Policy and Procedure for approving, monitoring and reviewing personal data processing agreements
|
|
|
- Elfrieda Willis
- 10 years ago
- Views:
Transcription
1 Policy and Procedure for approving, monitoring and reviewing personal data processing agreements 1
2 Personal data processing by external suppliers, contractors, agents and partners Policy and Procedure for approving, monitoring and reviewing personal data processing agreements Policy on contracting with external suppliers, contractors, agents and partners to process personal data 1.1. Personal data is any information That relates to a living person who can be identified by that information, ether by itself or in combination with other data. The University is legally obliged to process personal data in accordance with the Data Protection Act, 1998, and has a duty of care to all of its data subjects (people whose personal data we hold). Misuse of personal data by employees, including accidental or deliberate loss or disclosure to third parties, puts the University at legal and reputational risk and is likely to result in disciplinary action This policy and procedure must be followed whenever 1. The University intends to contract with an external supplier, contractor, agent or partner (a contractor) to provide a service for the University AND 2. the University needs to share personal data it already holds, e.g. staff or student data, with the external body to deliver the service OR 3. the University intends to contract with an external body to collect and process personal data in order to deliver the service for the University Under these circumstances, the contractor will be acting as a Data Processor for the University. Under the Data Protection Act, 1998, (DPA) the University is legally liable for any breaches of data security by the Data Processor. 1.3 This policy and procedure must be followed for all procurement involving transfer of personal data or outsourcing of data processing to third parties, in conjunction with and in addition to the University s Standard Conditions of Contract. The procedure must be followed as part of the procurement and selection process so that potential contractors and suppliers are fully aware of our information security requirements and able to demonstrate how they will meet them before a contractual agreement is signed. 1.4 Before agreeing to transfer the data, the person delegated to commission the external service on behalf of the University (The Authorised Contact) will follow the procedure set out in section 2 for seeking approval for the data transfer. This procedure is designed to help users navigate through the stages of the process using a questionnaire format for ease of use. This process involves liaising with the Data Protection Officer and other officers responsible for managing the personal data to: 2
3 1. Determine whether the proposed data transfer is fair, lawful and appropriate 2. Identify the risks of transferring the data (and of not sharing it) and take appropriate action to reduce their likelihood or mitigate their impact 3. Ensure that the contractor signs the University Data Processing agreement committing them to process the personal data in accordance with the Data Protection Act. Once the contract and Data Processor Agreement are in place, it is the University s responsibility to 4. Manage the data transfer securely 5. Inform the data subjects appropriately, where necessary, 6. Make stringent, on going checks, to audit that the contractor is fully compliant with all aspects of the DPA 1.5 The Data Processor Agreement, policy and procedure for its use apply worldwide. All personal data transfers from the UK to countries outside the EU must in addition comply with condition 2 of the Agreement. 1.6 This policy and procedure does not apply where A third party requests personal data for their own purposes e.g. to sell goods and services to students. Third party requests of this kind will be managed as requests for information under the Freedom of Information (Scotland) Act. 1.7 This policy and procedure has been developed to take account of Increasing risk of identity theft, fraud and abuse of personal data Technological ease of accidental/deliberate loss/disclosure of personal data Regulatory requirements Stakeholder and public concern about privacy and information security Reputational risks arising from breaches of information security. The policy and procedure will be reviewed regularly and updated as necessary to take account of legal, process, technological and reputational risks. 1.8 Following approval, the FOI and Data Protection Officer will Disseminate the policy, procedure and Data Processor agreement to Heads of Schools, Institutes and Services and liaise with them to identify staff roles where the holders need to be briefed and trained to comply with it. Liaise with the relevant responsible officers to arrange training for staff Liaise with the responsible officers, identified in section 2, below to identify existing arrangements for transferring personal data and outsourcing of personal data handling and apply the policy and procedure retrospectively to these 3
4 Liaise with the Director of Procurement Services to incorporate the procedure and Data Processor Agreement into all procurements involving transfer of personal data or outsourcing of data processing to third parties Monitor use and compliance with the procedures, maintain a central record of Data Processor Agreements and put in place procedures to monitor compliance with them Ann Jones University Archivist, FOI and Data Protection Officer 13 February
5 2. Procedure for approving, monitoring and reviewing personal data processing agreements Project/activity University contact: Phone Step 1 Do I need to follow this policy and procedure? Does the proposed project /activity involve the University contracting with an external supplier, contractor, agent or partner (a contractor) to provide a service for the University? If YES Does the University needs to share personal data it already holds, e.g. staff or student data, with the external body to deliver the service OR Does the University intend to contract with an external body to collect and process personal data in order to deliver the service for the University? YES YES YES NO NO NO If YES The authorised contract must follow the following procedure to obtain University approval before any contract involving transfer or processing of personal data by third parties can be agreed. Step 2: Who needs to be involved? The person delegated to commission the external service on behalf of the University (the authorised contact) must seek approval for the data transfer from the Data 5
6 Protection Officer (DPO) AND the relevant officers responsible for managing the personal data: The responsible officers are The Data Protection Officer The Academic Registrar: for student personal data The Director of Recruitment and Admissions: for applicant (student) personal data The Director of Human Resources: for staff (and applicant- staff) personal data The Director of Procurement Services: for projects involving procurement of suppliers The Director of Finance and IS/IT: for staff, student or customer personal data in manual or electronic financial systems e.g. fee payments, payroll, tax, pensions The Director, University Information and Computing Services (UICS): for authorising a secure method of transferring personal data held in centrally managed IS/IT systems The Relevant Head of School/Institute: for authorising a secure method of transferring personal data held in IS/IT systems where management responsibility is delegated to that School/ Institute The Group Risk Manager: for reviewing the operational risk assessment The Director of Corporate Communications: for agreeing a communication plan, where necessary, detailing how and when people need to be informed e.g. by all staff or student . Tick all relevant For example: an arrangement to transfer staff salary data to an external pensions provider would require the approval of the Data Protection Officer, Directors of Human Resources, Finance and IS/IT and UICS. Once the approved Data Processor Agreement is in place, it is not necessary for each responsible officer to approve the data transfer each time a new member of staff wishes to join the pension scheme. This is because the procedure includes a process for creating or updating a Fair Processing Notice which the new member of staff would receive when they sign up to the pension scheme, explaining what the University will do with their personal data and advising the data subject of their rights under the DPA. Step 3: When do I need to do this? For any project or activity involving 3 rd party processing of personal data it is essential to consider whether the processing is necessary and assess the potential information security risks at the earliest stage so that the actions necessary to mitigate these risks can be agreed, planned and completed at the appropriate stages in the project. 6
7 For projects involving the procurement of services: at the point that you ask potential contractors to quote for their services Specific information security controls must be identified as early as possible in any procurement process and incorporated into the specification issued to potential tenderers and suppliers. For all other potential data transfers: before any agreement is signed Whether or not the project involves payment for goods or services, potential contractors and partners must be asked to demonstrate how they will comply with our information security requirements before any contractual agreements are signed. Step 4: How do I go about getting approval for the data transfer? Arrange to meet the DPO, and the relevant responsible officers to review the proposed data transfer/outsourcing of data processing. The review will consider whether the processing is fair and lawful and complies with the 8 Data Protection Principles, identify the risks involved and agree action to mitigate these At the meeting, review and complete the following checklist. You will need to get some information from the proposed contractor to answer some of these questions. Date of review In attendance What does the project involve? Please append the following as relevant Project Terms of reference Draft procurement specification Is the processing necessary? Is there a viable alternative to sharing the data/outsourcing the data processing? E.g. can the University license and host software rather than sharing staff or student personal data with the third party in order to access the service? YES/NO If yes, describe the agreed alternative. If no explain why alternatives are not practicable. 7
8 What personal data really needs to be processed, why and for how long? Apply the principle of data minimisation no more, and no longer, than necessary. What personal data? Why? For how long? What specific legal conditions (in Schedule 2 of the DPA) allow us to process this data? What needs to be done to destroy the data confidentially? Who will do this? When? What assurance do we need to confirm that the data has been destroyed? DPO to complete this Does the data include sensitive personal data? What kind of sensitive personal YES? Why do you need this? data? Racial or ethnic origin Religious beliefs Political opinions Trade union membership Physical or mental health Sexual life Actual or alleged offences committed Any legal proceedings, judgements, sentences against them If yes, what specific legal conditions (in Schedule 3 of the DPA) allow us to process this data? DPO to complete this Is the proposed use of the data compatible with the original purpose for which it was obtained? YES NO We don t currently collect this data 8
9 Do individuals have a reasonable expectation that their data would be used in this way? What information do you currently give people about how their data will be used? Please provide a copy of this. (It may be a privacy notice or a declaration that people sign when you collect their data) How and when do you communicate this to them? Who is responsible for ensuring the data is accurate and kept up to date? The University The contractor The individual (e.g. self service user) How will this be done and monitored? Does the project involve transferring personal data to countries outside the EU? YES NO If YES, transfer contracts must include the standard clauses for data transfers to non-eu countries ( ) set out in European Commission Decision C (2004)5271. This is necessary to provide an equivalent standard of privacy protection to the DPA for the individuals whose data will be transferred. Do we need to obtain the consent of the people whose data we want the contractor to process? This will depend on several factors. These include (but are not confined to) Is it essential for the University to process the data in order to fulfil its YES NO contractual obligations e.g. paying its staff? Is it not essential but desirable for the University to process the data e.g. YES NO provide and monitor take-up of voluntary training? Does the data include sensitive personal data? YES NO To be completed by DPO No consent needed: inform data subjects of the data transfer Inform data subjects in advance of data transfer and give them the opportunity to opt out Obtain the explicit, informed and freely given consent of the individuals (an opt in) before sharing the data. Relevant conditions of processing (DPA Schedules) 9
10 What are the risks of transferring the data (and of not sharing it)? Risks of transferring the data Risk Mitigating Action Impact on personal privacy Method of transfer Governance: policies, procedures Human Resources security Physical Security IT Security Subcontracted processing Business Continuity Retention/destruction Legal Reputational Other Risks of not sharing the data Risk Mitigating Action Strategic Operational Legal Reputational Other Do we need to make a privacy impact assessment? YES Not sure NO Does the risk need to be on an operational/strategic risk YES Not sure NO register? If YES/Not sure: escalate to Group Risk Manager What specific information security controls do we require the data processor have in place to manage the data? Organisations cannot simply require that a contractor comply with ISO requirements. That is not an effective way of managing real world risk. - Pinsent Masons. Requirement for Information security plan included in procurement YES NO specification? Information security plan agreed with contractor? YES NO Does the plan include satisfactory arrangements for Method of transfer YES NO Governance: policies, procedures 10
11 Human Resources security Physical Security IT Security Managed destruction of data in accordance with retention policy Subcontracted processing Business continuity (disaster recovery) Incident reporting and management Audit of compliance In what format/s is the data to be transferred? Format of data: paper YES NO Format of data: electronic YES NO Not applicable: the service provider will collect the data on our behalf YES NO How will the data be transferred? Have the DPO and the relevant School/Institute IT officer agreed a secure method of transferring the personal data to the service provider? Please give details of the proposed transfer method/s YES NO Step 5: Signing the agreement Once the security plan and the data transfer method have been agreed, ask the Responsible Officers to sign the Data Transfer Approvals section at the end of the Data Processor Agreement. Then ask the Data Processor (contractor) to sign two copies of the University Data Processing agreement to process the personal data in accordance with the Data Protection Act; including any specific measures set out in the information security plan, and return both copies to the DPO. The DPO will sign the Data Processing agreement as the University signatory, returning one copy each to the data processor and the authorised contact and retaining the original signed agreement as part of the central audit trail recording the terms of the agreement. Step 6: When and how do I need to communicate with the people whose data will be processed? First: agree with the DPO and the Director of Corporate Communications a Fair Processing Notice (sometimes known as a Privacy Statement). This should explain to data subjects: 11
12 Who is responsible for looking after their data How and why their data will be processed, Who else may have access to their data and why Whether they have the right to opt out or in as appropriate Who to contact to access the information held about them or find out more about their rights under the DPA Second: agree the method and timing of communicating this notice The communication must be badged as a Heriot-Watt communication with a University contact. The wording of the communication must be agreed in advance with the authorised contact, the DP officer and the responsible officer/s. Third: Ask the contractor designated as the data processor to liaise with UICS to ensure that there is adequate notice of any communication the data processor intends to make to staff or students. If this communication is to be by , the data processor will give details of the address to be used in communications to UICS so that it can be added to the "white list" of approved addresses so that University security systems do not automatically block access to the message or flag it up as spam. Step 7: At what point can I transfer the data to the contractor or ask them to collect it on our behalf? Only after the all of the above steps have been completed. Step 8: What happens next? The DPO will liaise with the authorised contact and the Data Processor to monitor compliance with the agreement and security controls. Version 8. Originally drafted by Ann Jones, Derek G Brown, Kathy Patterson, 29/10/2008. Amended by Ann Jones to take account of feedback from users of the procedure and advice from the Group Risk Manager; UICS; Dundas and Wilson; the Information Commissioner s Office; ISO/IEC 27001/2:2005 Information Security Management; HM Government/The National Archives: Managing Information Risk; JISC Legal Code of Practice for the Further and Higher Education Sectors on the Data Protection Act 1998, 2008; Pinsent Masons: Transferring data: the information security issues. 12
13 Personal Data Processing Confidentiality Agreement between Heriot-Watt University and [.] This Agreement relates to the processing of personal data supplied by Heriot-Watt University to [.] in relation to the above contract. The definitions: personal data and processing are as set out in Parts 1 and 2 of the Data Protection Act, The Parties agree to fulfil their obligations under the Data Protection Act 1998 (in particular the eight principles set out in schedule 1 to that Act). Each party warrants and undertakes that it will have in place appropriate technical and organisational measures to protect personal data it shares with the other against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, and which provide a level of security appropriate to the risk represented by the processing and the nature of the data to be protected. Each party has the right to audit processing of shared personal data held by the other party to monitor compliance with the Data Protection Act We, [.], agree to the following terms & conditions of processing personal data. 1. Personal data provided by Heriot-Watt University for processing in connection with this contract will only be used by responsible officers within [.] for the purposes agreed by Heriot-Watt University and will not be transferred to sub-contractors or other third parties without prior consent from Heriot-Watt University. 2. If [.] transfers shared personal data to countries outside the EU with prior consent from Heriot-Watt University, transfer contracts must include the standard clauses for data transfers to non-eu countries ( ) set out in European Commission Decision C(2004) All personal data provided to [.] for processing in relation to this contract will be returned to Heriot-Watt University upon written request and/or on completion of contract or securely shredded in accordance with Heriot-Watt University requirements for data management and electronic copies deleted. 4. [.] accepts responsibility for keeping all personal data secure, and for applying appropriate security measures for electronic and (or) paper copies of personal data provided by Heriot-Watt University. [.] shall ensure that appropriate technical and organisational security measures are taken against unauthorised or unlawful processing of personal data and against accidental or unlawful loss, alteration or destruction of, or damage or access to, such personal data and against all other unlawful forms of processing of personal data. For the purposes of this paragraph (4), security measures which comply with ISO
14 and ISO (or any replacement standards relating to data security) for data security shall, unless otherwise notified in an appendix to this agreement by Heriot-Watt University to [.], be deemed appropriate in the circumstances. 5. [.] undertakes not to use personal data transferred to it for processing by Heriot-Watt University in presentations, software demonstrations or other training purposes. 6. The Computer Misuse Act stipulates access to unauthorised information is an offence. [.] will ensure that all measures have been put in place (e.g.. password protection) to prevent unauthorised access to personal data 7. [.] will allow inspection of its premises and systems by Heriot-Watt University s Data Protection Officer or his/her nominee (as necessary) to ensure appropriate security measures are in place. 8. [.] will be liable for misuse or breach in use by its staff or contractors of personal data provided by Heriot-Watt University, and shall indemnify Heriot-Watt University against any loss or damage incurred by Heriot-Watt University arising from such misuse or breach. 9. This Agreement imposes no obligation upon [.] with respect to personal data which (a) was known to [.] before receipt from Heriot-Watt University; (b) is or becomes publicly available through no fault of [.] (c) is rightfully received by [.] from a third party without a duty of confidentiality; (d) is disclosed by Heriot-Watt University to a third party without a duty of confidentiality on the third party; or (e) is disclosed by [.] with Heriot-Watt University s prior written approval. If [.] is required by a government body or court of law to disclose the personal data provided by Heriot-Watt University. [.] agrees to give Heriot-Watt University reasonable advance notice so that Heriot-Watt University may contest the disclosure, or seek a protective order. Signed: (on behalf of Heriot Watt University). Print Name:. Role: Data Protection Officer Date.. Signed: (on behalf of [.])... Print Name:. Role: Date: 14
15 Data Processor to complete and sign two copies and return to Ann Jones, FOI and Data Protection Officer Heriot-Watt University Edinburgh EH14 4AS Tel:
16 Heriot-Watt University approvals log Initiator: [name, role] Data Transfer approvals Responsible Officer/s Name Role Signature Date [ Data Protection Officer [signature, date] Specific security conditions approved by above on [date] and appended Fair Processing Notice approved by above on [date] and appended References Data Protection Act Standard clauses for data transfers to non-eu countries ( ) set out in European Commission Decision C(2004) The Computer Misuse Act,
17 Appendix A Personal data processing by external suppliers, contractors, agents and partners Section 1.3: Procurement Services will update the University s Terms and Conditions so the strictures of this Policy are imported into any ensuing contract. For new suppliers, Procurement Services will amend the New Supplier Registration Form to include a signed section for suppliers to document their acceptance to comply. Section 1.4: Procurement Services will be responsible for completing the procedure with the Data Protection Officer only for those contracts where there is no specific end-user with dedicated responsibility for its management (e.g. the Travel Contract). In other cases, the Authorised Contact will be the relevant end user who commissioned the contract. The appropriate officer from the user Department will be responsible for the monitoring and auditing of the Agreement and the contractor, including carrying out stringent checks on the service provider. Some current and forthcoming contracts which may be caught by this Act include: Travel (in hand); Payroll Bureau; Oracle Support/HR system; Agency Staff; Procurement Card; Cycle-to-Work; ResNet; Leisure Management System; Special Needs/Access to Work; Health Centres; Nursery; SAS. 17
Data Protection Policy June 2014
Data Protection Policy June 2014 Approving authority: Consultation via: Court Audit and Risk Committee, University Executive, Secretary's Board, Information Governance and Security Group Approval date:
2. Scope 2.1 This policy covers all the activities and processes of the University that uses personal information in whatever format.
University of Westminster Personal Data Protection Policy For Compliance with the Data Protection Act 1998 1. Background 1.1 The Data Protection Act 1998 (DPA) defines personal data as data and information
CORK INSTITUTE OF TECHNOLOGY
CORK INSTITUTE OF TECHNOLOGY DATA PROTECTION POLICY APPROVED BY GOVERNING BODY ON 30 APRIL 2009 INTRODUCTION Cork Institute of Technology is committed to a policy of protecting the rights and privacy of
Data Compliance. And. Your Obligations
Information Booklet Data Compliance And Your Obligations What is Data Protection? It is the safeguarding of the privacy rights of individuals in relation to the processing of personal data. The Data Protection
Data protection policy
Data protection policy Introduction 1 This document is the data protection policy for the Nursing and Midwifery Council (NMC). 2 The Data Protection Act 1998 (DPA) governs the processing of personal data
GUIDE TO THE ISLE OF MAN DATA PROTECTION ACT. CONTENTS PREFACE 1 1. Background 2 2. Data Protections Principles 3 3. Notification Requirements 4
GUIDE TO THE ISLE OF MAN DATA PROTECTION ACT CONTENTS PREFACE 1 1. Background 2 2. Data Protections Principles 3 3. Notification Requirements 4 PREFACE The following provides general guidance on data protection
Merthyr Tydfil County Borough Council. Data Protection Policy
Merthyr Tydfil County Borough Council Data Protection Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of the
BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS
BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS Mat Wright www.britishcouncil.org CONTENTS Purpose of the code 1 Scope of the code 1 The British Council s data protection commitment and
Data Protection Policy
Data Protection Policy CONTENTS Introduction...2 1. Statement of Intent...2 2. Fair Processing or Privacy Statement...3 3. Data Uses and Processes...4 4. Data Quality and Integrity...4 5. Technical and
The Manitowoc Company, Inc.
The Manitowoc Company, Inc. DATA PROTECTION POLICY 11FitzPatrick & Associates 4/5/04 1 Proprietary Material Version 4.0 CONTENTS PART 1 - Policy Statement PART 2 - Processing Personal Data PART 3 - Organisational
University of Limerick Data Protection Compliance Regulations June 2015
University of Limerick Data Protection Compliance Regulations June 2015 1. Purpose of Data Protection Compliance Regulations 1.1 The purpose of these Compliance Regulations is to assist University of Limerick
Human Resources Policy documents. Data Protection Policy
Policy documents Aims of the Policy apetito is committed to meeting its obligations under data protection law. As a business, apetito handles a range of Personal Data relating to its customers, staff and
Data Protection Policy
Data Protection Policy Responsible Officer Author Date effective from July 2009 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance Manager Date last amended December 2012 Review
DATA PROTECTION ACT 1998 COUNCIL POLICY
DATA PROTECTION ACT 1998 COUNCIL POLICY Page 1 of 5 POLICY STATEMENT Blackpool Council recognises the need to fully comply with the requirements of the Data Protection Act 1998 (DPA) and the obligations
AlixPartners, LLP. General Data Protection Statement
AlixPartners, LLP General Data Protection Statement GENERAL DATA PROTECTION STATEMENT 1. INTRODUCTION 1.1 AlixPartners, LLP ( AlixPartners ) is committed to fulfilling its obligations under the data protection
Procedures for obtaining informed consent for recordings and images of people to support Data Protection Policy
Procedures for obtaining informed consent for recordings and images of people to support Data Protection Policy Heriot-Watt Procedures for responding to requests for personal data; to support Data Protection
Information Security Incident Management Policy September 2013
Information Security Incident Management Policy September 2013 Approving authority: University Executive Consultation via: Secretary's Board REALISM Project Board Approval date: September 2013 Effective
Scottish Rowing Data Protection Policy
Revision Approved by the Board August 2010 1. Introduction As individuals, we want to know that personal information about ourselves is handled properly, and we and others have specific rights in this
SCOTLAND S COMMISSIONER FOR CHILDREN AND YOUNG PEOPLE STANDARD CONDITIONS OF CONTRACT FOR SERVICES
SCOTLAND S COMMISSIONER FOR CHILDREN AND YOUNG PEOPLE STANDARD CONDITIONS OF CONTRACT FOR SERVICES 1 1 Definitions In these conditions:- We means Scotland s Commissioner for Children and Young People,
PERSONAL INJURIES ASSESSMENT BOARD DATA PROTECTION CODE OF PRACTICE
PERSONAL INJURIES ASSESSMENT BOARD DATA PROTECTION CODE OF PRACTICE ADOPTED ON 9 th January 2008 TABLE OF CONTENTS Page No. 1 Introduction...3 2 Glossary...3 3 Types of Personal Data held by Us...3 4 Obligations
DATA PROTECTION POLICY
DATA PROTECTION POLICY Version 1.3 April 2014 Contents 1 POLICY STATEMENT...2 2 PURPOSE....2 3 LEGAL CONTEXT AND DEFINITIONS...2 3.1 Data Protection Act 1998...2 3.2 Other related legislation.....4 3.3
Clause 1. Definitions and Interpretation
[Standard data protection [agreement/clauses] for the transfer of Personal Data from the University of Edinburgh (as Data Controller) to a Data Processor within the European Economic Area ] In this Agreement:-
Data Protection Policy
Data Protection Policy September 2015 Contents 1. Scope 2. Purpose 3. Data protection roles 4. Staff training and guidance 5. About the Data Protection Act 1998 6. Policy 7. The Information Commissioner's
How To Protect Your Personal Information At A College
Data Protection Policy Policy Details Produced by Assistant Principal Information Systems Date produced Approved by Senior Leadership Team (SLT) Date approved July 2011 Linked Policies and Freedom of Information
Incident reporting procedure
Incident reporting procedure Responsible Officer Author Date effective from Aug 2009 Date last amended Aug 2009 Review date July 2012 Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance
ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY
ROEHAMPTON UNIVERSITY DATA PROTECTION POLICY Originated by: Data Protection Working Group: November 2008 Impact Assessment: (to be confirmed) Recommended by Senate: 28 January 2009 Approved by Council:
DATA PROTECTION POLICY
Reference number Approved by Information Management and Technology Board Date approved 14 th May 2012 Version 1.1 Last revised N/A Review date May 2015 Category Information Assurance Owner Data Protection
DATA PROTECTION POLICY
Title Author Approved By and Date Review Date Mike Pilling Latest Update- Corporation May 2008 1 Aug 2013 DATA PROTECTION ACT 1998 POLICY FOR ALL STAFF AND STUDENTS 1.0 Introduction 1.1 The Data Protection
Information Governance Policy
Information Governance Policy 1 Introduction Healthwatch Rutland (HWR) needs to collect and use certain types of information about the Data Subjects who come into contact with it in order to carry on its
The potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
Policy and Procedure Title: Maintaining Secure Learner Records Policy No: CCTP1001 Version: 1.0
PROVIDER NAME: POLICY AREA: College of Computing Technology (CCT) Standard 10: Information Management, Student Information System & Data Protection Policy and Procedure Title: Maintaining Secure Learner
Corporate Information Security Policy
Corporate Information Security Policy. A guide to the Council s approach to safeguarding information resources. September 2015 Contents Page 1. Introduction 1 2. Information Security Framework 2 3. Objectives
Data Protection Good Practice Note
Data Protection Good Practice Note This explanatory document explains what charities and voluntary organisations need to do to comply with the Data Protection Act 1988 as amended by the Data Protection
Corporate ICT & Data Management. Data Protection Policy
90 Corporate ICT & Data Management Data Protection Policy Classification: Unclassified Date Created: January 2012 Date Reviewed January Version: 2.0 Author: Owner: Data Protection Policy V2 1 Version Control
Information Security Policy
Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Alan Lawrie ehealth Strategy Group Implementation Date: September
Data protection issues on an EU outsourcing
Data protection issues on an EU outsourcing Saam Golshani, Alastair Gorrie and Diego Rigatti, Orrick Herrington & Sutcliffe www.practicallaw.com/8-380-8496 Outsourcing can mean subcontracting a process
Data Protection Act 1998 The Data Protection Policy for the Borough Council of King's Lynn & West Norfolk
Data Protection Act 1998 The for the Borough Council of King's Lynn & West Norfolk 1 Contents Introduction 3 1. Statement of Intent 4 2. Fair Obtaining I Processing 5 3. Data Uses and Processes 6 4. Data
John Leggott College. Data Protection Policy. Introduction
John Leggott College Data Protection Policy Introduction The College needs to keep certain information about its employees, students and other users to allow it to monitor performance, achievements, and
So the security measures you put in place should seek to ensure that:
Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.
Protection. Code of Practice. of Personal Data RPC001147_EN_WB_L_1
Protection of Personal Data RPC001147_EN_WB_L_1 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Responsibility of Employees
Appendix 11 - Swiss Data Protection Act
GLEIF- LOU Restricted Appendix 11 - Swiss Data Protection Act GLEIF Revision Version: 1.0 2015-09-23 Master Copy page 2 of 11 Applicable Provisions of the Swiss Data Protection Act (DPA) including the
Caedmon College Whitby
Caedmon College Whitby Data Protection and Information Security Policy College Governance Status This policy was re-issued in June 2014 and was adopted by the Governing Body on 26 June 2014. It will be
Office of the Data Protection Commissioner of The Bahamas. Data Protection (Privacy of Personal Information) Act, 2003. A Guide for Data Controllers
Office of the Data Protection Commissioner of The Bahamas Data Protection (Privacy of Personal Information) Act, 2003 A Guide for Data Controllers 1 Acknowledgement Some of the information contained in
Data Protection in Ireland
Data Protection in Ireland 0 Contents Data Protection in Ireland Introduction Page 2 Appointment of a Data Processor Page 2 Security Measures (onus on a data controller) Page 3 8 Principles Page 3 Fair
RECORDS MANAGEMENT POLICY
[Type text] RECORDS MANAGEMENT POLICY POLICY TITLE Academic Year: 2013/14 onwards Target Audience: Governing Body All Staff and Students Stakeholders Final approval by: CMT - 1 October 2014 Governing Body
DATA PROTECTION AND DATA STORAGE POLICY
DATA PROTECTION AND DATA STORAGE POLICY 1. Purpose and Scope 1.1 This Data Protection and Data Storage Policy (the Policy ) applies to all personal data collected and dealt with by Centre 404, whether
Data Protection Act. Privacy & Security in the Information Age. April 26, 2013. Ministry of Communications, Ghana
Data Protection Act Privacy & Security in the Information Age April 26, 2013 Agenda Privacy in The Information Age The right to privacy Why We Need Legislation Purpose of the Act The Data Protection Act
ATMD Bird & Bird. Singapore Personal Data Protection Policy
ATMD Bird & Bird Singapore Personal Data Protection Policy Contents 1. PURPOSE 1 2. SCOPE 1 3. COMMITMENT TO COMPLY WITH DATA PROTECTION LAWS 1 4. PERSONAL DATA PROTECTION SAFEGUARDS 3 5. ATMDBB EXCEPTIONS:
Firm Registration Form
Firm Registration Form Firm Registration Form This registration form should be completed by firms who are authorised and regulated by the Financial Conduct Authority. All sections of this form are mandatory.
QUEENSLAND COUNTRY HEALTH FUND. privacy policy. Queensland Country Health Fund Ltd ABN 18 085 048 237. better health cover shouldn t hurt
QUEENSLAND COUNTRY HEALTH FUND privacy policy Queensland Country Health Fund Ltd ABN 18 085 048 237 better health cover shouldn t hurt 1 2 contents 1. Introduction 4 2. National Privacy Principles 5 3.
Align Technology. Data Protection Binding Corporate Rules Controller Policy. 2014 Align Technology, Inc. All rights reserved.
Align Technology Data Protection Binding Corporate Rules Controller Policy Contents INTRODUCTION 3 PART I: BACKGROUND AND ACTIONS 4 PART II: CONTROLLER OBLIGATIONS 6 PART III: APPENDICES 13 2 P a g e INTRODUCTION
DATA PROTECTION AUDIT GUIDANCE
DATA PROTECTION AUDIT GUIDANCE CONTENTS Section I: Section II: Audit of Processing of Personal Data Audit Procedure Appendices: A B C D E Audit Form List of Purposes List of data subjects List of data
Data Protection. Processing and Transfer of Personal Data in Kvaerner. Binding Corporate Rules Public Document
Data Protection Processing and Transfer of Personal Data in Kvaerner Binding Corporate Rules Public Document 1 of 19 1 / 19 Table of contents 1 Introduction... 4 1.1 Scope... 4 1.2 Definitions... 4 1.2.1
The supplier shall have appropriate policies and procedures in place to ensure compliance with
Supplier Instructions for Processing of Personal Data 1 PURPOSE SOS International has legal and contractual obligations on the matters of data protection and IT security. As a part of these obligations
Information Governance Policy
Information Governance Policy Implementation date: 30 September 2014 Control schedule Approved by Corporate Policy and Strategy Committee Approval date 30 September 2014 Senior Responsible Officer Kirsty-Louise
PRESIDENT S DECISION No. 40. of 27 August 2013. Regarding Data Protection at the European University Institute. (EUI Data Protection Policy)
PRESIDENT S DECISION No. 40 of 27 August 2013 Regarding Data Protection at the European University Institute (EUI Data Protection Policy) THE PRESIDENT OF THE EUROPEAN UNIVERSITY INSTITUTE, Having regard
Privacy and Electronic Communications Regulations
ICO lo Notification of PECR security breaches Privacy and Electronic Communications Regulations Contents Introduction... 2 Overview... 2 Relevant security breaches... 3 What is a service provider?... 3
Processor Binding Corporate Rules (BCRs), for intra-group transfers of personal data to non EEA countries
Processor Binding Corporate Rules (BCRs), for intra-group transfers of personal data to non EEA countries Sopra HR Software as a Data Processor Sopra HR Software, 2014 / Ref. : 20141120-101114-m 1/32 1.
GSK Public policy positions
Safeguarding Personally Identifiable Information A Summary of GSK s Binding Corporate Rules The Issue The processing of Personally Identifiable Information (PII) 1 and Sensitive Personally Identifiable
Standard conditions of purchase
Standard conditions of purchase 1 OFFER AND ACCEPTANCE 2 PROPERTY, RISK & DELIVERY 3 PRICES & RATES The Supplier shall provide all Goods and Services in accordance with the terms and conditions set out
Data Protection and Privacy Policy
Data Protection and Privacy Policy 1. General This policy outlines Conciliation Resources commitments to respect the privacy of people s personal information and observe the relevant data protection legislation.
Data controllers and data processors: what the difference is and what the governance implications are
ICO lo : what the difference is and what the governance implications are Data Protection Act Contents Introduction... 3 Overview... 3 Section 1 - What is the difference between a data controller and a
HERTSMERE BOROUGH COUNCIL
HERTSMERE BOROUGH COUNCIL DATA PROTECTION POLICY October 2007 1 1. Introduction Hertsmere Borough Council ( the Council ) is fully committed to compliance with the requirements of the Data Protection Act
Data Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
Data Protection and Data security Policy
Data Protection and Data security Policy Statement of policy and purpose of Policy 1. Somer Valley Community Radio Ltd (the Employer) is committed to ensuring that all personal information handled by us
Protection. Code of Practice. of Personal Data RPC001147_EN_D_19
Protection of Personal Data RPC001147_EN_D_19 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Rules Responsibility
Little Marlow Parish Council Registration Number for ICO Z3112320
Data Protection Policy Little Marlow Parish Council Registration Number for ICO Z3112320 Adopted 2012 Reviewed 23 rd February 2016 Introduction The Parish Council is fully committed to compliance with
Access Control Policy
Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you
Office 365 Data Processing Agreement with Model Clauses
Enrollment for Education Solutions Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Enrollment for Education Solutions number Microsoft to complete 7392924 GOLDS03081
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Data Protection for the Guidance Counsellor. Issues To Plan For
Data Protection for the Guidance Counsellor Issues To Plan For Author: Hugh Jones Data Protection Specialist Longstone Management Ltd. Published by the National Centre for Guidance in Education (NCGE)
Data Protection Consent Clause and Policy Background
Data Protection Consent Clause and Policy Background The Singapore Personal Data Protection Act - 2012 (PDPA) establishes a data protection law that comprises various rules governing the collection, use,
Policy Document Control Page
Policy Document Control Page Title Title: Data Protection Policy Version: 3 Reference Number: CO59 Keywords: Data, access, principles, protection, Act. Data Subject, Information Supersedes Supersedes:
DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE
DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE 1. INTRODUCTION Annex C 1.1 Surrey Heath Borough Council (SHBC) processes personal data and must respond appropriately against unauthorised or unlawful
INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK
INFORMATION GOVERNANCE OPERATING POLICY & FRAMEWORK Log / Control Sheet Responsible Officer: Chief Finance Officer Clinical Lead: Dr J Parker, Caldicott Guardian Author: Associate IG Specialist, Yorkshire
DATA PROTECTION POLICY
DATA PROTECTION POLICY Rev No. 0 New Document 1 2 3 4 5 6 7 Revision Status Details of Amendments Name Date Update of College DPA statement New Reference to Appendix 4 Staff Guidelines ESF document retention
Records Management plan
Records Management plan Prepared for 31 October 2013 Audit Scotland is a statutory body set up in April 2000 under the Finance and Accountability (Scotland) Act 2000. We help the Auditor General for Scotland
Data Security and Extranet
Data Security and Extranet Derek Crabtree Schools ICT Support Manager [email protected] Target Operating Model 2011 Merton Audit Organisation name: London Borough of Merton Periodic plan date:
This Amendment consists of two parts. This is part 1 of 2 and must be accompanied by and signed with part 2 of 2 (Annex 1) to be valid.
Microsoft Online Subscription Agreement Amendment adding Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Proposal ID MOSA number Microsoft to complete This Amendment
Information Security and Governance Policy
Information Security and Governance Policy Version: 1.0 Ratified by: Information Governance Group Date ratified: 19 th October 2012 Name of organisation / author: Derek Wilkinson Name of responsible Information
Electronic Communications Monitoring Policy
Electronic Communications Monitoring Policy Printed copies should not be considered the definitive version DOCUMENT CONTROL POLICY NO. 79 Policy Group Information Governance and Security Author Andrew
DATA PROTECTION POLICY
DATA PROTECTION POLICY Approval date: June 2014 Approved by: Board Responsible Manager: Executive Director of Resources Next Review June 2016 Data Protection Policy 1. Introduction Data Protection Policy
DATA AND PAYMENT SECURITY PART 1
STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of
Human Resources and Data Protection
Human Resources and Data Protection Contents 1. Policy Statement... 1 2. Scope... 2 3. What is personal data?... 2 4. Processing data... 3 5. The eight principles of the Data Protection Act... 4 6. Council
Information Governance Checklist and Privacy Impact Assessments
Information Governance Checklist and Privacy Impact Assessments Authorship: Committee Approved: Chris Wallace Information Governance Manager Quality and Clinical Governance Committee Approved date: 1 Feb
How To Understand The Data Protection Act
DATA PROTECTION ACT 2002 The Basics Purpose of the Act Balance the rights of an individual with an organisation s legitimate need to process personal data Promote openness and transparency Establish and
ROYAL AUSTRALASIAN COLLEGE OF SURGEONS
1. SCOPE This policy details the College s privacy policy and related information handling practices and gives guidelines for access to any personal information retained by the College. This includes personal
Article 29 Working Party Issues Opinion on Cloud Computing
Client Alert Global Regulatory Enforcement If you have questions or would like additional information on the material covered in this Alert, please contact one of the authors: Cynthia O Donoghue Partner,
singapore american school
Background The Singapore Personal Data Protection Act - 2012 (PDPA) establishes a data protection law that comprises various rules governing the collection, use, disclosure, and care of personal data.
