University of Limerick Data Protection Compliance Regulations June 2015
|
|
|
- Warren Fitzgerald
- 10 years ago
- Views:
Transcription
1 University of Limerick Data Protection Compliance Regulations June Purpose of Data Protection Compliance Regulations 1.1 The purpose of these Compliance Regulations is to assist University of Limerick employees in adhering to the University's Data Protection Policy and the Data Protection Acts (1988 & 2003). The University s Data Protection Policy (available at and these Regulations affirm the University s commitment to protecting the privacy rights of individuals in accordance with the Data Protection legislation. These Compliance Regulations set out a range of areas of work in which data protection issues arise and outline best practice that employees should follow. 2. Explanation of terms PART 1: Explanation of Terms and Guidance on Data Protection Rules Data: information in a form that can be processed - includes both electronically held data and paper-based data; Electronic/soft-copy data: information held in an electronic format e.g. on computer, or information recorded with the intention that it be processed by computer; Hard-copy data: information that is recorded in paper format and is held as part of a relevant filing system or with the intention that it forms part of such a system; Personal data: data which relates to a living individual who is identifiable either from the data itself or from the data in conjunction with other information held by the University. This can include one or more factors relating to a person s physical, physiological, mental, economic, cultural or social identity. The Acts also differentiate between personal data and sensitive personal data ; Sensitive personal data relates to a person's racial or ethnic origin; political opinions; religious or philosophical beliefs; physical and mental health; sexual life; criminal convictions; the alleged commission of an offence and trade union membership. The Data Protection Acts require that additional conditions be met for the processing of such data. Data Subject: an individual to whom personal data relates; 1
2 Data Controller: a body that processes information about living people. The data controller must be in a position to control the contents and use of personal data and has overall responsibility for the privacy and security of that data at all times; Data Processor: a body that processes personal data on behalf of a data controller; Processing: the performing of any operation / set of operations on data, comprising: o obtaining, assembling, organising and storing data, o using, consulting and retrieving data, o altering, erasing and destroying data, o disclosing data. 3. Role of Data Protection Commissioner 3.1 The Data Protection Commissioner oversees compliance with the terms of the legislation. The Commissioner has a wide range of enforcement powers, including investigation of University records and record-keeping practices. Should the University be found guilty of an offence it can be fined up to 100,000 and/or may be ordered to delete data. 4. The University s Obligations under Data Protection 4.1 As stated in the University s Data Protection Policy, there are eight rules under data protection, which govern the processing of personal data. When processing personal data, whether in paper or electronic form, the following must apply at all times: Obtain and process the personal data fairly; Keep only for one or more specified, explicit & lawful purpose(s); Use and disclose only in ways compatible with the purpose(s) for which it was initially provided; Keep safe and secure; Keep accurate, complete and up-to-date; Ensure that it is adequate, relevant and not excessive; Retain for no longer than is necessary for the specified purpose(s); Provide a copy of his/her personal data to an individual, on request. 4.2 Obtain and process the data fairly: Personal data is obtained fairly if the data subject is aware of: o the purpose(s) for which the University collects the data; o the categories of person/organisation to whom the data may be disclosed; o that some questions in forms may be optional; o the right of access to their data and their right of rectification of their data; Consent for the processing of personal data should be obtained from the data subject; It is essential to obtain explicit consent for the processing of sensitive personal data by way of signature, opt-in box etc. 2
3 4.3 Keep only for specified and lawful purpose(s); Personal data already collected for a specific purpose may not be used for further processing if the secondary purpose is not compatible with the original purpose. 4.4 Use and disclose only in ways compatible with the purposes for which it was initially given; Personal data should only be accessed in order to complete official functions of the University; Personal data should only be disclosed to work colleagues where the data is required to fulfil an official function of the University; Personal data must be kept confidentially and must never be discussed with/disclosed to any unauthorised third party, either internal or external to the University without the prior consent of the data subject, except where there is a statutory obligation to do so (e.g. if required for the purpose of preventing, detecting or investigating offences, required urgently to prevent damage to health or serious loss/damage to property, required under law etc.); Personal data relating to a data subject must not be disclosed to any third party, even if they identify themselves as a parent, current/potential employer, professional body, sponsor, etc. Such disclosures must only be with the consent of the individual concerned. This includes requests for contact details (e.g. address, mobile phone number) or even a request to confirm a person s attendance at the University; Where individuals (the data subjects) wish to discuss personal data relevant to themselves, the employee must confirm one or more facts that should be known only to the data subjects such as their date of birth, student number, mother s maiden name etc prior to any disclosure. 4.5 Keep safe and secure; Use and storage of personal data in electronic format must be subject to stringent controls (e.g. use of password protection, timed log-out of systems, encryption of PC folders and portable devices, regular backup, use of anonymisation software etc); Authorised users of personal data must ensure that personal data they have access to as part of their duties is kept securely at all times and is protected from inadvertent disclosure, loss, destruction, alteration or corruption; Personal data must not be stored or transported on unencrypted laptops, USB devices or other portable devices and every effort must be made to ensure the security of the encrypted devices (e.g. do not store a laptop in your car or allow unauthorised individuals to view computer screens displaying sensitive information); Any personal data requiring electronic transfer must be password protected or encrypted; 3
4 When upgrading/changing a PC, always ensure the contents of the hard drive of your old PC are irrevocably deleted by an authorised ITD employee; Screens, printouts, documents, and files showing personal data must not be accessible to unauthorised persons; Personal data held in paper format must be stored securely in cabinets in locked rooms; Subject to the schedules set out in the University s Records Management & Retention Policy ( personal data held must be destroyed by confidential shredding/secure deletion when the retention period has expired. 4.6 Keep accurate and up-to-date; Administrative procedures should include review and local audit facilities so that personal data is accurate, complete and kept upto-date. 4.7 Ensure that it is adequate, relevant and not excessive; The personal data held by the University should be adequate to enable the University achieve its purposes, and no more. Personal data must not be collected or held on a just in case basis. 4.8 Retain for no longer than is necessary for the specified purpose/purposes; Personal data should be held for the periods specified in the University s Records Management & Retention Policy ( The retention and confidential destruction of personal data must be carried out in accordance with that policy. 4.9 Provide a copy of his/her personal data to an individual, on request. The Acts provide for the right of access by the data subject to his/her personal data. Where an access request is received, it should be directed to the Information & Compliance Officer in the Corporate Secretary s Office within a maximum of three days of receipt of the request in order to enable the University comply with the entitlements of the requester within the timeframes specified in the Acts. 4
5 PART 2: Best Practice Guidance for Key Areas of Work where Data Protection Issues arise (not an exclusive list) 5. Use of Third Party Agents (Data Processors) by the University 5.1 There are times when, rather than discharge a service itself, the University may be required to outsource the supply of a service to an external supplier. Data Protection is relevant where service providers have access to the personal data of individual students, employees and other customers. 5.2 If the service involves the processing of personal data on behalf of the University, then in accordance with the Data Protection Acts, there must be a written contract between the University (data controller) and the supplier of the service (data processor). 5.3 The Office of the Data Protection Commissioner advises that this contract should stipulate at least the following: the conditions under which personal data may be processed; the minimum security measures that the data processors must have in place; provision that will enable the data controller to ensure that the data processor is compliant with the security requirements. 5.4 All proposed agreements between the University (data controller) and a third party (data processor) must be developed in conjunction with the Corporate Secretary s Office. 6. Transfer of Personal Data outside the European Economic Area (EEA) 6.1 The Data Protection Acts 1988 and 2003 specify conditions that must be met before personal data may be transferred to third countries [that is, countries outside of the European Economic Area (EEA)]. In addition, some third countries have been approved for this purpose by the EU Commission and are known as approved countries. 6.2 Organisations that wish to transfer personal data from Ireland to third countries other than those deemed an approved country must first ensure that the country in question provides an adequate level of data protection. In this regard special conditions must be met before personal data may be transferred Specific provisions are in place concerning personal data transfers to service providers in the United States of America who are registered under the US-EU Safe Harbour' arrangement Where a country is not an approved country nor has the Safe Harbour arrangement, EU-approved 'Model Contracts' which contain data protection safeguards to EU standards or Binding Corporate Rules options may be used. 5
6 6.3 All proposed agreements between the University (data controller) and a third party (data processor) which will involve the transfer of personal data outside the EEA must be developed in conjunction with the Corporate Secretary s Office. 7. Examination Marks, Publication of Student Pass Lists 7.1 Internal and external examiner comments, whether made on an examination script or in another form that allows them to be held and linked to the original script or to a specific candidate (e.g. an examiner's report) are subject to an access request under the Acts. 7.2 The publication of student pass lists on departmental noticeboards is regarded as acceptable by the Office of the Data Protection Commissioner, provided that results are displayed using a student ID number rather than student name, and that no further personal data is presented. 8. Personal Data for Research 8.1 Research data comprises all recorded descriptive, numerical, physical or visual material collected and used in the conduct of research, irrespective of medium (e.g. paper or electronic records, physical samples etc.). 8.2 Research data may be of a personal or non-personal nature - research data of a personal nature must be collected and processed in accordance with the Data Protection Acts 1988 & 2003, the University s Data Protection Policy and its Research Ethics Governance Operational Guidelines. 8.3 Whenever possible, personal data should be rendered anonymous. If personal data is collected anonymously or is irrevocably anonymised it is not subject to the requirements of the Data Protection Acts or the University s Data Protection Policy. 8.4 Responsibility for the Management of Research Data of a Personal Nature While the University has overall responsibility for ensuring compliance with the Data Protection legislation, the principal investigator 1 / supervisor 2 has operational responsibility for ensuring compliance when research data of a personal nature is being collected and processed. This includes ensuring the collection of informed consent and the application of controls to maintain data security, limitation of access, storage, retention and timely and appropriate deletion. 1 Principal Investigator: An employee of the University who has primary responsibility for the design, implementation, completion and management of a research project. 2 Supervisor: An employee of the University who is assigned to a postgraduate research candidate at the time of their commencement of a postgraduate research project. The supervisor has responsibilities relating to the postgraduate s academic and research activities as described in Section 5 of the University of Limerick s Handbook of Academic Regulations and Procedures (Research Postgraduate Academic Regulations). 6
7 8.4.2 Where personal data must be collected in order to conduct research, the principal investigator/supervisor is responsible for ensuring: that research participants are fully informed of all aspects of the research project in advance of providing any personal data (e.g. the way(s) in which the data will be used, storage, retention time etc), and that appropriate consent for specified use(s) of their personal data is obtained; that such personal data is used in accordance with the consent obtained; that personal data is accessible to only those researchers who are authorised to undertake the research As a standard approach it is important that consent be sought from research participants should there be secondary uses planned for the material/data e.g. future research studies. Any queries in this regard should be referred to [email protected] These regulations apply to all University researchers who are conducting research either on or off the University Campus. 9. Employment/Student References 9.1 Employment/Student references received by the University may be subject to an access request or FOI request and confidentiality vis-avis the individual to whom the reference relates cannot be guaranteed. 10. Use of Filming for Teaching Purposes etc Students of certain programmes at the University may use webcams/recording devices (e.g. for teaching purposes). In such circumstances, consent should be obtained from individuals in advance of the commencement of recording; or an appropriate warning sign should be posted clearly within the area covered by the webcam/device. Care is required in order to prevent the unauthorised transfer of images of individuals (deemed personal data). In addition, recordings should only be retained for as long as is necessary after the purpose for undertaking recording has been fulfilled. 11. Use of Closed Circuit Television (CCTV) 11.1 Monitored CCTV cameras are installed at various locations on the University of Limerick Campus and record footage with associated date and time The purposes for which the University s CCTV system is installed on Campus, related retention time and details on access to and disclosure of its CCTV footage are as set out in the University s Closed Circuit Television (CCTV) System Operating Procedures. 7
8 12. Responsibilities of data subjects 12.1 Employees, students and other data subjects are responsible for: ensuring that any information they provide to the University is accurate and up to date; informing the University of any changes of information that they have provided, such as changes of address etc. 13. Breaches of the University Data Protection Policy & Compliance Regulations 13.1 Breaches of the terms and conditions of these Regulations and the University s Data Protection Policy (available at could result in major reputational and financial damage to the University and may result in Statute No. 4 of the University of Limerick: Employee Disciplinary Matters & Termination of Employment being invoked. 14. Further information 14.1 These Regulations set out key areas of work at the University where data protection issues may arise and outline best practice in dealing with them. However, it is not envisaged that these Regulations contain an exhaustive list of all areas of work to which Data Protection principles apply and employees should contact the Corporate Secretary s Office (Information & Compliance Officer, Ext: 4393, [email protected]) to obtain clarification where necessary Extensive information is also available from the Data Protection Commissioner's website, or from the Office of the Data Protection Commissioner, Canal House, Station Road, Portarlington, Co. Laois. 15. Review 15.1 These Compliance Regulations will be reviewed regularly in light of any legislative changes. Approved by Governing Authority 26 June
Protection. Code of Practice. of Personal Data RPC001147_EN_WB_L_1
Protection of Personal Data RPC001147_EN_WB_L_1 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Responsibility of Employees
Protection. Code of Practice. of Personal Data RPC001147_EN_D_19
Protection of Personal Data RPC001147_EN_D_19 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Rules Responsibility
The Manitowoc Company, Inc.
The Manitowoc Company, Inc. DATA PROTECTION POLICY 11FitzPatrick & Associates 4/5/04 1 Proprietary Material Version 4.0 CONTENTS PART 1 - Policy Statement PART 2 - Processing Personal Data PART 3 - Organisational
Data Security and Extranet
Data Security and Extranet Derek Crabtree Schools ICT Support Manager [email protected] Target Operating Model 2011 Merton Audit Organisation name: London Borough of Merton Periodic plan date:
CORK INSTITUTE OF TECHNOLOGY
CORK INSTITUTE OF TECHNOLOGY DATA PROTECTION POLICY APPROVED BY GOVERNING BODY ON 30 APRIL 2009 INTRODUCTION Cork Institute of Technology is committed to a policy of protecting the rights and privacy of
Data Protection Good Practice Note
Data Protection Good Practice Note This explanatory document explains what charities and voluntary organisations need to do to comply with the Data Protection Act 1988 as amended by the Data Protection
ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY
ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY Originated by: Data Protection Working Group: November 2008 Impact Assessment: (to be confirmed) Recommended by Senate: 28 January 2009 Approved by Council:
HERTSMERE BOROUGH COUNCIL
HERTSMERE BOROUGH COUNCIL DATA PROTECTION POLICY October 2007 1 1. Introduction Hertsmere Borough Council ( the Council ) is fully committed to compliance with the requirements of the Data Protection Act
Data Compliance. And. Your Obligations
Information Booklet Data Compliance And Your Obligations What is Data Protection? It is the safeguarding of the privacy rights of individuals in relation to the processing of personal data. The Data Protection
Office of the Data Protection Commissioner of The Bahamas. Data Protection (Privacy of Personal Information) Act, 2003. A Guide for Data Controllers
Office of the Data Protection Commissioner of The Bahamas Data Protection (Privacy of Personal Information) Act, 2003 A Guide for Data Controllers 1 Acknowledgement Some of the information contained in
Data Protection in Ireland
Data Protection in Ireland 0 Contents Data Protection in Ireland Introduction Page 2 Appointment of a Data Processor Page 2 Security Measures (onus on a data controller) Page 3 8 Principles Page 3 Fair
AlixPartners, LLP. General Data Protection Statement
AlixPartners, LLP General Data Protection Statement GENERAL DATA PROTECTION STATEMENT 1. INTRODUCTION 1.1 AlixPartners, LLP ( AlixPartners ) is committed to fulfilling its obligations under the data protection
Index. Definitions. What is Data Protection? Rights of Individuals. The 8 Principles of Data Protection
Data Protection Awareness Based on DIT s Data Protection Policy, the Data Protection Acts, 1988 & 2003 and guidance from the Office of the Data Protection Commissioner Index Definitions What is Data Protection?
Data Protection for the Guidance Counsellor. Issues To Plan For
Data Protection for the Guidance Counsellor Issues To Plan For Author: Hugh Jones Data Protection Specialist Longstone Management Ltd. Published by the National Centre for Guidance in Education (NCGE)
Merthyr Tydfil County Borough Council. Data Protection Policy
Merthyr Tydfil County Borough Council Data Protection Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of the
Human Resources Policy documents. Data Protection Policy
Policy documents Aims of the Policy apetito is committed to meeting its obligations under data protection law. As a business, apetito handles a range of Personal Data relating to its customers, staff and
DATA PROTECTION POLICY
Title Author Approved By and Date Review Date Mike Pilling Latest Update- Corporation May 2008 1 Aug 2013 DATA PROTECTION ACT 1998 POLICY FOR ALL STAFF AND STUDENTS 1.0 Introduction 1.1 The Data Protection
PERSONAL INJURIES ASSESSMENT BOARD DATA PROTECTION CODE OF PRACTICE
PERSONAL INJURIES ASSESSMENT BOARD DATA PROTECTION CODE OF PRACTICE ADOPTED ON 9 th January 2008 TABLE OF CONTENTS Page No. 1 Introduction...3 2 Glossary...3 3 Types of Personal Data held by Us...3 4 Obligations
Data Protection Policy A copy of this policy is published in the following areas: The school s intranet The school s website
Data Protection Policy A copy of this policy is published in the following areas: The school s intranet The school s website Date created: November 2015 Date for review: July 2016 Created by: Mark Vanstone,
Scottish Rowing Data Protection Policy
Revision Approved by the Board August 2010 1. Introduction As individuals, we want to know that personal information about ourselves is handled properly, and we and others have specific rights in this
2. Scope 2.1 This policy covers all the activities and processes of the University that uses personal information in whatever format.
University of Westminster Personal Data Protection Policy For Compliance with the Data Protection Act 1998 1. Background 1.1 The Data Protection Act 1998 (DPA) defines personal data as data and information
Data Protection Policy
Data Protection Policy Responsible Officer Author Date effective from July 2009 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance Manager Date last amended December 2012 Review
Information Governance Policy
Information Governance Policy 1 Introduction Healthwatch Rutland (HWR) needs to collect and use certain types of information about the Data Subjects who come into contact with it in order to carry on its
ATMD Bird & Bird. Singapore Personal Data Protection Policy
ATMD Bird & Bird Singapore Personal Data Protection Policy Contents 1. PURPOSE 1 2. SCOPE 1 3. COMMITMENT TO COMPLY WITH DATA PROTECTION LAWS 1 4. PERSONAL DATA PROTECTION SAFEGUARDS 3 5. ATMDBB EXCEPTIONS:
Rick Parsons Information Governance Officer County Hall 01865 323593 [email protected]
Rick Parsons Information Governance Officer County Hall 01865 323593 [email protected] 1 THE DATA PROTECTION ACT 1998 2 Requirements of the Act Roles & Responsibilities Best Practice 3 The
Guidelines on Data Protection. Draft. Version 3.1. Published by
Guidelines on Data Protection Draft Version 3.1 Published by National Information Technology Development Agency (NITDA) September 2013 Table of Contents Section One... 2 1.1 Preamble... 2 1.2 Authority...
Policy and Procedure for approving, monitoring and reviewing personal data processing agreements
Policy and Procedure for approving, monitoring and reviewing personal data processing agreements 1 Personal data processing by external suppliers, contractors, agents and partners Policy and Procedure
Data Protection. Policy and Application July 2009
Data Protection Policy and Application July 2009 Produced for staff of the House of Commons Service by the Department of Resources Information Rights and Information Security (IRIS) Service Data Policy:
Data Protection. Processing and Transfer of Personal Data in Kvaerner. Binding Corporate Rules Public Document
Data Protection Processing and Transfer of Personal Data in Kvaerner Binding Corporate Rules Public Document 1 of 19 1 / 19 Table of contents 1 Introduction... 4 1.1 Scope... 4 1.2 Definitions... 4 1.2.1
Little Marlow Parish Council Registration Number for ICO Z3112320
Data Protection Policy Little Marlow Parish Council Registration Number for ICO Z3112320 Adopted 2012 Reviewed 23 rd February 2016 Introduction The Parish Council is fully committed to compliance with
Policy and Procedure Title: Maintaining Secure Learner Records Policy No: CCTP1001 Version: 1.0
PROVIDER NAME: POLICY AREA: College of Computing Technology (CCT) Standard 10: Information Management, Student Information System & Data Protection Policy and Procedure Title: Maintaining Secure Learner
DATA PROTECTION ACT 1998 COUNCIL POLICY
DATA PROTECTION ACT 1998 COUNCIL POLICY Page 1 of 5 POLICY STATEMENT Blackpool Council recognises the need to fully comply with the requirements of the Data Protection Act 1998 (DPA) and the obligations
Data Protection Policy June 2014
Data Protection Policy June 2014 Approving authority: Consultation via: Court Audit and Risk Committee, University Executive, Secretary's Board, Information Governance and Security Group Approval date:
Corporate ICT & Data Management. Data Protection Policy
90 Corporate ICT & Data Management Data Protection Policy Classification: Unclassified Date Created: January 2012 Date Reviewed January Version: 2.0 Author: Owner: Data Protection Policy V2 1 Version Control
The supplier shall have appropriate policies and procedures in place to ensure compliance with
Supplier Instructions for Processing of Personal Data 1 PURPOSE SOS International has legal and contractual obligations on the matters of data protection and IT security. As a part of these obligations
DATA PROTECTION POLICY
Reference number Approved by Information Management and Technology Board Date approved 14 th May 2012 Version 1.1 Last revised N/A Review date May 2015 Category Information Assurance Owner Data Protection
Code of Practice on Data Protection for the Insurance Sector
Code of Practice on Data Protection for the Insurance Sector (Approved by the Data Protection Commissioner under Section 13 (2) of the Data Protection Acts, 1988 and 2003) Forward I am very happy to be
DATA PROTECTION POLICY
DATA PROTECTION POLICY Version 1.3 April 2014 Contents 1 POLICY STATEMENT...2 2 PURPOSE....2 3 LEGAL CONTEXT AND DEFINITIONS...2 3.1 Data Protection Act 1998...2 3.2 Other related legislation.....4 3.3
Data protection policy
Data protection policy Introduction 1 This document is the data protection policy for the Nursing and Midwifery Council (NMC). 2 The Data Protection Act 1998 (DPA) governs the processing of personal data
Data Protection and Data security Policy
Data Protection and Data security Policy Statement of policy and purpose of Policy 1. Somer Valley Community Radio Ltd (the Employer) is committed to ensuring that all personal information handled by us
GUIDE TO THE ISLE OF MAN DATA PROTECTION ACT. CONTENTS PREFACE 1 1. Background 2 2. Data Protections Principles 3 3. Notification Requirements 4
GUIDE TO THE ISLE OF MAN DATA PROTECTION ACT CONTENTS PREFACE 1 1. Background 2 2. Data Protections Principles 3 3. Notification Requirements 4 PREFACE The following provides general guidance on data protection
PRESIDENT S DECISION No. 40. of 27 August 2013. Regarding Data Protection at the European University Institute. (EUI Data Protection Policy)
PRESIDENT S DECISION No. 40 of 27 August 2013 Regarding Data Protection at the European University Institute (EUI Data Protection Policy) THE PRESIDENT OF THE EUROPEAN UNIVERSITY INSTITUTE, Having regard
Policy Document Control Page
Policy Document Control Page Title Title: Data Protection Policy Version: 3 Reference Number: CO59 Keywords: Data, access, principles, protection, Act. Data Subject, Information Supersedes Supersedes:
Data Protection Guidance
53 September 2010 Management Circular No. 53 Glasgow City Council Education Services Wheatley House 25 Cochrane Street Merchant City GLASGOW G1 1HL To Heads of all Educational Establishments Data Protection
Data Protection and Privacy Policy
Data Protection and Privacy Policy 1. General This policy outlines Conciliation Resources commitments to respect the privacy of people s personal information and observe the relevant data protection legislation.
Research Governance Standard Operating Procedure
Research Governance Standard Operating Procedure The Management and Use of Research Participant Data for Secondary Research Purposes SOP Reference: Version Number: 01 Date: 28/02/2014 Effective Date: Review
Data Protection Standard
Data Protection Standard Processing and Transfer of Personal Data in Aker Solutions (Binding Corporate Rules) Aker Solutions www.akersolutions.com Table of contents 1 Introduction... 3 1.1 Scope... 3 1.2
Data Protection Policy
Data Protection Policy September 2015 Contents 1. Scope 2. Purpose 3. Data protection roles 4. Staff training and guidance 5. About the Data Protection Act 1998 6. Policy 7. The Information Commissioner's
Personal data - Personal data identify an individual. For example, name, address, contact details, date of birth, NHS number.
Background The Data Protection Act 1998 i came into force in March 2000 and is followed by all NHS employed staff via their policies and procedures. The act applies to all personal, identifiable information
Corporate Guidelines for Subsidiaries (in Third Countries ) *) for the Protection of Personal Data
Corporate Guidelines for Subsidiaries (in Third Countries ) *) for the Protection of Personal Data *) For the purposes of these Corporate Guidelines, Third Countries are all those countries, which do not
GSK Public policy positions
Safeguarding Personally Identifiable Information A Summary of GSK s Binding Corporate Rules The Issue The processing of Personally Identifiable Information (PII) 1 and Sensitive Personally Identifiable
DATA PROTECTION POLICY
DATA PROTECTION POLICY DATA PROTECTION POLICY Document Control Information Title Data Protection Policy Version V1.0 Author Diana Watt Date Approved 21 February 2013 Review Date Annually, on the anniversary
Align Technology. Data Protection Binding Corporate Rules Controller Policy. 2014 Align Technology, Inc. All rights reserved.
Align Technology Data Protection Binding Corporate Rules Controller Policy Contents INTRODUCTION 3 PART I: BACKGROUND AND ACTIONS 4 PART II: CONTROLLER OBLIGATIONS 6 PART III: APPENDICES 13 2 P a g e INTRODUCTION
So the security measures you put in place should seek to ensure that:
Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.
Processor Binding Corporate Rules (BCRs), for intra-group transfers of personal data to non EEA countries
Processor Binding Corporate Rules (BCRs), for intra-group transfers of personal data to non EEA countries Sopra HR Software as a Data Processor Sopra HR Software, 2014 / Ref. : 20141120-101114-m 1/32 1.
Article 29 Working Party Issues Opinion on Cloud Computing
Client Alert Global Regulatory Enforcement If you have questions or would like additional information on the material covered in this Alert, please contact one of the authors: Cynthia O Donoghue Partner,
DATA PROTECTION POLICY
DATA PROTECTION POLICY Approval date: June 2014 Approved by: Board Responsible Manager: Executive Director of Resources Next Review June 2016 Data Protection Policy 1. Introduction Data Protection Policy
Data Protection Act a more detailed guide
Data Protection Act a more detailed guide What does the Act do? The Data Protection Act 1998 places considerable duties on organisations which process personal data; increases the rights of access by data
Binding Corporate Rules ( BCR ) Summary of Third Party Rights
Binding Corporate Rules ( BCR ) Summary of Third Party Rights This document contains in its Sections 3 9 all provision of the Binding Corporate Rules (BCR) for Siemens Group Companies and Other Adopting
Data Protection Act. Privacy & Security in the Information Age. April 26, 2013. Ministry of Communications, Ghana
Data Protection Act Privacy & Security in the Information Age April 26, 2013 Agenda Privacy in The Information Age The right to privacy Why We Need Legislation Purpose of the Act The Data Protection Act
John Leggott College. Data Protection Policy. Introduction
John Leggott College Data Protection Policy Introduction The College needs to keep certain information about its employees, students and other users to allow it to monitor performance, achievements, and
QUEENSLAND COUNTRY HEALTH FUND. privacy policy. Queensland Country Health Fund Ltd ABN 18 085 048 237. better health cover shouldn t hurt
QUEENSLAND COUNTRY HEALTH FUND privacy policy Queensland Country Health Fund Ltd ABN 18 085 048 237 better health cover shouldn t hurt 1 2 contents 1. Introduction 4 2. National Privacy Principles 5 3.
OBJECTS AND REASONS. (a) the regulation of the collection, keeping, processing, use or dissemination of personal data;
OBJECTS AND REASONS This Bill would provide for (a) the regulation of the collection, keeping, processing, use or dissemination of personal data; (b) the protection of the privacy of individuals in relation
DATA PROTECTION AND DATA STORAGE POLICY
DATA PROTECTION AND DATA STORAGE POLICY 1. Purpose and Scope 1.1 This Data Protection and Data Storage Policy (the Policy ) applies to all personal data collected and dealt with by Centre 404, whether
How To Understand The Data Protection Act
DATA PROTECTION ACT 2002 The Basics Purpose of the Act Balance the rights of an individual with an organisation s legitimate need to process personal data Promote openness and transparency Establish and
How To Protect Your Data In European Law
Corporate Data Protection Code of Conduct for the Protection of the Individual s Right to Privacy in the Handling of Personal Data within the Deutsche Telekom Group 2010 / 04 We make ICT strategies work
University of Birmingham. Closed Circuit Television (CCTV) Code of Practice
University of Birmingham Closed Circuit Television (CCTV) Code of Practice University of Birmingham uses closed circuit television (CCTV) images to provide a safe and secure environment for students, staff
Data Protection Policy
Data Protection Policy CONTENTS Introduction...2 1. Statement of Intent...2 2. Fair Processing or Privacy Statement...3 3. Data Uses and Processes...4 4. Data Quality and Integrity...4 5. Technical and
DATA PROTECTION IT S EVERYONE S RESPONSIBILITY. An Introductory Guide for Health Service Staff
DATA PROTECTION IT S EVERYONE S RESPONSIBILITY An Introductory Guide for Health Service Staff 1 Message from Director General Dear Colleagues The safeguarding of and access to personal information has
Human Resources Policy No. HR46
Human Resources Policy No. HR46 Maintaining Personal Files and ESR Records Additionally refer to HR04 Verification of Professional Registration HR33 Recruitment and Selection HR34 Policy for Carrying Out
Human Resources and Data Protection
Human Resources and Data Protection Contents 1. Policy Statement... 1 2. Scope... 2 3. What is personal data?... 2 4. Processing data... 3 5. The eight principles of the Data Protection Act... 4 6. Council
SAFE HARBOR PRIVACY NOTICE EFFECTIVE: July 1, 2005 AMENDED: July 15, 2014
SAFE HARBOR PRIVACY NOTICE EFFECTIVE: July 1, 2005 AMENDED: July 15, 2014 This Notice sets forth the principles followed by United Technologies Corporation and its operating companies, subsidiaries, divisions
All CCG staff. This policy is due for review on the latest date shown above. After this date, policy and process documents may become invalid.
Policy Type Information Governance Corporate Standing Operating Procedure Human Resources X Policy Name CCG IG03 Information Governance & Information Risk Policy Status Committee approved by Final Governance,
2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
PRIVACY POLICY Personal information and sensitive information Information we request from you
PRIVACY POLICY Business Chicks Pty Ltd A.C.N. 121 566 934 (we, us, our, or Business Chicks) recognises and values the protection of your privacy. We also understand that you want clarity about how we manage
DATA PROTECTION POLICY
DATA PROTECTION POLICY Rev No. 0 New Document 1 2 3 4 5 6 7 Revision Status Details of Amendments Name Date Update of College DPA statement New Reference to Appendix 4 Staff Guidelines ESF document retention
FIRST DATA CORPORATION PROCESSOR DATA PROTECTION STANDARDS
FIRST DATA CORPORATION PROCESSOR DATA PROTECTION STANDARDS As a world leader in electronic commerce and payment services, First Data Corporation and its subsidiaries ( First Data entity or entities ),
Department of Education and Skills. Protection of Personal Data. Code of Practice
Department of Education and Skills Protection of Personal Data Code of Practice Records Management Unit February 2011 Table of Contents Foreword...2 Introduction from the Data Protection Commissioner...3
ROYAL AUSTRALASIAN COLLEGE OF SURGEONS
1. SCOPE This policy details the College s privacy policy and related information handling practices and gives guidelines for access to any personal information retained by the College. This includes personal
Data Protection Policy
Data Protection Policy This policy applies to the national office of Special Olympics GB; athletes, volunteers, and paid staff its clubs and regions; all Special Olympics GB donors, sponsors, and supporters;
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
