SlideShare a Scribd company logo
Data Protection Regulations
James Davies and Steve Lorber
23 April 2013
Crystal ball
Cheap data
• Statistics/visual imagery about how workplace has changed
over last 15 years re collection and use of data
Data Protection – a brief history
Late 1960s First
electronic messaging
1969 First email
The UK in October 1969
Data Protection – a brief history
Late 1960s First
electronic messaging 1984 Original Data Protection
law (minimal impact)
1984 First Data Protection legislation
Data Protection – a brief history
Late 1960s First
electronic messaging 1984 Original Data Protection
law (minimal impact)
1998 Data
Protection Act
1998 Act – key principles
What has this meant over last 15 years?
• Data subject requests
• Data protection policies - consent
• Transfer overseas especially to US
• “Light touch” enforcement
• Globalisation and other less light
touch data protection laws
Data Protection – a brief history
Late 1960s First
electronic messaging 1984 Original Data Protection
law (minimal impact)
1998 Data
Protection Act
2005 Employment
Practices Code
Who is this?
Christopher Graham, Information Commissioner
2005 ICO employment practices code
Data Protection – a brief history
Late 1960s First
electronic messaging 1984 Original Data Protection
law (minimal impact)
1998 Data
Protection Act
2005 Employment
Practices Code
2007 ICO Personal
Data guidance
2007 ICO Personal Data Guidance
Data Protection – a brief history
Late 1960s First
electronic messaging 1984 Original Data Protection
law (minimal impact)
1998 Data
Protection Act
2005 Employment
Practices Code
2010 Sanctions
increase to £500k
2007 ICO Personal
Data guidance
2010 Increase sanction to £500k
Data Protection – a brief history
Late 1960s First
electronic messaging 1984 Original Data Protection
law (minimal impact)
1998 Data
Protection Act
2005 Employment
Practices Code
2010 Sanctions
increase to £500k
2013 ICO BYOD guidance
2007 ICO Personal
Data guidance
2013 ICO BYOD guidance
Data Protection – a brief history
Late 1960s First
electronic messaging 1984 Original Data Protection
law (minimal impact)
1998 Data
Protection Act
TODAY Proposed General
Data Protection Regulation
2005 Employment
Practices Code
2010 Sanctions
increase to £500k
2013 ICO BYOD guidance
2007 ICO Personal
Data guidance
TODAY Draft Regulation
Data Protection Regulation – introduction
• What’s the problem?
• Commission solution
• Strategy
• Particular measures proposed
• Practical implications for now?
Data protection – the need for change
• Change in nature and extent of processing
• Globalisation
Different rules in different states
Cloud
• Employment context
volume
free-form data
Commission solution – a Data Protection
Regulation
• What is a regulation?
• Aim
one-stop shop
greater legal certainty - and consistency
throughout EU
reduction of administrative burden
strengthened data subject rights
efficiency of supervision and enforcement
• And “it will save money” – not just red tape
Strategy proposed
• Strategy
similar to current rules....but more
stricter data protection principles
more specific and granular obligations
more extensive individual rights...right to be forgotten...
Backed up by tougher
enforcement – fines of 2% of
global turnover
Policy, process...and documentation (1)
• Internal documentation
adopt policies
implement measures to ensure
compliance with policies
be able to demonstrate compliance
if appropriate establish an audit
Policy, process...and documentation (2)
• Documentation for data subjects
Extensive information including
> purposes of processing
> if justified by "legitimate interests" ...what those
interests are
> data subject rights and how to complain
> who gets to see it ....recipients
> If data does not come from data subject, who the
source is
Policy, process...and documentation (3)
• Very granular..... underscored by new data protection
principle
for each processing operation, controller must ensure and
demonstrate compliance
• Lots of paper .....but does it protect privacy?
Right to be forgotten
• Right to have personal data
erased if
no longer necessary in
relation to purposes for
which collected
consent withdrawn
expiry of retention period
processing is non-
compliant
Right to be forgotten
• If personal data has been
made public, controller shall
take all reasonable steps to
tell third parties
• Controller may restrict
where issue over accuracy
data needed for purposes
of proof (evidence of
business operations)
Data security (1)
• Controller and processor must
do risk assessment
implement technical and organisations measures to ensure
security
• "Personal data breach" means breach of security .... leading
to accidental or unlawful
destruction, loss or alteration
unauthorised disclosure
Data security (2)
• Duty to notify
• Duty to document breaches
• If breach is likely to affect privacy of data subjects, controller
must tell data subject of breach and what it is doing
Data protection by design
• "Data protection by design" ...if developing business in ways
that impinge on personal data (e.g. a new HR system)
implement to ensure compliance (having regard to cost and
technology)
ensure that by default system
> only processes data
necessary for purpose
> does not collect too much
> does not store too long
> controls
Data protection officer
• Controller and processor must establish
a DPO if 250 employees or more
• What are the roles/functions of a DPO?
Data protection officer
• Controller and processor must establish
a DPO if 250 employees or more
• What are the roles/functions of a DPO?
Data protection officer
Monitoring data protection
breaches
Contact point for supervisory
authority
Informing controller and
processor of obligations
under DPR (and documenting)
Monitoring
implementation of
policies (including audit
and training)
Ensuring documentation is
maintained
Monitoring protection
by design and
security
Monitoring data protection
impact assessment
Remedies and sanctions
• Up to 2% of turnover
• Enforcement by "main establishment" regulator
In EU - where purposes of processing determined or, if not,
where main processing takes place
If not established in EU, must appoint a "representative"
Special rules on employment
• Regulation allows members states to adopt special rules for
employment....but upwards only
Extra conditions for processing
Regulatory consent?
Works Council approval?
• Defeats "one-stop" shop?
What to do now?
• Proposals will change............
• Share your thoughts with MoJ?
• Processing operations
identify and record
consider how you comply
• Establish extent to which you use "consent"
to justify processing...and find other ways
Thank you

More Related Content

What's hot

Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
sp_krishna
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
Happiest Minds Technologies
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacy
himanshu jain
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
mrmwood
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
Extentia Information Technology
 
Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPR
DipanjanDey12
 
GDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationGDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection Regulation
Vicky Dallas
 
GDPR and Security.pdf
GDPR and Security.pdfGDPR and Security.pdf
General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...
Cvent
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
G Prachi
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
PECB
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
WilmerHale
 
Privacy and Data Protection
Privacy and Data ProtectionPrivacy and Data Protection
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
Vertex Holdings
 
Overview on data privacy
Overview on data privacy Overview on data privacy
Overview on data privacy
Amiit Keshav Naik
 
Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program Implementation
Eryk Budi Pratama
 
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykData Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Eryk Budi Pratama
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection ActSaimaRafiq
 
Introduction to data protection
Introduction to data protectionIntroduction to data protection
Introduction to data protection
Rachel Aldighieri
 
Information security
Information securityInformation security
Information security
LJ PROJECTS
 

What's hot (20)

Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacy
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPR
 
GDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationGDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection Regulation
 
GDPR and Security.pdf
GDPR and Security.pdfGDPR and Security.pdf
GDPR and Security.pdf
 
General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Privacy and Data Protection
Privacy and Data ProtectionPrivacy and Data Protection
Privacy and Data Protection
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
 
Overview on data privacy
Overview on data privacy Overview on data privacy
Overview on data privacy
 
Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program Implementation
 
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykData Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
 
Introduction to data protection
Introduction to data protectionIntroduction to data protection
Introduction to data protection
 
Information security
Information securityInformation security
Information security
 

Similar to Data protection

Data security and cyber risks - In house lawyers forum 2013, Richard Nicholas
Data security and cyber risks - In house lawyers forum 2013, Richard NicholasData security and cyber risks - In house lawyers forum 2013, Richard Nicholas
Data security and cyber risks - In house lawyers forum 2013, Richard Nicholas
Browne Jacobson LLP
 
Legal update
Legal updateLegal update
Legal update
Rachel Aldighieri
 
DMA Legal update: autumn 2013 - Tuesday 1 October
DMA Legal update: autumn 2013 - Tuesday 1 OctoberDMA Legal update: autumn 2013 - Tuesday 1 October
DMA Legal update: autumn 2013 - Tuesday 1 OctoberRachel Aldighieri
 
Kawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the CloudKawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the Cloud
Gurbir Singh
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event
Vuzion
 
Legal update Leeds - 7 October 2014
Legal update Leeds -  7 October 2014Legal update Leeds -  7 October 2014
Legal update Leeds - 7 October 2014Rachel Aldighieri
 
An introduction to data protection - 2/09/2015
An introduction to data protection - 2/09/2015An introduction to data protection - 2/09/2015
An introduction to data protection - 2/09/2015
Rachel Aldighieri
 
Mind Your Business: Why Privacy Matters to the Successful Enterprise
 Mind Your Business: Why Privacy Matters to the Successful Enterprise Mind Your Business: Why Privacy Matters to the Successful Enterprise
Mind Your Business: Why Privacy Matters to the Successful Enterprise
Eric Kavanagh
 
Introduction to data protection - Edinburgh - 29/04/15
Introduction to data protection - Edinburgh - 29/04/15Introduction to data protection - Edinburgh - 29/04/15
Introduction to data protection - Edinburgh - 29/04/15
Rachel Aldighieri
 
New General Data Protection Regulation (Agnes Andersson Hammarstrand)
New General Data Protection Regulation (Agnes Andersson Hammarstrand)New General Data Protection Regulation (Agnes Andersson Hammarstrand)
New General Data Protection Regulation (Agnes Andersson Hammarstrand)
Nordic APIs
 
Scott Appleton: GDPR - Big Bang or Data Evolution?
Scott Appleton: GDPR - Big Bang or Data Evolution?Scott Appleton: GDPR - Big Bang or Data Evolution?
Scott Appleton: GDPR - Big Bang or Data Evolution?
Emily Jones
 
The dma legal update summer 2014
The dma legal update summer 2014 The dma legal update summer 2014
The dma legal update summer 2014 Rachel Aldighieri
 
An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15
Rachel Aldighieri
 
Legal and data protection update
Legal and data protection updateLegal and data protection update
Legal and data protection update
Rachel Aldighieri
 
The EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to knowThe EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to know
Sophos Benelux
 
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Brian Miller, Solicitor
 
GDPR – what does it mean for charities and what you need to consider - Iain P...
GDPR – what does it mean for charities and what you need to consider - Iain P...GDPR – what does it mean for charities and what you need to consider - Iain P...
GDPR – what does it mean for charities and what you need to consider - Iain P...
m-hance
 
GDPR Privacy Introduction
GDPR Privacy IntroductionGDPR Privacy Introduction
GDPR Privacy Introduction
NiclasGranqvist
 
ICT4018_ICTICT418-Learning-Material.pdf
ICT4018_ICTICT418-Learning-Material.pdfICT4018_ICTICT418-Learning-Material.pdf
ICT4018_ICTICT418-Learning-Material.pdf
HasseyWijetunge
 

Similar to Data protection (20)

Data security and cyber risks - In house lawyers forum 2013, Richard Nicholas
Data security and cyber risks - In house lawyers forum 2013, Richard NicholasData security and cyber risks - In house lawyers forum 2013, Richard Nicholas
Data security and cyber risks - In house lawyers forum 2013, Richard Nicholas
 
Legal update
Legal updateLegal update
Legal update
 
DMA Legal update: autumn 2013 - Tuesday 1 October
DMA Legal update: autumn 2013 - Tuesday 1 OctoberDMA Legal update: autumn 2013 - Tuesday 1 October
DMA Legal update: autumn 2013 - Tuesday 1 October
 
Kawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the CloudKawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the Cloud
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event
 
Legal update Leeds - 7 October 2014
Legal update Leeds -  7 October 2014Legal update Leeds -  7 October 2014
Legal update Leeds - 7 October 2014
 
An introduction to data protection - 2/09/2015
An introduction to data protection - 2/09/2015An introduction to data protection - 2/09/2015
An introduction to data protection - 2/09/2015
 
Mind Your Business: Why Privacy Matters to the Successful Enterprise
 Mind Your Business: Why Privacy Matters to the Successful Enterprise Mind Your Business: Why Privacy Matters to the Successful Enterprise
Mind Your Business: Why Privacy Matters to the Successful Enterprise
 
Introduction to data protection - Edinburgh - 29/04/15
Introduction to data protection - Edinburgh - 29/04/15Introduction to data protection - Edinburgh - 29/04/15
Introduction to data protection - Edinburgh - 29/04/15
 
New General Data Protection Regulation (Agnes Andersson Hammarstrand)
New General Data Protection Regulation (Agnes Andersson Hammarstrand)New General Data Protection Regulation (Agnes Andersson Hammarstrand)
New General Data Protection Regulation (Agnes Andersson Hammarstrand)
 
DMA Scotland: Legal update
DMA Scotland: Legal updateDMA Scotland: Legal update
DMA Scotland: Legal update
 
Scott Appleton: GDPR - Big Bang or Data Evolution?
Scott Appleton: GDPR - Big Bang or Data Evolution?Scott Appleton: GDPR - Big Bang or Data Evolution?
Scott Appleton: GDPR - Big Bang or Data Evolution?
 
The dma legal update summer 2014
The dma legal update summer 2014 The dma legal update summer 2014
The dma legal update summer 2014
 
An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15
 
Legal and data protection update
Legal and data protection updateLegal and data protection update
Legal and data protection update
 
The EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to knowThe EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to know
 
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
 
GDPR – what does it mean for charities and what you need to consider - Iain P...
GDPR – what does it mean for charities and what you need to consider - Iain P...GDPR – what does it mean for charities and what you need to consider - Iain P...
GDPR – what does it mean for charities and what you need to consider - Iain P...
 
GDPR Privacy Introduction
GDPR Privacy IntroductionGDPR Privacy Introduction
GDPR Privacy Introduction
 
ICT4018_ICTICT418-Learning-Material.pdf
ICT4018_ICTICT418-Learning-Material.pdfICT4018_ICTICT418-Learning-Material.pdf
ICT4018_ICTICT418-Learning-Material.pdf
 

More from Lewis Silkin

Gender pay gap reporting
Gender pay gap reportingGender pay gap reporting
Gender pay gap reporting
Lewis Silkin
 
Developing branded products - A toolkit for agencies
Developing branded products - A toolkit for agencies Developing branded products - A toolkit for agencies
Developing branded products - A toolkit for agencies
Lewis Silkin
 
Lewis silkin Brand Academy 2013 - Building valuable brands presentations
Lewis silkin Brand Academy 2013 - Building valuable brands presentationsLewis silkin Brand Academy 2013 - Building valuable brands presentations
Lewis silkin Brand Academy 2013 - Building valuable brands presentationsLewis Silkin
 
The Community-Infrastructure-Levy - round table meeting
The Community-Infrastructure-Levy - round table meetingThe Community-Infrastructure-Levy - round table meeting
The Community-Infrastructure-Levy - round table meetingLewis Silkin
 
FM Forum - Termination & TUPE
FM Forum - Termination & TUPEFM Forum - Termination & TUPE
FM Forum - Termination & TUPELewis Silkin
 
Changes to the EU procurement rules - how will it affect you?
Changes to the EU procurement rules - how will it affect you? Changes to the EU procurement rules - how will it affect you?
Changes to the EU procurement rules - how will it affect you? Lewis Silkin
 
Discrimination law and family friendly rights
Discrimination law and family friendly rightsDiscrimination law and family friendly rights
Discrimination law and family friendly rightsLewis Silkin
 
Whistleblowing and collective consultation changes
Whistleblowing and collective consultation changesWhistleblowing and collective consultation changes
Whistleblowing and collective consultation changesLewis Silkin
 
Unfair dismissal and employment tribunals
Unfair dismissal and employment tribunalsUnfair dismissal and employment tribunals
Unfair dismissal and employment tribunalsLewis Silkin
 
Lewis Silkin's Don't get it wrong #socialmedia Seminar Presentation
Lewis Silkin's Don't get it wrong #socialmedia Seminar PresentationLewis Silkin's Don't get it wrong #socialmedia Seminar Presentation
Lewis Silkin's Don't get it wrong #socialmedia Seminar Presentation
Lewis Silkin
 
Lewis Silkin Seminar - Warranties and Indemnities - 8th March 2012
Lewis Silkin Seminar - Warranties and Indemnities - 8th March 2012Lewis Silkin Seminar - Warranties and Indemnities - 8th March 2012
Lewis Silkin Seminar - Warranties and Indemnities - 8th March 2012
Lewis Silkin
 
Lewis Silkin Seminar - What's Trending in TUPE - 8th March 2012
Lewis Silkin Seminar - What's Trending in TUPE - 8th March 2012Lewis Silkin Seminar - What's Trending in TUPE - 8th March 2012
Lewis Silkin Seminar - What's Trending in TUPE - 8th March 2012
Lewis Silkin
 
The New Data Protection Regulation and Cookie Compliance
The New Data Protection Regulation and Cookie ComplianceThe New Data Protection Regulation and Cookie Compliance
The New Data Protection Regulation and Cookie Compliance
Lewis Silkin
 
Lewis Silkin Brand Academy 2011 Supplementary Document
Lewis Silkin Brand Academy 2011 Supplementary DocumentLewis Silkin Brand Academy 2011 Supplementary Document
Lewis Silkin Brand Academy 2011 Supplementary Document
Lewis Silkin
 
Lewis Silkin Brand Academy 2011 Presentation
Lewis Silkin Brand Academy 2011 PresentationLewis Silkin Brand Academy 2011 Presentation
Lewis Silkin Brand Academy 2011 Presentation
Lewis Silkin
 

More from Lewis Silkin (16)

Gender pay gap reporting
Gender pay gap reportingGender pay gap reporting
Gender pay gap reporting
 
Developing branded products - A toolkit for agencies
Developing branded products - A toolkit for agencies Developing branded products - A toolkit for agencies
Developing branded products - A toolkit for agencies
 
Lewis silkin Brand Academy 2013 - Building valuable brands presentations
Lewis silkin Brand Academy 2013 - Building valuable brands presentationsLewis silkin Brand Academy 2013 - Building valuable brands presentations
Lewis silkin Brand Academy 2013 - Building valuable brands presentations
 
The Community-Infrastructure-Levy - round table meeting
The Community-Infrastructure-Levy - round table meetingThe Community-Infrastructure-Levy - round table meeting
The Community-Infrastructure-Levy - round table meeting
 
FM Forum - Termination & TUPE
FM Forum - Termination & TUPEFM Forum - Termination & TUPE
FM Forum - Termination & TUPE
 
Changes to the EU procurement rules - how will it affect you?
Changes to the EU procurement rules - how will it affect you? Changes to the EU procurement rules - how will it affect you?
Changes to the EU procurement rules - how will it affect you?
 
Discrimination law and family friendly rights
Discrimination law and family friendly rightsDiscrimination law and family friendly rights
Discrimination law and family friendly rights
 
Whistleblowing and collective consultation changes
Whistleblowing and collective consultation changesWhistleblowing and collective consultation changes
Whistleblowing and collective consultation changes
 
Unfair dismissal and employment tribunals
Unfair dismissal and employment tribunalsUnfair dismissal and employment tribunals
Unfair dismissal and employment tribunals
 
TUPE
TUPETUPE
TUPE
 
Lewis Silkin's Don't get it wrong #socialmedia Seminar Presentation
Lewis Silkin's Don't get it wrong #socialmedia Seminar PresentationLewis Silkin's Don't get it wrong #socialmedia Seminar Presentation
Lewis Silkin's Don't get it wrong #socialmedia Seminar Presentation
 
Lewis Silkin Seminar - Warranties and Indemnities - 8th March 2012
Lewis Silkin Seminar - Warranties and Indemnities - 8th March 2012Lewis Silkin Seminar - Warranties and Indemnities - 8th March 2012
Lewis Silkin Seminar - Warranties and Indemnities - 8th March 2012
 
Lewis Silkin Seminar - What's Trending in TUPE - 8th March 2012
Lewis Silkin Seminar - What's Trending in TUPE - 8th March 2012Lewis Silkin Seminar - What's Trending in TUPE - 8th March 2012
Lewis Silkin Seminar - What's Trending in TUPE - 8th March 2012
 
The New Data Protection Regulation and Cookie Compliance
The New Data Protection Regulation and Cookie ComplianceThe New Data Protection Regulation and Cookie Compliance
The New Data Protection Regulation and Cookie Compliance
 
Lewis Silkin Brand Academy 2011 Supplementary Document
Lewis Silkin Brand Academy 2011 Supplementary DocumentLewis Silkin Brand Academy 2011 Supplementary Document
Lewis Silkin Brand Academy 2011 Supplementary Document
 
Lewis Silkin Brand Academy 2011 Presentation
Lewis Silkin Brand Academy 2011 PresentationLewis Silkin Brand Academy 2011 Presentation
Lewis Silkin Brand Academy 2011 Presentation
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 

Data protection

  • 1. Data Protection Regulations James Davies and Steve Lorber 23 April 2013
  • 3. Cheap data • Statistics/visual imagery about how workplace has changed over last 15 years re collection and use of data
  • 4. Data Protection – a brief history Late 1960s First electronic messaging
  • 6. The UK in October 1969
  • 7. Data Protection – a brief history Late 1960s First electronic messaging 1984 Original Data Protection law (minimal impact)
  • 8. 1984 First Data Protection legislation
  • 9. Data Protection – a brief history Late 1960s First electronic messaging 1984 Original Data Protection law (minimal impact) 1998 Data Protection Act
  • 10. 1998 Act – key principles
  • 11. What has this meant over last 15 years? • Data subject requests • Data protection policies - consent • Transfer overseas especially to US • “Light touch” enforcement • Globalisation and other less light touch data protection laws
  • 12. Data Protection – a brief history Late 1960s First electronic messaging 1984 Original Data Protection law (minimal impact) 1998 Data Protection Act 2005 Employment Practices Code
  • 13. Who is this? Christopher Graham, Information Commissioner
  • 14. 2005 ICO employment practices code
  • 15. Data Protection – a brief history Late 1960s First electronic messaging 1984 Original Data Protection law (minimal impact) 1998 Data Protection Act 2005 Employment Practices Code 2007 ICO Personal Data guidance
  • 16. 2007 ICO Personal Data Guidance
  • 17. Data Protection – a brief history Late 1960s First electronic messaging 1984 Original Data Protection law (minimal impact) 1998 Data Protection Act 2005 Employment Practices Code 2010 Sanctions increase to £500k 2007 ICO Personal Data guidance
  • 19. Data Protection – a brief history Late 1960s First electronic messaging 1984 Original Data Protection law (minimal impact) 1998 Data Protection Act 2005 Employment Practices Code 2010 Sanctions increase to £500k 2013 ICO BYOD guidance 2007 ICO Personal Data guidance
  • 20. 2013 ICO BYOD guidance
  • 21. Data Protection – a brief history Late 1960s First electronic messaging 1984 Original Data Protection law (minimal impact) 1998 Data Protection Act TODAY Proposed General Data Protection Regulation 2005 Employment Practices Code 2010 Sanctions increase to £500k 2013 ICO BYOD guidance 2007 ICO Personal Data guidance
  • 23. Data Protection Regulation – introduction • What’s the problem? • Commission solution • Strategy • Particular measures proposed • Practical implications for now?
  • 24. Data protection – the need for change • Change in nature and extent of processing • Globalisation Different rules in different states Cloud • Employment context volume free-form data
  • 25. Commission solution – a Data Protection Regulation • What is a regulation? • Aim one-stop shop greater legal certainty - and consistency throughout EU reduction of administrative burden strengthened data subject rights efficiency of supervision and enforcement • And “it will save money” – not just red tape
  • 26. Strategy proposed • Strategy similar to current rules....but more stricter data protection principles more specific and granular obligations more extensive individual rights...right to be forgotten... Backed up by tougher enforcement – fines of 2% of global turnover
  • 27. Policy, process...and documentation (1) • Internal documentation adopt policies implement measures to ensure compliance with policies be able to demonstrate compliance if appropriate establish an audit
  • 28. Policy, process...and documentation (2) • Documentation for data subjects Extensive information including > purposes of processing > if justified by "legitimate interests" ...what those interests are > data subject rights and how to complain > who gets to see it ....recipients > If data does not come from data subject, who the source is
  • 29. Policy, process...and documentation (3) • Very granular..... underscored by new data protection principle for each processing operation, controller must ensure and demonstrate compliance • Lots of paper .....but does it protect privacy?
  • 30. Right to be forgotten • Right to have personal data erased if no longer necessary in relation to purposes for which collected consent withdrawn expiry of retention period processing is non- compliant
  • 31. Right to be forgotten • If personal data has been made public, controller shall take all reasonable steps to tell third parties • Controller may restrict where issue over accuracy data needed for purposes of proof (evidence of business operations)
  • 32. Data security (1) • Controller and processor must do risk assessment implement technical and organisations measures to ensure security • "Personal data breach" means breach of security .... leading to accidental or unlawful destruction, loss or alteration unauthorised disclosure
  • 33. Data security (2) • Duty to notify • Duty to document breaches • If breach is likely to affect privacy of data subjects, controller must tell data subject of breach and what it is doing
  • 34. Data protection by design • "Data protection by design" ...if developing business in ways that impinge on personal data (e.g. a new HR system) implement to ensure compliance (having regard to cost and technology) ensure that by default system > only processes data necessary for purpose > does not collect too much > does not store too long > controls
  • 35. Data protection officer • Controller and processor must establish a DPO if 250 employees or more • What are the roles/functions of a DPO?
  • 36. Data protection officer • Controller and processor must establish a DPO if 250 employees or more • What are the roles/functions of a DPO?
  • 37. Data protection officer Monitoring data protection breaches Contact point for supervisory authority Informing controller and processor of obligations under DPR (and documenting) Monitoring implementation of policies (including audit and training) Ensuring documentation is maintained Monitoring protection by design and security Monitoring data protection impact assessment
  • 38. Remedies and sanctions • Up to 2% of turnover • Enforcement by "main establishment" regulator In EU - where purposes of processing determined or, if not, where main processing takes place If not established in EU, must appoint a "representative"
  • 39. Special rules on employment • Regulation allows members states to adopt special rules for employment....but upwards only Extra conditions for processing Regulatory consent? Works Council approval? • Defeats "one-stop" shop?
  • 40. What to do now? • Proposals will change............ • Share your thoughts with MoJ? • Processing operations identify and record consider how you comply • Establish extent to which you use "consent" to justify processing...and find other ways