SlideShare a Scribd company logo
1 of 13
GDPR
FOR TEACHERS
GDPR
• From 25 May 2018 the Data Protection Act (DPA) has been replaced by the
General Data Protection Regulation (GDPR). These new EU regulations are
intended to strengthen and unify the safety and security of all data held within an
organisation, including schools and colleges.
A DEFINITION OF PERSONAL DATA IS:
•Any data or information that
identifies an individual that if lost
or mislaid could cause harm or
distress.
TAKING A REGISTER
• When taking a register you should not display the information to the class.
• If a projector is linked to your computer then make sure that either the screen is
frozen before you take the register or that the projector is turned off. The
danger is not that the learners present in the class know that people are not in
the class but that the display might be seen by others passing by the classroom
or that information that they should not see is disclosed.
COURSE FILE /LESSON PLAN FOLDER
• By the very nature these will hold quite a lot of personal data, some of which will
be sensitive in its nature. You are allowed to have these open in the classroom
and can leave them on the teachers’ desk while you are in the staffroom.
• If you leave the room then you should either lock this information away or take
it with you. At night you should always lock away this information or take it
home with you 9if there is no other option). You do not know who will visit your
classroom / staffroom at the end of the day.
LEARNERS’ WORK / CLASSROOM DISPLAYS
• Ensure that no personal details are left on any work displayed in class.
• The same room is used by many other learners and , possibly, for meetings.
PHOTOS
• Like learners’ work a photo can be seen as being personal data.
• However, like the learners’ work they are not sensitive in nature - the pupils
know who each other are and other will know that they attend the school.
Therefore in areas that are not public there is no real problem in displaying
pictures that contain children.
• If there are pupils for who there are safeguarding issues then the display of
these photos might not be advisable.
USING YOUR OWN DEVICES
• There are dangers in using your own devices for accessing learners personal
data or school email.
• These dangers are mainly around other people seeing the data, whether this is
accidental or not, with many computers and tablets at home being shared by
other family members.
MIXING PERSONAL AND SCHOOL’S EMAILS
• Beware of using the same ‘email’ account for both private and school emails.
• It is easy to have the contacts from the school alongside those from friends and
family. It is not difficult to see that a slight confusion in names could send an
email that holds personal data could be accidentally to someone who should
not receive that data.
CONNECTIONS AND AUTOMATIC CLOUD
STORAGE
• There are also issues with the connections that you might have set on your
tablet or computer.
• It is common these days for tablets to automatically backup photos in cloud
storage. This is fine if it is your data, but the use on a trip could mean that
pictures of learners could be stored against the Data Protection Act.
CONSIDER DATA PROTECTION WHEN YOU’RE
COMMUNICATING ONLINE
Emails are now a ubiquitous form of online communication, but they are also
common point for data breaches. In order to make emails more secure:
• Always use your school email account for any work-related communications
• If you’re sending a sensitive document via email, consider password-protecting
the document
• Make sure that the email address you are sending to is a legitimate one,
particularly when replying to an email
• Do not open attachments from unsolicited emails
ENSURE THAT YOUR LAPTOPS AND PCS HAVE
ADEQUATE PROTECTION IN PLACE
• As teachers, we often work from home, in the evening, at weekends or during
school holidays which can raise issues surrounding the transport of data and its
storage.
• Always keep personal and work related information separate, keep your
antivirus software up to date.
DO NOT RELY ON USB STICKS
• With so many storage devices, from USB sticks and flash memory to portable
hard drives being lost and stolen each year, a number of organisations have
banned staff from using them.
• If you use a mobile storage device, then make sure that the device itself and the
files on them are encrypted. Secure flash drives are available with an encryption
feature built into them for this purpose.

More Related Content

What's hot

10 best uses of internet in teaching and
10 best uses of internet in teaching and10 best uses of internet in teaching and
10 best uses of internet in teaching andetuff
 
Getting Savvy With Social Media
Getting Savvy With Social MediaGetting Savvy With Social Media
Getting Savvy With Social MediaMatt Britland
 
Expectations as an e-Learner EPS
Expectations as an e-Learner EPSExpectations as an e-Learner EPS
Expectations as an e-Learner EPSJeanette Murphy
 
Interview Responses
Interview ResponsesInterview Responses
Interview ResponsesGaurav72h
 
Internet Publication
Internet PublicationInternet Publication
Internet PublicationDré Davis
 
M4 - Computing - Week 1
M4 - Computing - Week 1M4 - Computing - Week 1
M4 - Computing - Week 1Jamie Hutt
 
Lesson 1
Lesson 1Lesson 1
Lesson 1broo209
 
Top Ten Internet Uses In Teaching And Learning 2
Top Ten Internet Uses In Teaching And Learning   2Top Ten Internet Uses In Teaching And Learning   2
Top Ten Internet Uses In Teaching And Learning 2rogerja
 
Internet Safety_Trinity (ELD&ULD)
Internet Safety_Trinity (ELD&ULD)Internet Safety_Trinity (ELD&ULD)
Internet Safety_Trinity (ELD&ULD)MMHoward
 
Unit 1 - Lesson 1
Unit 1 - Lesson 1Unit 1 - Lesson 1
Unit 1 - Lesson 1gwest171
 
Top ten internet uses for educators
Top ten internet uses for educatorsTop ten internet uses for educators
Top ten internet uses for educatorsdavjohn3057
 
Elizabeth Kelly
Elizabeth  KellyElizabeth  Kelly
Elizabeth Kellyeduatecu
 
Cambridge ESOL World of Work Forum
Cambridge  ESOL World of Work ForumCambridge  ESOL World of Work Forum
Cambridge ESOL World of Work ForumCarl Dowse
 
Information computer technology
Information computer technologyInformation computer technology
Information computer technologyLorna Deguito
 

What's hot (19)

Start spreading the news
Start spreading the newsStart spreading the news
Start spreading the news
 
10 best uses of internet in teaching and
10 best uses of internet in teaching and10 best uses of internet in teaching and
10 best uses of internet in teaching and
 
Getting Savvy With Social Media
Getting Savvy With Social MediaGetting Savvy With Social Media
Getting Savvy With Social Media
 
Expectations as an e-Learner EPS
Expectations as an e-Learner EPSExpectations as an e-Learner EPS
Expectations as an e-Learner EPS
 
Interview Responses
Interview ResponsesInterview Responses
Interview Responses
 
Internet Publication
Internet PublicationInternet Publication
Internet Publication
 
M4 - Computing - Week 1
M4 - Computing - Week 1M4 - Computing - Week 1
M4 - Computing - Week 1
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Presentación1
Presentación1Presentación1
Presentación1
 
Top Ten Internet Uses In Teaching And Learning 2
Top Ten Internet Uses In Teaching And Learning   2Top Ten Internet Uses In Teaching And Learning   2
Top Ten Internet Uses In Teaching And Learning 2
 
Parent ed is_mh
Parent ed is_mhParent ed is_mh
Parent ed is_mh
 
Internet Safety_Trinity (ELD&ULD)
Internet Safety_Trinity (ELD&ULD)Internet Safety_Trinity (ELD&ULD)
Internet Safety_Trinity (ELD&ULD)
 
Unit 1 - Lesson 1
Unit 1 - Lesson 1Unit 1 - Lesson 1
Unit 1 - Lesson 1
 
Top ten internet uses for educators
Top ten internet uses for educatorsTop ten internet uses for educators
Top ten internet uses for educators
 
Elizabeth Kelly
Elizabeth  KellyElizabeth  Kelly
Elizabeth Kelly
 
Cambridge ESOL World of Work Forum
Cambridge  ESOL World of Work ForumCambridge  ESOL World of Work Forum
Cambridge ESOL World of Work Forum
 
Technology acceptable use policy gr 7 day 1
Technology acceptable use policy   gr 7 day 1Technology acceptable use policy   gr 7 day 1
Technology acceptable use policy gr 7 day 1
 
Information computer technology
Information computer technologyInformation computer technology
Information computer technology
 
Mobile devices
Mobile devicesMobile devices
Mobile devices
 

Similar to GDPR essentials for teachers

Point2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect
 
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJovenLopez1
 
Online Class Orientation.pptx
Online Class Orientation.pptxOnline Class Orientation.pptx
Online Class Orientation.pptxLurecelTiu
 
Challenger 201311 handbook
Challenger 201311 handbookChallenger 201311 handbook
Challenger 201311 handbookJG4191
 
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJovenLopez1
 
JOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptx
JOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptxJOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptx
JOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptxJovenLopez1
 
Pros and Cons of virtual class.pptx
Pros and Cons of virtual class.pptxPros and Cons of virtual class.pptx
Pros and Cons of virtual class.pptxTharunKing3
 
Byod implementation plan
Byod implementation planByod implementation plan
Byod implementation plandwalke17
 
Mms parent training keynote 2
Mms parent training keynote 2Mms parent training keynote 2
Mms parent training keynote 2MGSD
 
MEETING 4 E-LEARNING.pptx
MEETING 4 E-LEARNING.pptxMEETING 4 E-LEARNING.pptx
MEETING 4 E-LEARNING.pptxssuser959bfc
 
Training for Students: BYOD fall 2014
Training for Students: BYOD fall 2014Training for Students: BYOD fall 2014
Training for Students: BYOD fall 2014lmalm86
 
Legal and ethical issues
Legal and ethical issuesLegal and ethical issues
Legal and ethical issuesLewis Appleton
 
Safety Issues on the Use of ICT including e-Safety Rules.pptx
Safety Issues on the Use of ICT including e-Safety Rules.pptxSafety Issues on the Use of ICT including e-Safety Rules.pptx
Safety Issues on the Use of ICT including e-Safety Rules.pptxZaideMangondato1
 
Final challenges 2015 day 3
Final challenges 2015 day 3Final challenges 2015 day 3
Final challenges 2015 day 3Grazio Grixti
 
Advice for parents: BYOD
Advice for parents: BYOD  Advice for parents: BYOD
Advice for parents: BYOD Linda Rubens
 
SAFETY ISSUES ON THE USE OF ICT INCLUDING E-SAFETY RULES
SAFETY ISSUES ON THE USE OF ICT INCLUDING E-SAFETY RULESSAFETY ISSUES ON THE USE OF ICT INCLUDING E-SAFETY RULES
SAFETY ISSUES ON THE USE OF ICT INCLUDING E-SAFETY RULESNethBataller1
 
App cloud tool_presentation_spring_2015
App cloud tool_presentation_spring_2015App cloud tool_presentation_spring_2015
App cloud tool_presentation_spring_2015Rickey Moroney
 
Role of ICT in education.ppt
Role of ICT in education.pptRole of ICT in education.ppt
Role of ICT in education.pptZakaSaleem1
 

Similar to GDPR essentials for teachers (20)

Point2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect - keeping children safe
Point2Protect - keeping children safe
 
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
 
Online Class Orientation.pptx
Online Class Orientation.pptxOnline Class Orientation.pptx
Online Class Orientation.pptx
 
Challenger 201311 handbook
Challenger 201311 handbookChallenger 201311 handbook
Challenger 201311 handbook
 
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptxJOVEN LOPEZ(PPT, TECHNOLOGY).pptx
JOVEN LOPEZ(PPT, TECHNOLOGY).pptx
 
JOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptx
JOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptxJOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptx
JOVEN LOPEZ(PPT, TECHNOLOGY)_1.pptx
 
Pros and Cons of virtual class.pptx
Pros and Cons of virtual class.pptxPros and Cons of virtual class.pptx
Pros and Cons of virtual class.pptx
 
Byod implementation plan
Byod implementation planByod implementation plan
Byod implementation plan
 
Mms parent training keynote 2
Mms parent training keynote 2Mms parent training keynote 2
Mms parent training keynote 2
 
MEETING 4 E-LEARNING.pptx
MEETING 4 E-LEARNING.pptxMEETING 4 E-LEARNING.pptx
MEETING 4 E-LEARNING.pptx
 
2015 parent presentation yr 7 12 slideshare
2015 parent presentation yr 7   12 slideshare2015 parent presentation yr 7   12 slideshare
2015 parent presentation yr 7 12 slideshare
 
Cyber security training
Cyber security trainingCyber security training
Cyber security training
 
Training for Students: BYOD fall 2014
Training for Students: BYOD fall 2014Training for Students: BYOD fall 2014
Training for Students: BYOD fall 2014
 
Legal and ethical issues
Legal and ethical issuesLegal and ethical issues
Legal and ethical issues
 
Safety Issues on the Use of ICT including e-Safety Rules.pptx
Safety Issues on the Use of ICT including e-Safety Rules.pptxSafety Issues on the Use of ICT including e-Safety Rules.pptx
Safety Issues on the Use of ICT including e-Safety Rules.pptx
 
Final challenges 2015 day 3
Final challenges 2015 day 3Final challenges 2015 day 3
Final challenges 2015 day 3
 
Advice for parents: BYOD
Advice for parents: BYOD  Advice for parents: BYOD
Advice for parents: BYOD
 
SAFETY ISSUES ON THE USE OF ICT INCLUDING E-SAFETY RULES
SAFETY ISSUES ON THE USE OF ICT INCLUDING E-SAFETY RULESSAFETY ISSUES ON THE USE OF ICT INCLUDING E-SAFETY RULES
SAFETY ISSUES ON THE USE OF ICT INCLUDING E-SAFETY RULES
 
App cloud tool_presentation_spring_2015
App cloud tool_presentation_spring_2015App cloud tool_presentation_spring_2015
App cloud tool_presentation_spring_2015
 
Role of ICT in education.ppt
Role of ICT in education.pptRole of ICT in education.ppt
Role of ICT in education.ppt
 

Recently uploaded

Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeBlayneRush1
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxsrikarna235
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书SD DS
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书Fir L
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书srst S
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书SD DS
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceMichael Cicero
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书FS LS
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书SD DS
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsAbdul-Hakim Shabazz
 
Difference between LLP, Partnership, and Company
Difference between LLP, Partnership, and CompanyDifference between LLP, Partnership, and Company
Difference between LLP, Partnership, and Companyaneesashraf6
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书SD DS
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书SD DS
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A HistoryJohn Hustaix
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiBlayneRush1
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书SD DS
 
Indian Contract Act-1872-presentation.pptx
Indian Contract Act-1872-presentation.pptxIndian Contract Act-1872-presentation.pptx
Indian Contract Act-1872-presentation.pptxSauravAnand68
 
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书SD DS
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptx
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
 
Difference between LLP, Partnership, and Company
Difference between LLP, Partnership, and CompanyDifference between LLP, Partnership, and Company
Difference between LLP, Partnership, and Company
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A History
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
 
Indian Contract Act-1872-presentation.pptx
Indian Contract Act-1872-presentation.pptxIndian Contract Act-1872-presentation.pptx
Indian Contract Act-1872-presentation.pptx
 
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
如何办理(CQU毕业证书)中央昆士兰大学毕业证学位证书
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
 

GDPR essentials for teachers

  • 2. GDPR • From 25 May 2018 the Data Protection Act (DPA) has been replaced by the General Data Protection Regulation (GDPR). These new EU regulations are intended to strengthen and unify the safety and security of all data held within an organisation, including schools and colleges.
  • 3. A DEFINITION OF PERSONAL DATA IS: •Any data or information that identifies an individual that if lost or mislaid could cause harm or distress.
  • 4. TAKING A REGISTER • When taking a register you should not display the information to the class. • If a projector is linked to your computer then make sure that either the screen is frozen before you take the register or that the projector is turned off. The danger is not that the learners present in the class know that people are not in the class but that the display might be seen by others passing by the classroom or that information that they should not see is disclosed.
  • 5. COURSE FILE /LESSON PLAN FOLDER • By the very nature these will hold quite a lot of personal data, some of which will be sensitive in its nature. You are allowed to have these open in the classroom and can leave them on the teachers’ desk while you are in the staffroom. • If you leave the room then you should either lock this information away or take it with you. At night you should always lock away this information or take it home with you 9if there is no other option). You do not know who will visit your classroom / staffroom at the end of the day.
  • 6. LEARNERS’ WORK / CLASSROOM DISPLAYS • Ensure that no personal details are left on any work displayed in class. • The same room is used by many other learners and , possibly, for meetings.
  • 7. PHOTOS • Like learners’ work a photo can be seen as being personal data. • However, like the learners’ work they are not sensitive in nature - the pupils know who each other are and other will know that they attend the school. Therefore in areas that are not public there is no real problem in displaying pictures that contain children. • If there are pupils for who there are safeguarding issues then the display of these photos might not be advisable.
  • 8. USING YOUR OWN DEVICES • There are dangers in using your own devices for accessing learners personal data or school email. • These dangers are mainly around other people seeing the data, whether this is accidental or not, with many computers and tablets at home being shared by other family members.
  • 9. MIXING PERSONAL AND SCHOOL’S EMAILS • Beware of using the same ‘email’ account for both private and school emails. • It is easy to have the contacts from the school alongside those from friends and family. It is not difficult to see that a slight confusion in names could send an email that holds personal data could be accidentally to someone who should not receive that data.
  • 10. CONNECTIONS AND AUTOMATIC CLOUD STORAGE • There are also issues with the connections that you might have set on your tablet or computer. • It is common these days for tablets to automatically backup photos in cloud storage. This is fine if it is your data, but the use on a trip could mean that pictures of learners could be stored against the Data Protection Act.
  • 11. CONSIDER DATA PROTECTION WHEN YOU’RE COMMUNICATING ONLINE Emails are now a ubiquitous form of online communication, but they are also common point for data breaches. In order to make emails more secure: • Always use your school email account for any work-related communications • If you’re sending a sensitive document via email, consider password-protecting the document • Make sure that the email address you are sending to is a legitimate one, particularly when replying to an email • Do not open attachments from unsolicited emails
  • 12. ENSURE THAT YOUR LAPTOPS AND PCS HAVE ADEQUATE PROTECTION IN PLACE • As teachers, we often work from home, in the evening, at weekends or during school holidays which can raise issues surrounding the transport of data and its storage. • Always keep personal and work related information separate, keep your antivirus software up to date.
  • 13. DO NOT RELY ON USB STICKS • With so many storage devices, from USB sticks and flash memory to portable hard drives being lost and stolen each year, a number of organisations have banned staff from using them. • If you use a mobile storage device, then make sure that the device itself and the files on them are encrypted. Secure flash drives are available with an encryption feature built into them for this purpose.