SlideShare a Scribd company logo
1 of 36
Download to read offline
In-house lawyer and
decision makers’ forum
Data Protection Breakfast
Thursday, 12 September 2013
Introduction and Welcome
Susie Dryden
Partner
Blake Lapthorn
susie.dryden@bllaw.co.uk
Data Protection seminar
Recognising personal data and anonymisation
Overseas transfers of personal data and the cloud
Electronic marketing and cookies
Apps, social media and BYOD
The new Data Protection Regulation
Short case studies
Recognising ‘Personal Data’
Why is this relevant?
The Data Protection Act 1998 (Act) will not be engaged if
you are not processing personal data
What is personal data?
First, establish if the information is ‘data’. There are four
categories of data:
– Automatically processed data or data recorded with the
intention that it will be so processed
– Data forming part of a ‘relevant filing system’
– Data forming part of an ‘accessible record’
– Data recorded by a public authority
Recognising Personal Data (2)
Secondly, establish if the data is ‘personal data’:
– Defined in s1 (1) of the Act as:
“Data which relate to a living individual who can be identified:
(a) from those data; or
(b) from those data and other information which is in the
possession of, or is likely to come into the possession of, the
data controller”.
– “Living Individual”
– “Individual”
Recognising ‘Personal Data’ (3)
Examples of personal data include:
– Addresses, telephone numbers, job titles and dates of birth
– Expressions of opinions about an individual
– Indications of the intentions of the data controller or any
other person in respect of the individual.
Sensitive personal data
Anonymised data is not personal data……
Recognising ‘Personal Data’ (4)
Anonymisation
Why are we talking about anonymised data?
Release of anonymised data can have:
– Commercial benefit
– Public benefit
– Academic research benefits
DPA does not apply to the anonymised data but DOES
apply to processing the source data to anonymise it
Anonymisation (2)
What is it?
Anonymised data is data that does not relate to any
individual and is unlikely to allow any individual to be
identified through its combination with other data at the
point of transfer to another party
Generally applied to large datasets rather than
pseudonymising individual pieces of information
Anonymisation (3)
How do we go about creating it?
Wide number of anonymisation techniques
Consent generally not required
Document your process – aim for transparency
Must address risk of re-identification
Have an on-going governance structure
Public authorities need to remember:
Application of FOIA
Human rights
What happens if re-identification happens?
You will become a data controller
ICO likely to take enforcement action against
person re-identifying
Overseas Transfers of Personal Data
Due to the continued globalisation of trade and ever
increasingly connected world, record amounts of customer
and employee data now are transferred overseas from the
UK
Growth in cloud computing has also had a large impact
(often unknown to those who utilise its benefits)
As usual, the Act has something to say - 8th Principle:
“Personal data shall not be transferred to a country or territory
outside the European Economic Area (EEA) unless that country or
territory ensures an adequate level of protection for the rights and
freedoms of data subjects in relation to the processing of personal
data.”
Is there a transfer? Two questions to consider:
1. Is the country of the transferee of personal data outside the EEA?
2. Does the transmission in question actually amounts to a transfer?
What is a ‘transfer’? Transfer or Transit?
Examples from ICO:
– (1) A company in the UK uses a centralised human resources system
in the US belonging to its parent company to store information about
its employees – TRANSFER
– (2) Personal data is transferred from the UK to Germany via a server
in Switzerland, which does not access or manipulate the information
while it is in Switzerland – TRANSIT
Overseas Transfers of Personal Data (2)
A five step “good practice” approach should be considered:
1. Is there is a transfer of personal data to a third country?
2. Is the transfer necessary?
3. Does the third country ensure an adequate level of
protection to data being transferred?
4. Consider whether the parties have, or can put in place,
adequate safeguards to protect the data
5. Consider if any of the other derogations to the 8th principle
apply
Overseas Transfers of Personal Data (3)
Adequacy
If there will be a transfer to a third country, you need to
consider whether the third country ensures an adequate
level of protection.
Finding of adequacy normally based on a Community
finding or a positive outcome when applying the adequacy
test:
– “Community finding”: where the European Commission makes
a finding that a country outside the EEA has an adequate
level of protection. A list can be found on the ICO website.
– “Adequacy test”: where there is no Commission finding, a
data exporter can assess the general adequacy itself.
Overseas Transfers of Personal Data (4)
Model clauses
You can use model contractual clauses to transfer data
which have been approved by the European Commission
Various sets available – controller to controller and
controller to processor
Binding Corporate Rules
Only available to multinational corporations looking to
transfer data around world
One data protection authority takes the lead and
coordinates input from others
Overseas Transfers of Personal Data (5)
What is the cloud?
The provision of a range of IT technologies and service models
on demand via a network usually delivered via the internet:
– Software as a service
– Platform as a service
– Infrastructure as a service
Generally provided by a third party or parties hosting resources
and data across a number of servers and/or for a number of
customers
Causes lot of concern from a data protection perspective as:
– the servers are often based overseas outside of the EEA
– there can be difficulty working out who is responsible for what
security controls
– data can be stored across a number of servers on a
continually changing basis
The Cloud
The Cloud (2)
If you are the data controller using a cloud provisioned
service:
You must check where any data is going to be stored and, if not in the
EEA, ensure that you meet one or more of the conditions required
before data can be transferred outside of the EEA
You will be responsible for assessing risks, informing data subjects,
putting written controls in place, monitoring, protecting and retrieving
data
Not easy when dealing with cloud providers and commonly you will also
be offered standard terms that are non-negotiable
A checklist for data protection compliance by cloud clients and cloud
providers has been issued by ICO – see Guidance on the use of cloud
computing 2012). Consider also a privacy impact assessment before
moving to the cloud.
See also ICO Personal Information Online Code of Practice (July 2012)
Electronic Marketing
To collect and use personal data for email and SMS
marketing (“electronic marketing”) there are certain steps
you should follow at the time you collect it and when you
send out messages
Collect and process the personal data fairly
Comply with the Privacy and Electronic Communications
Regulations 2003 (PECR) (as amended). In particular you
must:
– Obtain prior consent – you cannot send unsolicited electronic
marketing messages unless you have the individual’s prior consent
to do so. This strict ‘opt-in’ rule is only relaxed if three exemption
criteria are satisfied.
– Identify the sender, nature of communication etc (see (E Commerce
Regs 2002 Regs 7 & 8)) and give details of how to
revoke consent/opt out).
Exemption criteria
– You have obtained the individual’s details as part of
the sale or negotiations for sale of a product or service
to that person;
– The marketing material concerns only a similar
product or service; and
– The individual must have simple means of refusing
unsolicited marketing at the time their details are
collected and, if they do not opt-out, you must give a
simple way of doing so in every future message e.g.
unsubscribe option.
Electronic Marketing (2)
Advice:
– Recommend marketing campaigns are always
permission-based.
– Be very careful if using bought-in email lists.
– Explain clearly what a person’s details will be used for
when collecting data through an appropriate privacy
policy and seek opt-in consent when data collected.
– Provide a simple way for them to opt-out of marketing
messages.
– Have a system in place to deal with complaints.
Electronic Marketing (3)
What are they?
– From 2011 under the amended PECR you now need to (i) tell
users about them and (ii) obtain “consent” before setting most
types of cookies.
– Only set strictly necessary cookies without consent.
– But what is meant by consent?
Opt-in? e.g. pop up – “For this site to work correctly…we need
to store a small file (called a cookie) on your computer….If you
click on “OK” below we will store cookies and you can continue
using this site with full functionality….For more information read
our cookie policy” (FCA website)
Implied? e.g. pop up - “We have placed cookies on your
computer to help make this website better. You can change
your cookie settings at any time. Otherwise we’ll assume you’re
OK to continue.” (ICO website)
– ICO Guidance (May 2012 and onwards)
Cookies
BYOD – “bring your own device”
– Lots of legal issues (case study explores some of these not
just data protection)
– From a data protection perspective security is the biggest
issue – 7th Principle (and other principles too).
What happens if device lost, hacked or stolen?
Steps taken must relate to risks e.g. is sensitive personal
data available for access or storage on a “BYOD”
– Prevent unauthorised access (e.g. password on device,
encryption on device, lock out/delete data if too many
failed attempts, separate business from personal data)
– Encrypt data in transit
– Right to monitor and automatically delete data
– Employees leave
Apps, Social Media and BYOD
ICO Guidance on BYOD (March 2013)
– Carry out an internal assessment leading to implementing
BYOD policy (include an acceptable use policy and also a
social media policy if BYOD policy leads to increased use
of social media by employees)
– Need to cross refer to Employment Practices Code (e.g. re
monitoring and acceptable use policy)
Apps, Social Media and BYOD (2)
Social Media – social networking and online forums
– Growth in organisations setting up own blogs/social media
web pages/online forums
Customer reviews/feed back
School/university alumni/ae events
Charity fund-raising and volunteer sites
– If you are processing personal data for non-domestic
purposes then you will be subject to the DPA and won’t
benefit from domestic purposes (s 36) exemption
Apps, Social Media and BYOD (3)
– Need to assess in particular
Who is data controller
Ensure data accurate (4th Principle)
“Solicitors from Hell” case
– ICO Guidance (May 2013)
– Have accurate acceptable use policy
– Be clear how complaints dealt with
Apps, Social Media and BYOD (4)
Apps
– Collect personal data (location, stored data, sensor data…)8
– Process personal data
– EU’s Article 29 Working Party issued opinion WP 202 on
apps on smart devices (27 February 2013). If you are
developing or using Apps in your business you must address
the privacy issues.
Apps, Social Media and BYOD (5)
– Key privacy issues highlighted by EU
Lack of transparency on types of processing
Lack of meaningful (i.e. free and informed) consent
Poor security measures
Disregard of any purpose limitation and lack of data
minimisation (e.g. “market research” that doesn’t relate to
App at all)
– Take away: ensure privacy issues are addressed in App
development
Privacy policy
Use of cookies
Transborder issues
Security
Apps for children raise specific issues
Apps, Social Media and BYOD (6)
The New Data Protection Regulation
On 25 January 2012, the European Commission published a
proposal for a new EU Regulation. This will repeal the existing
1995 EU Data Protection Directive. In the UK this will mean all
or part of the DPA 1998 (tbd by Parliament) will be superseded
by a directly effective Regulation.
The European Commission has called for:
– An effective new data protection framework
– Clear, effective rights for individuals
– Clear responsibility and accountability
– Obligations to be focussed on processing that poses genuine risks
to individuals or societies
– Data protection authorities that are independent
– with a clearer role.
Potential changes:
– Higher fines
– Stronger data subject rights including “right to be forgotten”
– Consent (specific Article on this e.g. placing burden of proof
on data controller where consent relied on)
– More responsibility on data controllers (including those
outside the EU) including requiring data protection officers in
organisations and obligation to notify the regulator if a data
breach and then potentially tell data subjects too
The New Data Protection Regulation (2)
The Regulation should essentially be a harmonised EU
regime.
The draft Regulation will need to be approved by EU
member states and ratified by the European Parliament.
Originally to be adopted in 2014 and in effect in 2016.
But delay in legislative process due to contentious nature
of the Regulation.
The New Data Protection Regulation (3)
Note: other recent and proposed EU laws
– Regulation 611/2013 on the notification of personal data
breaches (not general - only applies to ISPs/telcos – in
force from 29 August 2013 and see also amended PECRs)
– Proposed Network and Information Security Directive
(February 2013) (potentially applies to a wide range of
companies and organisations in energy, transport, banking
and finance, health care plus e-commerce platforms, social
networks, search engines, clouder services, application
stores, payment gateways plus “public administrations”) –
obligations to guarantee security appropriate to the risk and
to tell regulator about cyber security incidents
The New Data Protection Regulation (4)
Case Study (1) (Recognising Personal Data)
A potential member of a gym meets with a sales manager
of a local gym to discuss membership options. The sales
manager asks the prospective member for certain
information (name, address, age) and records these
details manually on a ‘new membership application form’.
These details will subsequently be added to the gym’s
computer system.
Is this data? Does it matter if the information is never added to the
computer system?
Case Study (2) (Overseas Transfer of
Data/Cloud)
UK Gadgets is one of the leading suppliers of gadgets in the
UK. It has recently been bought out by a US multinational, US
Gadgets.
As part of its new reporting obligations, UK Gadgets has been asked to
send copies of all of its employee records to a third party cloud provider
(CloudCo) based in the US appointed by US Gadget’s head office in
New York to manage the multinational’s global HR database. The UK
Co will have direct access to the cloud service through web browser
and password access. In due course it will also upload updated data
direct to CloudCo. The UK data will be available for access and
processing by both the UK and US parent.
The HR director is a little concerned that if he does this, he could be in
breach of the DPA, but head office is adamant that they must be sent.
What are his options?
NB: This case study assumes that the other Data Protection principles have
been complied with and that the data does not consist of 'sensitive' personal
data where consent to transfer may need to be obtained.
Case Study (3) (Electronic Marketing)
Please tick here if you do not want us to contact you by
electronic means (e-mail or SMS) with information about
goods and services which we feel may be of interest to
you.
Is this acceptable?
Case Study (4) (Apps/BYOD/Social Media)
After considerable internal debate amongst the IT director,
HR director and head of sales and marketing at Way
Ahead law firm, the Board decide to allow legal staff to
utilise their own smart phones and tablets for work
purposes.
What should Way Ahead do to minimise risks?
Contact Details
Sheilah Mackie, Partner, Commercial/IT
02380 857039
sheilah.mackie@bllaw.co.uk
Simon Stokes, Partner, Commercial/IT
0207 814 5482
simon.stokes@bllaw.co.uk

More Related Content

What's hot

General data protection
General data protectionGeneral data protection
General data protectionBrijeshR3
 
Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)Zoodikers
 
Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPRDipanjanDey12
 
Teradata's approach to addressing GDPR
Teradata's approach to addressing GDPRTeradata's approach to addressing GDPR
Teradata's approach to addressing GDPRPaul O'Carroll
 
GDPR: the legal aspects. By Matthias of theJurists Europe.
GDPR: the legal aspects. By Matthias of theJurists Europe.GDPR: the legal aspects. By Matthias of theJurists Europe.
GDPR: the legal aspects. By Matthias of theJurists Europe.Matthias Dobbelaere-Welvaert
 
Gdpr action plan - ISSA
Gdpr action plan - ISSAGdpr action plan - ISSA
Gdpr action plan - ISSAUlf Mattsson
 
GDPR- GENERAL DATA PROTECTION REGULATION
GDPR- GENERAL DATA PROTECTION REGULATIONGDPR- GENERAL DATA PROTECTION REGULATION
GDPR- GENERAL DATA PROTECTION REGULATIONSaurabh Pandey
 
The principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - ukThe principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - uk- Mark - Fullbright
 
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada SymposiumImpact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada SymposiumConstantine Karbaliotis
 
EU GDPR(general data protection regulation)
EU GDPR(general data protection regulation)EU GDPR(general data protection regulation)
EU GDPR(general data protection regulation)RAKESH S
 
How IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationHow IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationIBM Security
 
General Data Protection Regulation for Ops
General Data Protection Regulation for OpsGeneral Data Protection Regulation for Ops
General Data Protection Regulation for OpsKamil Rextin
 
GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?Frederick Penaud
 
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...Brian Miller, Solicitor
 

What's hot (20)

General data protection
General data protectionGeneral data protection
General data protection
 
GDPR for Dummies
GDPR for DummiesGDPR for Dummies
GDPR for Dummies
 
The GDPR for Techies
The GDPR for TechiesThe GDPR for Techies
The GDPR for Techies
 
Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)
 
Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPR
 
Teradata's approach to addressing GDPR
Teradata's approach to addressing GDPRTeradata's approach to addressing GDPR
Teradata's approach to addressing GDPR
 
GDPR-Overview
GDPR-OverviewGDPR-Overview
GDPR-Overview
 
GDPR: the legal aspects. By Matthias of theJurists Europe.
GDPR: the legal aspects. By Matthias of theJurists Europe.GDPR: the legal aspects. By Matthias of theJurists Europe.
GDPR: the legal aspects. By Matthias of theJurists Europe.
 
Gdpr action plan - ISSA
Gdpr action plan - ISSAGdpr action plan - ISSA
Gdpr action plan - ISSA
 
GDPR- GENERAL DATA PROTECTION REGULATION
GDPR- GENERAL DATA PROTECTION REGULATIONGDPR- GENERAL DATA PROTECTION REGULATION
GDPR- GENERAL DATA PROTECTION REGULATION
 
The principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - ukThe principles of the Data Protection Act in detail - uk
The principles of the Data Protection Act in detail - uk
 
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada SymposiumImpact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
 
EU GDPR(general data protection regulation)
EU GDPR(general data protection regulation)EU GDPR(general data protection regulation)
EU GDPR(general data protection regulation)
 
How IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationHow IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity Legislation
 
General Data Protection Regulation for Ops
General Data Protection Regulation for OpsGeneral Data Protection Regulation for Ops
General Data Protection Regulation for Ops
 
Privacy Access Letter I Feb 5 07
Privacy Access Letter I   Feb 5 07Privacy Access Letter I   Feb 5 07
Privacy Access Letter I Feb 5 07
 
Gdpr action plan
Gdpr action plan Gdpr action plan
Gdpr action plan
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?GDPR security services - Areyou ready ?
GDPR security services - Areyou ready ?
 
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
 

Viewers also liked

Annual employment law update
Annual employment law updateAnnual employment law update
Annual employment law updateBlake Morgan
 
Agency Workers Directive seminar
Agency Workers Directive seminarAgency Workers Directive seminar
Agency Workers Directive seminarBlake Morgan
 
Blake Lapthorn green breakfast with Rapanui - 17 April 2013
Blake Lapthorn green breakfast with Rapanui - 17 April 2013Blake Lapthorn green breakfast with Rapanui - 17 April 2013
Blake Lapthorn green breakfast with Rapanui - 17 April 2013Blake Morgan
 
Real Estate seminar 21 May 2010
Real Estate seminar 21 May 2010Real Estate seminar 21 May 2010
Real Estate seminar 21 May 2010Blake Morgan
 
Blake Lapthorn's Rural Breakfast Slides 2014
Blake Lapthorn's Rural Breakfast Slides 2014Blake Lapthorn's Rural Breakfast Slides 2014
Blake Lapthorn's Rural Breakfast Slides 2014Blake Morgan
 
Blake Lapthorn's Thames Valley HR forum - 21 may 2013
Blake Lapthorn's Thames Valley HR forum - 21 may 2013Blake Lapthorn's Thames Valley HR forum - 21 may 2013
Blake Lapthorn's Thames Valley HR forum - 21 may 2013Blake Morgan
 

Viewers also liked (6)

Annual employment law update
Annual employment law updateAnnual employment law update
Annual employment law update
 
Agency Workers Directive seminar
Agency Workers Directive seminarAgency Workers Directive seminar
Agency Workers Directive seminar
 
Blake Lapthorn green breakfast with Rapanui - 17 April 2013
Blake Lapthorn green breakfast with Rapanui - 17 April 2013Blake Lapthorn green breakfast with Rapanui - 17 April 2013
Blake Lapthorn green breakfast with Rapanui - 17 April 2013
 
Real Estate seminar 21 May 2010
Real Estate seminar 21 May 2010Real Estate seminar 21 May 2010
Real Estate seminar 21 May 2010
 
Blake Lapthorn's Rural Breakfast Slides 2014
Blake Lapthorn's Rural Breakfast Slides 2014Blake Lapthorn's Rural Breakfast Slides 2014
Blake Lapthorn's Rural Breakfast Slides 2014
 
Blake Lapthorn's Thames Valley HR forum - 21 may 2013
Blake Lapthorn's Thames Valley HR forum - 21 may 2013Blake Lapthorn's Thames Valley HR forum - 21 may 2013
Blake Lapthorn's Thames Valley HR forum - 21 may 2013
 

Similar to Blake Lapthorn's In-House Lawyer and Decision Maker's forum - 12 September 2013

The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowSymantec
 
The Evolution of Data Privacy: 3 Things You Need To Consider
The Evolution of Data Privacy:  3 Things You Need To ConsiderThe Evolution of Data Privacy:  3 Things You Need To Consider
The Evolution of Data Privacy: 3 Things You Need To ConsiderSymantec
 
Lasa European NFP Technology Conference 2010 - Data protection and the cloud
Lasa European NFP Technology Conference 2010 - Data protection and the cloudLasa European NFP Technology Conference 2010 - Data protection and the cloud
Lasa European NFP Technology Conference 2010 - Data protection and the cloudukriders
 
CyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRCyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRShadi A. Razak
 
Automatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy StandardsAutomatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy Standardsautomatskicorporation
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Lumension
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-finalDr. Donald Macfarlane
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalDr. Donald Macfarlane
 
What's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesWhat's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesOgilvy Consulting
 
CyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRCyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRIryna Chekanava
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...Symantec
 
Data protection For CYP Organisations
Data protection For CYP OrganisationsData protection For CYP Organisations
Data protection For CYP OrganisationsCliff Ashcroft
 
9 Practical Steps 2 GDPR Compliance
9 Practical Steps 2 GDPR Compliance9 Practical Steps 2 GDPR Compliance
9 Practical Steps 2 GDPR ComplianceAndreas Batsis
 
Are you preparing for GDPR?
Are you preparing for GDPR?Are you preparing for GDPR?
Are you preparing for GDPR?Chris Bullock
 
The EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organizationThe EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organizationSophos Benelux
 
Privacy by design for peerlyst meetup
Privacy by design for peerlyst meetupPrivacy by design for peerlyst meetup
Privacy by design for peerlyst meetupIshay Tentser
 
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018Human Capital Department
 
Kawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the CloudKawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the CloudGurbir Singh
 

Similar to Blake Lapthorn's In-House Lawyer and Decision Maker's forum - 12 September 2013 (20)

The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t know
 
The Evolution of Data Privacy: 3 Things You Need To Consider
The Evolution of Data Privacy:  3 Things You Need To ConsiderThe Evolution of Data Privacy:  3 Things You Need To Consider
The Evolution of Data Privacy: 3 Things You Need To Consider
 
Lasa European NFP Technology Conference 2010 - Data protection and the cloud
Lasa European NFP Technology Conference 2010 - Data protection and the cloudLasa European NFP Technology Conference 2010 - Data protection and the cloud
Lasa European NFP Technology Conference 2010 - Data protection and the cloud
 
CyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPRCyNation - 7 things you should know about EU-GDPR
CyNation - 7 things you should know about EU-GDPR
 
Automatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy StandardsAutomatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy Standards
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
What's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesWhat's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) Changes
 
CyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPRCyNation: 7 Things You Should Know about EU GDPR
CyNation: 7 Things You Should Know about EU GDPR
 
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...The Evolution of Data Privacy - A Symantec Information Security Perspective o...
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
 
Data protection For CYP Organisations
Data protection For CYP OrganisationsData protection For CYP Organisations
Data protection For CYP Organisations
 
9 Practical Steps 2 GDPR Compliance
9 Practical Steps 2 GDPR Compliance9 Practical Steps 2 GDPR Compliance
9 Practical Steps 2 GDPR Compliance
 
Are you preparing for GDPR?
Are you preparing for GDPR?Are you preparing for GDPR?
Are you preparing for GDPR?
 
The EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organizationThe EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organization
 
Privacy by design for peerlyst meetup
Privacy by design for peerlyst meetupPrivacy by design for peerlyst meetup
Privacy by design for peerlyst meetup
 
Are You Prepared for the GDPR?
Are You Prepared for the GDPR?Are You Prepared for the GDPR?
Are You Prepared for the GDPR?
 
GDPR (En) JM Tyszka
GDPR (En)  JM TyszkaGDPR (En)  JM Tyszka
GDPR (En) JM Tyszka
 
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
 
Kawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the CloudKawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the Cloud
 

More from Blake Morgan

The Walter Lilly case - some harsh lessons learnt - construction update semin...
The Walter Lilly case - some harsh lessons learnt - construction update semin...The Walter Lilly case - some harsh lessons learnt - construction update semin...
The Walter Lilly case - some harsh lessons learnt - construction update semin...Blake Morgan
 
The demise of the Code for Sustainable Homes - construction update seminar - ...
The demise of the Code for Sustainable Homes - construction update seminar - ...The demise of the Code for Sustainable Homes - construction update seminar - ...
The demise of the Code for Sustainable Homes - construction update seminar - ...Blake Morgan
 
Overheating in UK dwellings - construction update seminar - 5 November 2014
Overheating in UK dwellings - construction update seminar - 5 November 2014Overheating in UK dwellings - construction update seminar - 5 November 2014
Overheating in UK dwellings - construction update seminar - 5 November 2014Blake Morgan
 
Blake Lapthorn's London Pensions conference 19 March 2014
Blake Lapthorn's London Pensions conference 19 March 2014Blake Lapthorn's London Pensions conference 19 March 2014
Blake Lapthorn's London Pensions conference 19 March 2014Blake Morgan
 
Blake Lapthorn's In-House Lawyer and Decision Makers' forum - 'Health & Safet...
Blake Lapthorn's In-House Lawyer and Decision Makers' forum - 'Health & Safet...Blake Lapthorn's In-House Lawyer and Decision Makers' forum - 'Health & Safet...
Blake Lapthorn's In-House Lawyer and Decision Makers' forum - 'Health & Safet...Blake Morgan
 
Blake Lapthorn's green breakfast with the Environment Bank
Blake Lapthorn's green breakfast with the Environment BankBlake Lapthorn's green breakfast with the Environment Bank
Blake Lapthorn's green breakfast with the Environment BankBlake Morgan
 
Blake Lapthorn green breakfast with BRE global
Blake Lapthorn green breakfast with BRE globalBlake Lapthorn green breakfast with BRE global
Blake Lapthorn green breakfast with BRE globalBlake Morgan
 
Blake Lapthorn green breakfast with Dr. Barbara Hammond of the Osney Lock Hyd...
Blake Lapthorn green breakfast with Dr. Barbara Hammond of the Osney Lock Hyd...Blake Lapthorn green breakfast with Dr. Barbara Hammond of the Osney Lock Hyd...
Blake Lapthorn green breakfast with Dr. Barbara Hammond of the Osney Lock Hyd...Blake Morgan
 
Blake Lapthorn green breakfast with The Green Blue - 19 November 2013
Blake Lapthorn green breakfast with The Green Blue - 19 November 2013Blake Lapthorn green breakfast with The Green Blue - 19 November 2013
Blake Lapthorn green breakfast with The Green Blue - 19 November 2013Blake Morgan
 
Blake Lapthorn's green breakfast with guest speaker Keeran Jugdoyal, Faithful...
Blake Lapthorn's green breakfast with guest speaker Keeran Jugdoyal, Faithful...Blake Lapthorn's green breakfast with guest speaker Keeran Jugdoyal, Faithful...
Blake Lapthorn's green breakfast with guest speaker Keeran Jugdoyal, Faithful...Blake Morgan
 
Blake Lapthorn green breakfast with URS Global
Blake Lapthorn green breakfast with URS GlobalBlake Lapthorn green breakfast with URS Global
Blake Lapthorn green breakfast with URS GlobalBlake Morgan
 
Blake Lapthorn green breakfast with Seacourt Printing Ltd - 16 October 2013
Blake Lapthorn green breakfast with Seacourt Printing Ltd - 16 October 2013Blake Lapthorn green breakfast with Seacourt Printing Ltd - 16 October 2013
Blake Lapthorn green breakfast with Seacourt Printing Ltd - 16 October 2013Blake Morgan
 
Blake Lapthorn green breakfast with Rapanui - 18 September 2013
Blake Lapthorn green breakfast with Rapanui - 18 September 2013Blake Lapthorn green breakfast with Rapanui - 18 September 2013
Blake Lapthorn green breakfast with Rapanui - 18 September 2013Blake Morgan
 
Blake Lapthorn's In-House Lawyer and Decision Makers' forum
Blake Lapthorn's In-House Lawyer and Decision Makers' forumBlake Lapthorn's In-House Lawyer and Decision Makers' forum
Blake Lapthorn's In-House Lawyer and Decision Makers' forumBlake Morgan
 
Blake Lapthorn's Thames Valley HR forum - 10 September 2013
Blake Lapthorn's Thames Valley HR forum - 10 September 2013Blake Lapthorn's Thames Valley HR forum - 10 September 2013
Blake Lapthorn's Thames Valley HR forum - 10 September 2013Blake Morgan
 
Blake Lapthorn Academies conference, Southampton - 18 June 2013
Blake Lapthorn Academies conference, Southampton - 18 June 2013Blake Lapthorn Academies conference, Southampton - 18 June 2013
Blake Lapthorn Academies conference, Southampton - 18 June 2013Blake Morgan
 
Blake Lapthorn green breakfast with Mike Putnam, Skanska UK - 8 May 2013
Blake Lapthorn green breakfast with Mike Putnam, Skanska UK - 8 May 2013Blake Lapthorn green breakfast with Mike Putnam, Skanska UK - 8 May 2013
Blake Lapthorn green breakfast with Mike Putnam, Skanska UK - 8 May 2013Blake Morgan
 
Blake Lapthorn and Hays Recruitment - Auto-enrolment seminar - 25 April 2013
Blake Lapthorn and Hays Recruitment - Auto-enrolment seminar - 25 April 2013Blake Lapthorn and Hays Recruitment - Auto-enrolment seminar - 25 April 2013
Blake Lapthorn and Hays Recruitment - Auto-enrolment seminar - 25 April 2013Blake Morgan
 
Blake Lapthorn Corporate seminar: SME's: planning today for tomorrow - 22 Apr...
Blake Lapthorn Corporate seminar: SME's: planning today for tomorrow - 22 Apr...Blake Lapthorn Corporate seminar: SME's: planning today for tomorrow - 22 Apr...
Blake Lapthorn Corporate seminar: SME's: planning today for tomorrow - 22 Apr...Blake Morgan
 
Blake Lapthorn’s green breakfast seminar on Social Finance - 27 March 13
Blake Lapthorn’s green breakfast seminar on Social Finance - 27 March 13Blake Lapthorn’s green breakfast seminar on Social Finance - 27 March 13
Blake Lapthorn’s green breakfast seminar on Social Finance - 27 March 13Blake Morgan
 

More from Blake Morgan (20)

The Walter Lilly case - some harsh lessons learnt - construction update semin...
The Walter Lilly case - some harsh lessons learnt - construction update semin...The Walter Lilly case - some harsh lessons learnt - construction update semin...
The Walter Lilly case - some harsh lessons learnt - construction update semin...
 
The demise of the Code for Sustainable Homes - construction update seminar - ...
The demise of the Code for Sustainable Homes - construction update seminar - ...The demise of the Code for Sustainable Homes - construction update seminar - ...
The demise of the Code for Sustainable Homes - construction update seminar - ...
 
Overheating in UK dwellings - construction update seminar - 5 November 2014
Overheating in UK dwellings - construction update seminar - 5 November 2014Overheating in UK dwellings - construction update seminar - 5 November 2014
Overheating in UK dwellings - construction update seminar - 5 November 2014
 
Blake Lapthorn's London Pensions conference 19 March 2014
Blake Lapthorn's London Pensions conference 19 March 2014Blake Lapthorn's London Pensions conference 19 March 2014
Blake Lapthorn's London Pensions conference 19 March 2014
 
Blake Lapthorn's In-House Lawyer and Decision Makers' forum - 'Health & Safet...
Blake Lapthorn's In-House Lawyer and Decision Makers' forum - 'Health & Safet...Blake Lapthorn's In-House Lawyer and Decision Makers' forum - 'Health & Safet...
Blake Lapthorn's In-House Lawyer and Decision Makers' forum - 'Health & Safet...
 
Blake Lapthorn's green breakfast with the Environment Bank
Blake Lapthorn's green breakfast with the Environment BankBlake Lapthorn's green breakfast with the Environment Bank
Blake Lapthorn's green breakfast with the Environment Bank
 
Blake Lapthorn green breakfast with BRE global
Blake Lapthorn green breakfast with BRE globalBlake Lapthorn green breakfast with BRE global
Blake Lapthorn green breakfast with BRE global
 
Blake Lapthorn green breakfast with Dr. Barbara Hammond of the Osney Lock Hyd...
Blake Lapthorn green breakfast with Dr. Barbara Hammond of the Osney Lock Hyd...Blake Lapthorn green breakfast with Dr. Barbara Hammond of the Osney Lock Hyd...
Blake Lapthorn green breakfast with Dr. Barbara Hammond of the Osney Lock Hyd...
 
Blake Lapthorn green breakfast with The Green Blue - 19 November 2013
Blake Lapthorn green breakfast with The Green Blue - 19 November 2013Blake Lapthorn green breakfast with The Green Blue - 19 November 2013
Blake Lapthorn green breakfast with The Green Blue - 19 November 2013
 
Blake Lapthorn's green breakfast with guest speaker Keeran Jugdoyal, Faithful...
Blake Lapthorn's green breakfast with guest speaker Keeran Jugdoyal, Faithful...Blake Lapthorn's green breakfast with guest speaker Keeran Jugdoyal, Faithful...
Blake Lapthorn's green breakfast with guest speaker Keeran Jugdoyal, Faithful...
 
Blake Lapthorn green breakfast with URS Global
Blake Lapthorn green breakfast with URS GlobalBlake Lapthorn green breakfast with URS Global
Blake Lapthorn green breakfast with URS Global
 
Blake Lapthorn green breakfast with Seacourt Printing Ltd - 16 October 2013
Blake Lapthorn green breakfast with Seacourt Printing Ltd - 16 October 2013Blake Lapthorn green breakfast with Seacourt Printing Ltd - 16 October 2013
Blake Lapthorn green breakfast with Seacourt Printing Ltd - 16 October 2013
 
Blake Lapthorn green breakfast with Rapanui - 18 September 2013
Blake Lapthorn green breakfast with Rapanui - 18 September 2013Blake Lapthorn green breakfast with Rapanui - 18 September 2013
Blake Lapthorn green breakfast with Rapanui - 18 September 2013
 
Blake Lapthorn's In-House Lawyer and Decision Makers' forum
Blake Lapthorn's In-House Lawyer and Decision Makers' forumBlake Lapthorn's In-House Lawyer and Decision Makers' forum
Blake Lapthorn's In-House Lawyer and Decision Makers' forum
 
Blake Lapthorn's Thames Valley HR forum - 10 September 2013
Blake Lapthorn's Thames Valley HR forum - 10 September 2013Blake Lapthorn's Thames Valley HR forum - 10 September 2013
Blake Lapthorn's Thames Valley HR forum - 10 September 2013
 
Blake Lapthorn Academies conference, Southampton - 18 June 2013
Blake Lapthorn Academies conference, Southampton - 18 June 2013Blake Lapthorn Academies conference, Southampton - 18 June 2013
Blake Lapthorn Academies conference, Southampton - 18 June 2013
 
Blake Lapthorn green breakfast with Mike Putnam, Skanska UK - 8 May 2013
Blake Lapthorn green breakfast with Mike Putnam, Skanska UK - 8 May 2013Blake Lapthorn green breakfast with Mike Putnam, Skanska UK - 8 May 2013
Blake Lapthorn green breakfast with Mike Putnam, Skanska UK - 8 May 2013
 
Blake Lapthorn and Hays Recruitment - Auto-enrolment seminar - 25 April 2013
Blake Lapthorn and Hays Recruitment - Auto-enrolment seminar - 25 April 2013Blake Lapthorn and Hays Recruitment - Auto-enrolment seminar - 25 April 2013
Blake Lapthorn and Hays Recruitment - Auto-enrolment seminar - 25 April 2013
 
Blake Lapthorn Corporate seminar: SME's: planning today for tomorrow - 22 Apr...
Blake Lapthorn Corporate seminar: SME's: planning today for tomorrow - 22 Apr...Blake Lapthorn Corporate seminar: SME's: planning today for tomorrow - 22 Apr...
Blake Lapthorn Corporate seminar: SME's: planning today for tomorrow - 22 Apr...
 
Blake Lapthorn’s green breakfast seminar on Social Finance - 27 March 13
Blake Lapthorn’s green breakfast seminar on Social Finance - 27 March 13Blake Lapthorn’s green breakfast seminar on Social Finance - 27 March 13
Blake Lapthorn’s green breakfast seminar on Social Finance - 27 March 13
 

Recently uploaded

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 

Recently uploaded (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 

Blake Lapthorn's In-House Lawyer and Decision Maker's forum - 12 September 2013

  • 1. In-house lawyer and decision makers’ forum Data Protection Breakfast Thursday, 12 September 2013
  • 2. Introduction and Welcome Susie Dryden Partner Blake Lapthorn susie.dryden@bllaw.co.uk
  • 3. Data Protection seminar Recognising personal data and anonymisation Overseas transfers of personal data and the cloud Electronic marketing and cookies Apps, social media and BYOD The new Data Protection Regulation Short case studies
  • 4. Recognising ‘Personal Data’ Why is this relevant? The Data Protection Act 1998 (Act) will not be engaged if you are not processing personal data
  • 5. What is personal data? First, establish if the information is ‘data’. There are four categories of data: – Automatically processed data or data recorded with the intention that it will be so processed – Data forming part of a ‘relevant filing system’ – Data forming part of an ‘accessible record’ – Data recorded by a public authority Recognising Personal Data (2)
  • 6. Secondly, establish if the data is ‘personal data’: – Defined in s1 (1) of the Act as: “Data which relate to a living individual who can be identified: (a) from those data; or (b) from those data and other information which is in the possession of, or is likely to come into the possession of, the data controller”. – “Living Individual” – “Individual” Recognising ‘Personal Data’ (3)
  • 7. Examples of personal data include: – Addresses, telephone numbers, job titles and dates of birth – Expressions of opinions about an individual – Indications of the intentions of the data controller or any other person in respect of the individual. Sensitive personal data Anonymised data is not personal data…… Recognising ‘Personal Data’ (4)
  • 8. Anonymisation Why are we talking about anonymised data? Release of anonymised data can have: – Commercial benefit – Public benefit – Academic research benefits DPA does not apply to the anonymised data but DOES apply to processing the source data to anonymise it
  • 9. Anonymisation (2) What is it? Anonymised data is data that does not relate to any individual and is unlikely to allow any individual to be identified through its combination with other data at the point of transfer to another party Generally applied to large datasets rather than pseudonymising individual pieces of information
  • 10. Anonymisation (3) How do we go about creating it? Wide number of anonymisation techniques Consent generally not required Document your process – aim for transparency Must address risk of re-identification Have an on-going governance structure Public authorities need to remember: Application of FOIA Human rights What happens if re-identification happens? You will become a data controller ICO likely to take enforcement action against person re-identifying
  • 11. Overseas Transfers of Personal Data Due to the continued globalisation of trade and ever increasingly connected world, record amounts of customer and employee data now are transferred overseas from the UK Growth in cloud computing has also had a large impact (often unknown to those who utilise its benefits) As usual, the Act has something to say - 8th Principle: “Personal data shall not be transferred to a country or territory outside the European Economic Area (EEA) unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data.”
  • 12. Is there a transfer? Two questions to consider: 1. Is the country of the transferee of personal data outside the EEA? 2. Does the transmission in question actually amounts to a transfer? What is a ‘transfer’? Transfer or Transit? Examples from ICO: – (1) A company in the UK uses a centralised human resources system in the US belonging to its parent company to store information about its employees – TRANSFER – (2) Personal data is transferred from the UK to Germany via a server in Switzerland, which does not access or manipulate the information while it is in Switzerland – TRANSIT Overseas Transfers of Personal Data (2)
  • 13. A five step “good practice” approach should be considered: 1. Is there is a transfer of personal data to a third country? 2. Is the transfer necessary? 3. Does the third country ensure an adequate level of protection to data being transferred? 4. Consider whether the parties have, or can put in place, adequate safeguards to protect the data 5. Consider if any of the other derogations to the 8th principle apply Overseas Transfers of Personal Data (3)
  • 14. Adequacy If there will be a transfer to a third country, you need to consider whether the third country ensures an adequate level of protection. Finding of adequacy normally based on a Community finding or a positive outcome when applying the adequacy test: – “Community finding”: where the European Commission makes a finding that a country outside the EEA has an adequate level of protection. A list can be found on the ICO website. – “Adequacy test”: where there is no Commission finding, a data exporter can assess the general adequacy itself. Overseas Transfers of Personal Data (4)
  • 15. Model clauses You can use model contractual clauses to transfer data which have been approved by the European Commission Various sets available – controller to controller and controller to processor Binding Corporate Rules Only available to multinational corporations looking to transfer data around world One data protection authority takes the lead and coordinates input from others Overseas Transfers of Personal Data (5)
  • 16. What is the cloud? The provision of a range of IT technologies and service models on demand via a network usually delivered via the internet: – Software as a service – Platform as a service – Infrastructure as a service Generally provided by a third party or parties hosting resources and data across a number of servers and/or for a number of customers Causes lot of concern from a data protection perspective as: – the servers are often based overseas outside of the EEA – there can be difficulty working out who is responsible for what security controls – data can be stored across a number of servers on a continually changing basis The Cloud
  • 17. The Cloud (2) If you are the data controller using a cloud provisioned service: You must check where any data is going to be stored and, if not in the EEA, ensure that you meet one or more of the conditions required before data can be transferred outside of the EEA You will be responsible for assessing risks, informing data subjects, putting written controls in place, monitoring, protecting and retrieving data Not easy when dealing with cloud providers and commonly you will also be offered standard terms that are non-negotiable A checklist for data protection compliance by cloud clients and cloud providers has been issued by ICO – see Guidance on the use of cloud computing 2012). Consider also a privacy impact assessment before moving to the cloud. See also ICO Personal Information Online Code of Practice (July 2012)
  • 18. Electronic Marketing To collect and use personal data for email and SMS marketing (“electronic marketing”) there are certain steps you should follow at the time you collect it and when you send out messages Collect and process the personal data fairly Comply with the Privacy and Electronic Communications Regulations 2003 (PECR) (as amended). In particular you must: – Obtain prior consent – you cannot send unsolicited electronic marketing messages unless you have the individual’s prior consent to do so. This strict ‘opt-in’ rule is only relaxed if three exemption criteria are satisfied. – Identify the sender, nature of communication etc (see (E Commerce Regs 2002 Regs 7 & 8)) and give details of how to revoke consent/opt out).
  • 19. Exemption criteria – You have obtained the individual’s details as part of the sale or negotiations for sale of a product or service to that person; – The marketing material concerns only a similar product or service; and – The individual must have simple means of refusing unsolicited marketing at the time their details are collected and, if they do not opt-out, you must give a simple way of doing so in every future message e.g. unsubscribe option. Electronic Marketing (2)
  • 20. Advice: – Recommend marketing campaigns are always permission-based. – Be very careful if using bought-in email lists. – Explain clearly what a person’s details will be used for when collecting data through an appropriate privacy policy and seek opt-in consent when data collected. – Provide a simple way for them to opt-out of marketing messages. – Have a system in place to deal with complaints. Electronic Marketing (3)
  • 21. What are they? – From 2011 under the amended PECR you now need to (i) tell users about them and (ii) obtain “consent” before setting most types of cookies. – Only set strictly necessary cookies without consent. – But what is meant by consent? Opt-in? e.g. pop up – “For this site to work correctly…we need to store a small file (called a cookie) on your computer….If you click on “OK” below we will store cookies and you can continue using this site with full functionality….For more information read our cookie policy” (FCA website) Implied? e.g. pop up - “We have placed cookies on your computer to help make this website better. You can change your cookie settings at any time. Otherwise we’ll assume you’re OK to continue.” (ICO website) – ICO Guidance (May 2012 and onwards) Cookies
  • 22. BYOD – “bring your own device” – Lots of legal issues (case study explores some of these not just data protection) – From a data protection perspective security is the biggest issue – 7th Principle (and other principles too). What happens if device lost, hacked or stolen? Steps taken must relate to risks e.g. is sensitive personal data available for access or storage on a “BYOD” – Prevent unauthorised access (e.g. password on device, encryption on device, lock out/delete data if too many failed attempts, separate business from personal data) – Encrypt data in transit – Right to monitor and automatically delete data – Employees leave Apps, Social Media and BYOD
  • 23. ICO Guidance on BYOD (March 2013) – Carry out an internal assessment leading to implementing BYOD policy (include an acceptable use policy and also a social media policy if BYOD policy leads to increased use of social media by employees) – Need to cross refer to Employment Practices Code (e.g. re monitoring and acceptable use policy) Apps, Social Media and BYOD (2)
  • 24. Social Media – social networking and online forums – Growth in organisations setting up own blogs/social media web pages/online forums Customer reviews/feed back School/university alumni/ae events Charity fund-raising and volunteer sites – If you are processing personal data for non-domestic purposes then you will be subject to the DPA and won’t benefit from domestic purposes (s 36) exemption Apps, Social Media and BYOD (3)
  • 25. – Need to assess in particular Who is data controller Ensure data accurate (4th Principle) “Solicitors from Hell” case – ICO Guidance (May 2013) – Have accurate acceptable use policy – Be clear how complaints dealt with Apps, Social Media and BYOD (4)
  • 26. Apps – Collect personal data (location, stored data, sensor data…)8 – Process personal data – EU’s Article 29 Working Party issued opinion WP 202 on apps on smart devices (27 February 2013). If you are developing or using Apps in your business you must address the privacy issues. Apps, Social Media and BYOD (5)
  • 27. – Key privacy issues highlighted by EU Lack of transparency on types of processing Lack of meaningful (i.e. free and informed) consent Poor security measures Disregard of any purpose limitation and lack of data minimisation (e.g. “market research” that doesn’t relate to App at all) – Take away: ensure privacy issues are addressed in App development Privacy policy Use of cookies Transborder issues Security Apps for children raise specific issues Apps, Social Media and BYOD (6)
  • 28. The New Data Protection Regulation On 25 January 2012, the European Commission published a proposal for a new EU Regulation. This will repeal the existing 1995 EU Data Protection Directive. In the UK this will mean all or part of the DPA 1998 (tbd by Parliament) will be superseded by a directly effective Regulation. The European Commission has called for: – An effective new data protection framework – Clear, effective rights for individuals – Clear responsibility and accountability – Obligations to be focussed on processing that poses genuine risks to individuals or societies – Data protection authorities that are independent – with a clearer role.
  • 29. Potential changes: – Higher fines – Stronger data subject rights including “right to be forgotten” – Consent (specific Article on this e.g. placing burden of proof on data controller where consent relied on) – More responsibility on data controllers (including those outside the EU) including requiring data protection officers in organisations and obligation to notify the regulator if a data breach and then potentially tell data subjects too The New Data Protection Regulation (2)
  • 30. The Regulation should essentially be a harmonised EU regime. The draft Regulation will need to be approved by EU member states and ratified by the European Parliament. Originally to be adopted in 2014 and in effect in 2016. But delay in legislative process due to contentious nature of the Regulation. The New Data Protection Regulation (3)
  • 31. Note: other recent and proposed EU laws – Regulation 611/2013 on the notification of personal data breaches (not general - only applies to ISPs/telcos – in force from 29 August 2013 and see also amended PECRs) – Proposed Network and Information Security Directive (February 2013) (potentially applies to a wide range of companies and organisations in energy, transport, banking and finance, health care plus e-commerce platforms, social networks, search engines, clouder services, application stores, payment gateways plus “public administrations”) – obligations to guarantee security appropriate to the risk and to tell regulator about cyber security incidents The New Data Protection Regulation (4)
  • 32. Case Study (1) (Recognising Personal Data) A potential member of a gym meets with a sales manager of a local gym to discuss membership options. The sales manager asks the prospective member for certain information (name, address, age) and records these details manually on a ‘new membership application form’. These details will subsequently be added to the gym’s computer system. Is this data? Does it matter if the information is never added to the computer system?
  • 33. Case Study (2) (Overseas Transfer of Data/Cloud) UK Gadgets is one of the leading suppliers of gadgets in the UK. It has recently been bought out by a US multinational, US Gadgets. As part of its new reporting obligations, UK Gadgets has been asked to send copies of all of its employee records to a third party cloud provider (CloudCo) based in the US appointed by US Gadget’s head office in New York to manage the multinational’s global HR database. The UK Co will have direct access to the cloud service through web browser and password access. In due course it will also upload updated data direct to CloudCo. The UK data will be available for access and processing by both the UK and US parent. The HR director is a little concerned that if he does this, he could be in breach of the DPA, but head office is adamant that they must be sent. What are his options? NB: This case study assumes that the other Data Protection principles have been complied with and that the data does not consist of 'sensitive' personal data where consent to transfer may need to be obtained.
  • 34. Case Study (3) (Electronic Marketing) Please tick here if you do not want us to contact you by electronic means (e-mail or SMS) with information about goods and services which we feel may be of interest to you. Is this acceptable?
  • 35. Case Study (4) (Apps/BYOD/Social Media) After considerable internal debate amongst the IT director, HR director and head of sales and marketing at Way Ahead law firm, the Board decide to allow legal staff to utilise their own smart phones and tablets for work purposes. What should Way Ahead do to minimise risks?
  • 36. Contact Details Sheilah Mackie, Partner, Commercial/IT 02380 857039 sheilah.mackie@bllaw.co.uk Simon Stokes, Partner, Commercial/IT 0207 814 5482 simon.stokes@bllaw.co.uk