that comprises various rules governing the collection, use,
LGRF. Procurement Probity Plan. July 2012
LGRF July 2012 When to develop a : A probity plan is best used for any procurement of medium complexity and size and above. A probity plan can be implemented without use of a probity advisor/auditor. Description
PRESIDENT S DECISION No. 40. of 27 August 2013. Regarding Data Protection at the European University Institute. (EUI Data Protection Policy)
PRESIDENT S DECISION No. 40 of 27 August 2013 Regarding Data Protection at the European University Institute (EUI Data Protection Policy) THE PRESIDENT OF THE EUROPEAN UNIVERSITY INSTITUTE, Having regard
This Amendment consists of two parts. This is part 1 of 2 and must be accompanied by and signed with part 2 of 2 (Annex 1) to be valid.
Microsoft Online Subscription Agreement Amendment adding Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Proposal ID MOSA number Microsoft to complete This Amendment
Clause 1. Definitions and Interpretation
[Standard data protection [agreement/clauses] for the transfer of Personal Data from the University of Edinburgh (as Data Controller) to a Data Processor within the European Economic Area ] In this Agreement:-
Personal information, for purposes of this Policy, includes any information which relates to an identified or an identifiable person.
PART I: INTRODUCTION AND BACKGROUND Purpose This Data Protection Binding Corporate Rules Policy ( Policy ) establishes the approach of Fluor to compliance with European data protection law and specifically
Recognition of Prior Learning (RPL) Kit. BSB50607 Diploma of Human Resources Management
Recognition of Prior Learning (RPL) Kit BSB50607 Diploma of Human Resources Management Applicant: Date: Diploma of Human Resources Management RPL Kit 1 Applicant declaration: I have completed the following
POLICY STATEMENT 5.17
POLICY STATEMENT 5.17 DENTAL RECORDS 1 (Including ADA Guidelines for Dental Records) 1. Introduction 1.1 Dentists have a professional and a legal obligation to maintain clinically relevant, accurate and
Insurance Regulatory Authority
Insurance Regulatory Authority MARKET CONDUCT GUIDELINES FOR INSURANCE INTERMEDIARIES JUNE 2011 THE INSURANCE ACT (CAP 487) MARKET CONDUCT GUIDELINES FOR INSURANCE INTERMEDIARIES TABLE OF CONTENTS 1.0
Working Protocol. between the Practitioner Health Programme. and. the National Clinical Assessment Service
Working Protocol between the Practitioner Health Programme and the National Clinical Assessment Service Purpose of this document 1. The purpose of this document is to provide practical guidance on how
Claim Management Policy
Claim Management Policy REFERENCE NUMBER Claim management policy VERSION V1.0 APPROVING COMMITTEE & DATE Clinical Executive Committee REVIEW DUE DATE May 2018 1 West Lancashire CCG is committed to ensuring
John Partridge Solicitor t/a SME Legal Services terms and conditions
John Partridge Solicitor t/a SME Legal Services terms and conditions Our aim We aim to offer our clients quality legal advice with a personal service at a fair cost. As a start, we hope it is helpful to
Service Level Agreement for the Introduction of Permanent and/or Fixed Term Contract Staff
Service Level Agreement for the Introduction of Permanent and/or Fixed Term Contract Staff TABLE OF CONTENTS: 1. INTRODUCTION... 2 2. DEFINITIONS... 2 3. EXPECTED SERVICES AND RESPONSIBILITIES... 3 4.
