SlideShare a Scribd company logo
Data protection 2013 
Friday 8 February 
#dmadata 
Supported by 
An introduction to data protection 
Wednesday 24 September 2014, DMA House 
@DMA_UK #dmalegal 
James Milligan, Solicitor, DMA
Agenda 
9.00am Registration and breakfast 
9.30am Why is data protection important? 
9.40am Understanding the lawThe Data Protection Act 1998 
Key terms 
8 Principles 
10.40am Break 
11.00am Understanding the law 
The Privacy and Electronic Communications Regulation 2003 
Key rules 
Key points 
11.30am Practical tips for marketers 
12.00pm Summary and questions 
12.30pm Close
Why is it important? 
•It helps us to protect information about ourselves and others 
•It helps us avoid damage to the reputation of our organisation 
•It makes good business sense –it can increase efficiency and effectiveness 
•It helps us avoid enforcement action by the Information Commissioner 
–both employers and employees can be prosecuted 
–companies can face a monetary penalty of up to £500,000 for major breaches
Understanding the law 1 
Data Protection Act 1998 (DPA) 
–Came into force 1 March 2000 
–Replaced 1984 Act 
–Covers doing anything with data 
–Applies electronic records and some manual records
Key Terms 
Personal data 
–any data that can be used to identify a living individual 
–Examples of personal data can include: 
•Name and address 
•Email address (even business email addresses if they are non generic) 
•Name and telephone number 
•Photographs 
–Only personal data is protected by the DPA 
Sensitive personal data 
–any data relating to: 
•Health 
•Race or ethnic origin 
•Political opinions 
•Religious beliefs 
•Trade union membership 
•Sex life 
•Criminal proceedings or convictions
Key terms 
Processing 
–obtaining, recording or holding information or carrying out any operation on the information including 
•Organising 
•Adapting 
•Retrieving 
•Disclosing 
•Blocking 
•Destroying 
Data subject 
–a living identifiable individual to whom the personal data relates
Key Terms 
Data controller 
-Determines how data will be used 
-Usually owns or rents the data (may be done by 3rdparty on their behalf) 
-Required to notify (register) as a controller with the ICO 
-May be fined by ICO if any data breaches arise 
Data processor 
-Processes data on behalf of controller or other processor 
-Processing can be anything from data storage to advanced data manipulation and modelling 
-Includes companies that manage / broker / collect data on behalf of others
The 8 Principles 
•Fairly and lawfully collected 
•Processed for specified and limited purposes 
•Adequate, relevant and not excessive 
•Accurate and kept up to date 
•Not kept for longer than necessary 
•Processed in accordance with Individuals’ rights 
•Security –appropriate technical and organisational measures 
•Not transferred outside the European Economic Area (EEA) unless adequate protections are in place 
•(EEA: The 28 member states of the EU, plus Iceland, Liechtenstein and Norway)
Principle 1: Fairly and lawfully collected 
•Fair processing information provided 
•Organisation’s identity given 
•Purpose of collection made clear 
•Further information necessary 
•Correct permissions obtained 
-Implied consent: opt-out mechanism provided 
-Express consent: opt-in mechanism provided 
•Sensitive personal data only captured if strictly necessary
Principle 2: Processed for limited purposes 
•Only process data for the purpose(s) you told the individual 
•Make the purpose(s) clear at the point of data collection 
•Change of circumstances –what happens to the data then? 
•Subsequent use of data for direct marketing purposes 
•Data cleansing –regular and ad hoc
Principle 3: Adequate, relevant and not excessive 
•Minimum amount of information required 
•Additional information for specific individuals 
•Collect data that you will use now 
•Collection of data that ‘may be useful’ in the future is not permitted
Principle 4: Accurate and kept up to date 
•Take reasonable steps to ensure accuracy (but what is ‘reasonable’?) 
•Ensure data is not incorrect or misleading 
•Undertake regular data cleansing 
•Clean data against the relevant preference service files and other appropriate cleansing files
Principle 5: Not kept for longer than necessary 
•Keep for as long as purpose collected for 
•Suppression lists
Principle 6: Processed in accordance with the rights of data subjects 
•Subject access requests 
•‘Where did you get my data from?’ 
•Right to prevent direct marketing 
•Customer service / legally required communications –no opt-out provision required 
•Right to have inaccurate data corrected
Principle 7: Technological and organisational security 
•Data security must be appropriate–take account of: 
–Current state of technological development 
–Cost of implementing security measures 
–Potential harm that could result from a data breach 
–Nature of data to be protected –non/sensitive? 
•Need for risk assessment and risk management techniques 
•Record your findings and assessments
Principle 7: Technological and organisational security (continued) 
•Ensure adequate organisational data security measures 
•Prevent unauthorised as well as unlawful processing or disclosure of data 
•Security measures by data controller anddata processor 
•Data processing and transfer agreements in place 
•Staff training 
•Data access on a ‘need to know’ basis –individual log-ins only 
•Secure disposal of data –internally/externally -keep records
Principle 8: Processed within the EEA unless adequate protection in place 
•Data can be freely transferred within the EEA (providing data transfer agreements are in place) 
•Do not transfer data unless the country (destination and countries data is routed via) have an adequate level of data protection 
•Need to inform individuals before transferring their data outside the EEA but do not need their consent
Understanding the law 2 
•Privacy and Electronic Communications Regulations 2003 (PECR) 
–Came into force 11 December 2003 
–Covers electronic communications –email, telephone, SMS
Key rules 
•Sender must not conceal their identity 
•Communication must have valid address where opt-outs can be sent 
•Opt-in required for individuals (B2C) 
•Soft opt-in/existing customer exemption –available: 
–When you are collecting the address/mobile number in the sale or negotiations for the sale of a product or service; 
–You only send communications about similar products and services; 
–You provided an opportunity at time of collection to opt-out.
Key points 
•Existing customer exemption: Not an excuse for unsolicited contact where correct permissions were never obtained 
•B2B –Opt-out and marketing message needs to directly relate to the work they do. 
•Subject headers in emails must be clear and accurate 
•Free and simple-to-use opt-out method must always be provided 
•Action unsubscribe requests promptly –add to internal suppression file 
•Maintain different flags for different types of communication – helps to avoid general opt-outs for all channels
Practical tips for marketers 
•Data capture forms 
•Marketing permissions 
•Sourcing data 
•Regaining lost permission
Data capture forms 
•Key information to include; 
–Why the data is being requested 
–What the data will be used for 
–Provision of an opt-in/out for marketing 
–Marketing channels to be used 
–Link to privacy policy 
•Key information to include in privacy policy 
–How the data subject can opt-out of marketing 
–If the data will be processed outside the EEA 
–How long the data will be kept for 
–How to make a subject access request 
–How to make a complaint regarding use of data
Marketing permissions 
Own marketing3rd party marketingOwn marketing3rd party marketingMailopt-outopt-out (MPS screening)opt-outopt-outTelephoneopt-outopt-out (TPS screening)opt-outopt-out (TPS/ CTPS screening) Emailopt-in/ soft opt- inopt-inopt-in (unless corporate subscriber exemption) opt-in (unless corporate subscriber exemption) SMSopt-in/ soft opt- inopt-inopt-inopt-inFaxopt-inopt-inopt-outopt-out (FPS screening) B2CB2B
Sourcing data/ Due diligence 
•Who compiled the list? When? Has it been amended or updated since? 
•When was consent obtained? 
•Who obtained consent and what was the context? 
•Was it opt-in or opt-out? 
•Was information provided clearly and intelligibly? How was it provided? 
•Did it list organisations by name, by description, or any third party?
Regaining lost permissions 
•Why was permission lost: 
–Poor customer service? 
–Poor communications timing? 
–Inappropriate offers? 
–In-house technical issues –permissions not recorded on CRM system 
•Revalidation exercise –obtaining up-to-date data 
•Can very occasionally include request regarding marketing update in a service message providing it is a minor part of the message 
•If you have only lost permission for certain channels, contact via another channel to update permissions
Determining whether data controller or data processor 
•Look at activities each party is carrying out 
•Data Controller –over-arching decisions 
•Data Processor –freedom to use technical knowledge 
•If both parties working well together and dealing with data protection compliance –no real issues 
•Important to determine for when things go wrong e.g. data breach 
•Establish roles and responsibilities before work starts 
•Obligations of both parties under DPA 1998 
•Need for operational guidance behind data processing contract 
•Remember that a data processor will also be a data controller in respect of own employees .
Summary and questions? 
Switchboard: (020)7291 3300 
Legal helpdesk: legaladvice@dma.org.uk 
My direct email: james.milligan@dma.org.uk

More Related Content

What's hot

Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPR
DipanjanDey12
 
DPIA
DPIADPIA
GDPR
GDPRGDPR
GDPR
Gopi PD
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
grahamwell
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
Qualsys Ltd
 
GDPR Demystified
GDPR DemystifiedGDPR Demystified
GDPR Demystified
SPIN Chennai
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
WilmerHale
 
GDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationGDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection Regulation
Vicky Dallas
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
Vertex Holdings
 
GDPR Introduction and overview
GDPR Introduction and overviewGDPR Introduction and overview
GDPR Introduction and overview
Jane Lambert
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
Extentia Information Technology
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
Priyab Satoshi
 
Data Protection Presentation
Data Protection PresentationData Protection Presentation
Data Protection Presentation
IBM Business Insight
 
GDPR and Security.pdf
GDPR and Security.pdfGDPR and Security.pdf
An Overview of GDPR
An Overview of GDPR An Overview of GDPR
An Overview of GDPR
The Pathway Group
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information Security
Jisc Scotland
 
Data protection
Data protectionData protection
Data protection
Lewis Silkin
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
SaimaRafiq
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slides
Naomi Holmes
 
Common Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementCommon Practice in Data Privacy Program Management
Common Practice in Data Privacy Program Management
Eryk Budi Pratama
 

What's hot (20)

Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPR
 
DPIA
DPIADPIA
DPIA
 
GDPR
GDPRGDPR
GDPR
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
 
GDPR Demystified
GDPR DemystifiedGDPR Demystified
GDPR Demystified
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
GDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationGDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection Regulation
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
 
GDPR Introduction and overview
GDPR Introduction and overviewGDPR Introduction and overview
GDPR Introduction and overview
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
 
Data Protection Presentation
Data Protection PresentationData Protection Presentation
Data Protection Presentation
 
GDPR and Security.pdf
GDPR and Security.pdfGDPR and Security.pdf
GDPR and Security.pdf
 
An Overview of GDPR
An Overview of GDPR An Overview of GDPR
An Overview of GDPR
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information Security
 
Data protection
Data protectionData protection
Data protection
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slides
 
Common Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementCommon Practice in Data Privacy Program Management
Common Practice in Data Privacy Program Management
 

Viewers also liked

Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
Dr. Donald Macfarlane
 
DMA North: Legal Update
DMA North: Legal UpdateDMA North: Legal Update
DMA North: Legal Update
Rachel Aldighieri
 
Who's afraid of the FCA? How to comply and thrive on social media
Who's afraid of the FCA? How to comply and thrive on social mediaWho's afraid of the FCA? How to comply and thrive on social media
Who's afraid of the FCA? How to comply and thrive on social media
Rachel Aldighieri
 
Ереван
ЕреванЕреван
Ереван
Tatevik Iskajyan
 
16fun at MoMo Beijing #38
16fun at MoMo Beijing #3816fun at MoMo Beijing #38
16fun at MoMo Beijing #38
momobeijing
 
The Evolution of Inbound Marketing
The Evolution of Inbound MarketingThe Evolution of Inbound Marketing
The Evolution of Inbound Marketing
Byron Fernandez
 
Google kick ass-game_programming_with_gwt
Google   kick ass-game_programming_with_gwtGoogle   kick ass-game_programming_with_gwt
Google kick ass-game_programming_with_gwt
momobeijing
 
An introduction to data protection - 26 March 2014
An introduction to data protection - 26 March 2014An introduction to data protection - 26 March 2014
An introduction to data protection - 26 March 2014
Rachel Aldighieri
 
2010 Earthquake in Haiti
2010 Earthquake in Haiti2010 Earthquake in Haiti
2010 Earthquake in Haiti
shannonphillips1
 
Jiayuan overview & wireless orange labs
Jiayuan overview & wireless   orange labsJiayuan overview & wireless   orange labs
Jiayuan overview & wireless orange labs
momobeijing
 
Chris Martin
Chris MartinChris Martin
Chris Martin
Rachel Aldighieri
 
Planning advertising mail into an integrated campaign
Planning advertising mail into an integrated campaignPlanning advertising mail into an integrated campaign
Planning advertising mail into an integrated campaign
Rachel Aldighieri
 
Neuro sky overview orange event
Neuro sky overview   orange eventNeuro sky overview   orange event
Neuro sky overview orange event
momobeijing
 
Wodache mobile monday
Wodache mobile mondayWodache mobile monday
Wodache mobile monday
momobeijing
 
Win 3D2N Bali Spa Package @ GroupDiscount.com.my
Win 3D2N Bali Spa Package @ GroupDiscount.com.myWin 3D2N Bali Spa Package @ GroupDiscount.com.my
Win 3D2N Bali Spa Package @ GroupDiscount.com.my
groupdiscount
 
Html5与i pad交互杂志
Html5与i pad交互杂志Html5与i pad交互杂志
Html5与i pad交互杂志
momobeijing
 
共享妈妈晒201205定稿
共享妈妈晒201205定稿共享妈妈晒201205定稿
共享妈妈晒201205定稿momobeijing
 
10 lbs apps from china worth attention
10 lbs apps   from china worth attention  10 lbs apps   from china worth attention
10 lbs apps from china worth attention
momobeijing
 

Viewers also liked (20)

Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 
DMA North: Legal Update
DMA North: Legal UpdateDMA North: Legal Update
DMA North: Legal Update
 
Almost Extinct
Almost ExtinctAlmost Extinct
Almost Extinct
 
Who's afraid of the FCA? How to comply and thrive on social media
Who's afraid of the FCA? How to comply and thrive on social mediaWho's afraid of the FCA? How to comply and thrive on social media
Who's afraid of the FCA? How to comply and thrive on social media
 
Ереван
ЕреванЕреван
Ереван
 
16fun at MoMo Beijing #38
16fun at MoMo Beijing #3816fun at MoMo Beijing #38
16fun at MoMo Beijing #38
 
The Evolution of Inbound Marketing
The Evolution of Inbound MarketingThe Evolution of Inbound Marketing
The Evolution of Inbound Marketing
 
Google kick ass-game_programming_with_gwt
Google   kick ass-game_programming_with_gwtGoogle   kick ass-game_programming_with_gwt
Google kick ass-game_programming_with_gwt
 
An introduction to data protection - 26 March 2014
An introduction to data protection - 26 March 2014An introduction to data protection - 26 March 2014
An introduction to data protection - 26 March 2014
 
2010 Earthquake in Haiti
2010 Earthquake in Haiti2010 Earthquake in Haiti
2010 Earthquake in Haiti
 
Jiayuan overview & wireless orange labs
Jiayuan overview & wireless   orange labsJiayuan overview & wireless   orange labs
Jiayuan overview & wireless orange labs
 
Chris Martin
Chris MartinChris Martin
Chris Martin
 
Planning advertising mail into an integrated campaign
Planning advertising mail into an integrated campaignPlanning advertising mail into an integrated campaign
Planning advertising mail into an integrated campaign
 
Neuro sky overview orange event
Neuro sky overview   orange eventNeuro sky overview   orange event
Neuro sky overview orange event
 
Wodache mobile monday
Wodache mobile mondayWodache mobile monday
Wodache mobile monday
 
Win 3D2N Bali Spa Package @ GroupDiscount.com.my
Win 3D2N Bali Spa Package @ GroupDiscount.com.myWin 3D2N Bali Spa Package @ GroupDiscount.com.my
Win 3D2N Bali Spa Package @ GroupDiscount.com.my
 
Html5与i pad交互杂志
Html5与i pad交互杂志Html5与i pad交互杂志
Html5与i pad交互杂志
 
共享妈妈晒201205定稿
共享妈妈晒201205定稿共享妈妈晒201205定稿
共享妈妈晒201205定稿
 
Carta a meneceu
Carta a meneceuCarta a meneceu
Carta a meneceu
 
10 lbs apps from china worth attention
10 lbs apps   from china worth attention  10 lbs apps   from china worth attention
10 lbs apps from china worth attention
 

Similar to Introduction to data protection

An introduction to data protection - Edinburgh
An introduction to data protection - EdinburghAn introduction to data protection - Edinburgh
An introduction to data protection - Edinburgh
Rachel Aldighieri
 
Legal and data protection update
Legal and data protection updateLegal and data protection update
Legal and data protection update
Rachel Aldighieri
 
An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15
Rachel Aldighieri
 
Introduction to data protection - Edinburgh - 29/04/15
Introduction to data protection - Edinburgh - 29/04/15Introduction to data protection - Edinburgh - 29/04/15
Introduction to data protection - Edinburgh - 29/04/15
Rachel Aldighieri
 
An introduction to data protection - 2/09/2015
An introduction to data protection - 2/09/2015An introduction to data protection - 2/09/2015
An introduction to data protection - 2/09/2015
Rachel Aldighieri
 
An introduction to data protection - 30 Jan 2014
An introduction to data protection - 30 Jan 2014An introduction to data protection - 30 Jan 2014
An introduction to data protection - 30 Jan 2014
Rachel Aldighieri
 
An Introduction to Data Protection (London) - June 2015
An Introduction to Data Protection (London) - June 2015An Introduction to Data Protection (London) - June 2015
An Introduction to Data Protection (London) - June 2015
Rachel Aldighieri
 
3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE
CFG
 
Gdpr for business full
Gdpr for business fullGdpr for business full
Gdpr for business full
Fionnuala Hendrick
 
ABM Display Advertising Success in the World of GDPR [PPT]
ABM Display Advertising Success in the World of GDPR [PPT]ABM Display Advertising Success in the World of GDPR [PPT]
ABM Display Advertising Success in the World of GDPR [PPT]
Kwanzoo Inc
 
What does GDPR mean for your business?
What does GDPR mean for your business?What does GDPR mean for your business?
What does GDPR mean for your business?
BrightPay Payroll and Auto Enrolment Software
 
Data Protection Act presentation
Data Protection Act presentationData Protection Act presentation
Data Protection Act presentation
Ian Clive Oultram
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business Advisors
Harrison Clark Rickerbys
 
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
Harrison Clark Rickerbys
 
GDPR: What does it mean for your business?
GDPR: What does it mean for your business?GDPR: What does it mean for your business?
GDPR: What does it mean for your business?
BrightPay Payroll and Auto Enrolment Software
 
Prepare Your Firm for GDPR
Prepare Your Firm for GDPRPrepare Your Firm for GDPR
Prepare Your Firm for GDPR
MyComplianceOffice
 
Public sector breakfast club, October 2016, Exeter
Public sector breakfast club, October 2016, ExeterPublic sector breakfast club, October 2016, Exeter
Public sector breakfast club, October 2016, Exeter
Browne Jacobson LLP
 
GDPR for your Payroll Bureau
GDPR for your Payroll BureauGDPR for your Payroll Bureau
GDPR for your Payroll Bureau
BrightPay Payroll and Auto Enrolment Software
 
GDPR for your Payroll Bureau
GDPR for your Payroll BureauGDPR for your Payroll Bureau
GDPR for your Payroll Bureau
BrightPay Payroll and Auto Enrolment Software
 
Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)
Zoodikers
 

Similar to Introduction to data protection (20)

An introduction to data protection - Edinburgh
An introduction to data protection - EdinburghAn introduction to data protection - Edinburgh
An introduction to data protection - Edinburgh
 
Legal and data protection update
Legal and data protection updateLegal and data protection update
Legal and data protection update
 
An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15An introduction to data protection - Manchester - 24/06/15
An introduction to data protection - Manchester - 24/06/15
 
Introduction to data protection - Edinburgh - 29/04/15
Introduction to data protection - Edinburgh - 29/04/15Introduction to data protection - Edinburgh - 29/04/15
Introduction to data protection - Edinburgh - 29/04/15
 
An introduction to data protection - 2/09/2015
An introduction to data protection - 2/09/2015An introduction to data protection - 2/09/2015
An introduction to data protection - 2/09/2015
 
An introduction to data protection - 30 Jan 2014
An introduction to data protection - 30 Jan 2014An introduction to data protection - 30 Jan 2014
An introduction to data protection - 30 Jan 2014
 
An Introduction to Data Protection (London) - June 2015
An Introduction to Data Protection (London) - June 2015An Introduction to Data Protection (London) - June 2015
An Introduction to Data Protection (London) - June 2015
 
3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE
 
Gdpr for business full
Gdpr for business fullGdpr for business full
Gdpr for business full
 
ABM Display Advertising Success in the World of GDPR [PPT]
ABM Display Advertising Success in the World of GDPR [PPT]ABM Display Advertising Success in the World of GDPR [PPT]
ABM Display Advertising Success in the World of GDPR [PPT]
 
What does GDPR mean for your business?
What does GDPR mean for your business?What does GDPR mean for your business?
What does GDPR mean for your business?
 
Data Protection Act presentation
Data Protection Act presentationData Protection Act presentation
Data Protection Act presentation
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business Advisors
 
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
 
GDPR: What does it mean for your business?
GDPR: What does it mean for your business?GDPR: What does it mean for your business?
GDPR: What does it mean for your business?
 
Prepare Your Firm for GDPR
Prepare Your Firm for GDPRPrepare Your Firm for GDPR
Prepare Your Firm for GDPR
 
Public sector breakfast club, October 2016, Exeter
Public sector breakfast club, October 2016, ExeterPublic sector breakfast club, October 2016, Exeter
Public sector breakfast club, October 2016, Exeter
 
GDPR for your Payroll Bureau
GDPR for your Payroll BureauGDPR for your Payroll Bureau
GDPR for your Payroll Bureau
 
GDPR for your Payroll Bureau
GDPR for your Payroll BureauGDPR for your Payroll Bureau
GDPR for your Payroll Bureau
 
Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)Getting to grips with General Data Protection Regulation (GDPR)
Getting to grips with General Data Protection Regulation (GDPR)
 

More from Rachel Aldighieri

Navigating B2B marketing
Navigating B2B marketingNavigating B2B marketing
Navigating B2B marketing
Rachel Aldighieri
 
Taking the lead: customer acquisition barometer 2015
Taking the lead: customer acquisition barometer 2015Taking the lead: customer acquisition barometer 2015
Taking the lead: customer acquisition barometer 2015
Rachel Aldighieri
 
The value of mail: what planners and marketers need to know
The value of mail: what planners and marketers need to knowThe value of mail: what planners and marketers need to know
The value of mail: what planners and marketers need to know
Rachel Aldighieri
 
Sharpen your social media skills
Sharpen your social media skillsSharpen your social media skills
Sharpen your social media skills
Rachel Aldighieri
 
Stop selling and start serving: how to bring data, creativity and technology ...
Stop selling and start serving: how to bring data, creativity and technology ...Stop selling and start serving: how to bring data, creativity and technology ...
Stop selling and start serving: how to bring data, creativity and technology ...
Rachel Aldighieri
 
Legal update - Leeds
Legal update - LeedsLegal update - Leeds
Legal update - Leeds
Rachel Aldighieri
 
FEDMA - Legal Fact Pack Summary and Pre-order Form
FEDMA - Legal Fact Pack Summary and Pre-order FormFEDMA - Legal Fact Pack Summary and Pre-order Form
FEDMA - Legal Fact Pack Summary and Pre-order Form
Rachel Aldighieri
 
European Legal and Privacy Update with FEDMA
European Legal and Privacy Update with FEDMAEuropean Legal and Privacy Update with FEDMA
European Legal and Privacy Update with FEDMA
Rachel Aldighieri
 
DMA Awards unplugged: a practical workshop - Thursday 13 August
DMA Awards unplugged: a practical workshop - Thursday 13 AugustDMA Awards unplugged: a practical workshop - Thursday 13 August
DMA Awards unplugged: a practical workshop - Thursday 13 August
Rachel Aldighieri
 
DMA Awards unplugged - 30 July 2015
DMA Awards unplugged - 30 July 2015DMA Awards unplugged - 30 July 2015
DMA Awards unplugged - 30 July 2015
Rachel Aldighieri
 
DMA Copywriting census reveal - Manchester
DMA Copywriting census reveal - ManchesterDMA Copywriting census reveal - Manchester
DMA Copywriting census reveal - Manchester
Rachel Aldighieri
 
Data detailed: how to buy and sell information responsibly - 08.07.2015
Data detailed: how to buy and sell information responsibly - 08.07.2015Data detailed: how to buy and sell information responsibly - 08.07.2015
Data detailed: how to buy and sell information responsibly - 08.07.2015
Rachel Aldighieri
 
Legal update - 1 July
Legal update - 1 JulyLegal update - 1 July
Legal update - 1 July
Rachel Aldighieri
 
Data privacy: what the consumer really thinks - 30.06.2015
Data privacy: what the consumer really thinks - 30.06.2015Data privacy: what the consumer really thinks - 30.06.2015
Data privacy: what the consumer really thinks - 30.06.2015
Rachel Aldighieri
 
In search of the perfect customer journey - Manchester
In search of the perfect customer journey - ManchesterIn search of the perfect customer journey - Manchester
In search of the perfect customer journey - Manchester
Rachel Aldighieri
 
Legal update
Legal updateLegal update
Legal update
Rachel Aldighieri
 
ZEDTalk 3: Creativity & ROI
ZEDTalk 3: Creativity & ROIZEDTalk 3: Creativity & ROI
ZEDTalk 3: Creativity & ROI
Rachel Aldighieri
 
Simon Gill, Chief Creative Officer, DigitasLBi
Simon Gill, Chief Creative Officer, DigitasLBiSimon Gill, Chief Creative Officer, DigitasLBi
Simon Gill, Chief Creative Officer, DigitasLBi
Rachel Aldighieri
 
Mark Hancock, Planning Director, The Real Adventure Unlimited...
Mark Hancock, Planning Director, The Real Adventure Unlimited...Mark Hancock, Planning Director, The Real Adventure Unlimited...
Mark Hancock, Planning Director, The Real Adventure Unlimited...
Rachel Aldighieri
 
Tim Lindsay, Chief Executive Officer, D&AD
Tim Lindsay, Chief Executive Officer, D&ADTim Lindsay, Chief Executive Officer, D&AD
Tim Lindsay, Chief Executive Officer, D&AD
Rachel Aldighieri
 

More from Rachel Aldighieri (20)

Navigating B2B marketing
Navigating B2B marketingNavigating B2B marketing
Navigating B2B marketing
 
Taking the lead: customer acquisition barometer 2015
Taking the lead: customer acquisition barometer 2015Taking the lead: customer acquisition barometer 2015
Taking the lead: customer acquisition barometer 2015
 
The value of mail: what planners and marketers need to know
The value of mail: what planners and marketers need to knowThe value of mail: what planners and marketers need to know
The value of mail: what planners and marketers need to know
 
Sharpen your social media skills
Sharpen your social media skillsSharpen your social media skills
Sharpen your social media skills
 
Stop selling and start serving: how to bring data, creativity and technology ...
Stop selling and start serving: how to bring data, creativity and technology ...Stop selling and start serving: how to bring data, creativity and technology ...
Stop selling and start serving: how to bring data, creativity and technology ...
 
Legal update - Leeds
Legal update - LeedsLegal update - Leeds
Legal update - Leeds
 
FEDMA - Legal Fact Pack Summary and Pre-order Form
FEDMA - Legal Fact Pack Summary and Pre-order FormFEDMA - Legal Fact Pack Summary and Pre-order Form
FEDMA - Legal Fact Pack Summary and Pre-order Form
 
European Legal and Privacy Update with FEDMA
European Legal and Privacy Update with FEDMAEuropean Legal and Privacy Update with FEDMA
European Legal and Privacy Update with FEDMA
 
DMA Awards unplugged: a practical workshop - Thursday 13 August
DMA Awards unplugged: a practical workshop - Thursday 13 AugustDMA Awards unplugged: a practical workshop - Thursday 13 August
DMA Awards unplugged: a practical workshop - Thursday 13 August
 
DMA Awards unplugged - 30 July 2015
DMA Awards unplugged - 30 July 2015DMA Awards unplugged - 30 July 2015
DMA Awards unplugged - 30 July 2015
 
DMA Copywriting census reveal - Manchester
DMA Copywriting census reveal - ManchesterDMA Copywriting census reveal - Manchester
DMA Copywriting census reveal - Manchester
 
Data detailed: how to buy and sell information responsibly - 08.07.2015
Data detailed: how to buy and sell information responsibly - 08.07.2015Data detailed: how to buy and sell information responsibly - 08.07.2015
Data detailed: how to buy and sell information responsibly - 08.07.2015
 
Legal update - 1 July
Legal update - 1 JulyLegal update - 1 July
Legal update - 1 July
 
Data privacy: what the consumer really thinks - 30.06.2015
Data privacy: what the consumer really thinks - 30.06.2015Data privacy: what the consumer really thinks - 30.06.2015
Data privacy: what the consumer really thinks - 30.06.2015
 
In search of the perfect customer journey - Manchester
In search of the perfect customer journey - ManchesterIn search of the perfect customer journey - Manchester
In search of the perfect customer journey - Manchester
 
Legal update
Legal updateLegal update
Legal update
 
ZEDTalk 3: Creativity & ROI
ZEDTalk 3: Creativity & ROIZEDTalk 3: Creativity & ROI
ZEDTalk 3: Creativity & ROI
 
Simon Gill, Chief Creative Officer, DigitasLBi
Simon Gill, Chief Creative Officer, DigitasLBiSimon Gill, Chief Creative Officer, DigitasLBi
Simon Gill, Chief Creative Officer, DigitasLBi
 
Mark Hancock, Planning Director, The Real Adventure Unlimited...
Mark Hancock, Planning Director, The Real Adventure Unlimited...Mark Hancock, Planning Director, The Real Adventure Unlimited...
Mark Hancock, Planning Director, The Real Adventure Unlimited...
 
Tim Lindsay, Chief Executive Officer, D&AD
Tim Lindsay, Chief Executive Officer, D&ADTim Lindsay, Chief Executive Officer, D&AD
Tim Lindsay, Chief Executive Officer, D&AD
 

Recently uploaded

A presentation that explain the Power BI Licensing
A presentation that explain the Power BI LicensingA presentation that explain the Power BI Licensing
A presentation that explain the Power BI Licensing
AlessioFois2
 
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
Timothy Spann
 
Intelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicineIntelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicine
AndrzejJarynowski
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
sameer shah
 
The Ipsos - AI - Monitor 2024 Report.pdf
The  Ipsos - AI - Monitor 2024 Report.pdfThe  Ipsos - AI - Monitor 2024 Report.pdf
The Ipsos - AI - Monitor 2024 Report.pdf
Social Samosa
 
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docxDATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
SaffaIbrahim1
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
ihavuls
 
Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...
Bill641377
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
Social Samosa
 
Experts live - Improving user adoption with AI
Experts live - Improving user adoption with AIExperts live - Improving user adoption with AI
Experts live - Improving user adoption with AI
jitskeb
 
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
nyfuhyz
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
nuttdpt
 
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
bopyb
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
apvysm8
 
Learn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queriesLearn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queries
manishkhaire30
 
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
v7oacc3l
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
soxrziqu
 
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
nuttdpt
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
Walaa Eldin Moustafa
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
javier ramirez
 

Recently uploaded (20)

A presentation that explain the Power BI Licensing
A presentation that explain the Power BI LicensingA presentation that explain the Power BI Licensing
A presentation that explain the Power BI Licensing
 
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
 
Intelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicineIntelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicine
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
 
The Ipsos - AI - Monitor 2024 Report.pdf
The  Ipsos - AI - Monitor 2024 Report.pdfThe  Ipsos - AI - Monitor 2024 Report.pdf
The Ipsos - AI - Monitor 2024 Report.pdf
 
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docxDATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
 
Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
 
Experts live - Improving user adoption with AI
Experts live - Improving user adoption with AIExperts live - Improving user adoption with AI
Experts live - Improving user adoption with AI
 
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
 
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
 
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
办(uts毕业证书)悉尼科技大学毕业证学历证书原版一模一样
 
Learn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queriesLearn SQL from basic queries to Advance queries
Learn SQL from basic queries to Advance queries
 
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
 
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
 

Introduction to data protection

  • 1. Data protection 2013 Friday 8 February #dmadata Supported by An introduction to data protection Wednesday 24 September 2014, DMA House @DMA_UK #dmalegal James Milligan, Solicitor, DMA
  • 2. Agenda 9.00am Registration and breakfast 9.30am Why is data protection important? 9.40am Understanding the lawThe Data Protection Act 1998 Key terms 8 Principles 10.40am Break 11.00am Understanding the law The Privacy and Electronic Communications Regulation 2003 Key rules Key points 11.30am Practical tips for marketers 12.00pm Summary and questions 12.30pm Close
  • 3. Why is it important? •It helps us to protect information about ourselves and others •It helps us avoid damage to the reputation of our organisation •It makes good business sense –it can increase efficiency and effectiveness •It helps us avoid enforcement action by the Information Commissioner –both employers and employees can be prosecuted –companies can face a monetary penalty of up to £500,000 for major breaches
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. Understanding the law 1 Data Protection Act 1998 (DPA) –Came into force 1 March 2000 –Replaced 1984 Act –Covers doing anything with data –Applies electronic records and some manual records
  • 10. Key Terms Personal data –any data that can be used to identify a living individual –Examples of personal data can include: •Name and address •Email address (even business email addresses if they are non generic) •Name and telephone number •Photographs –Only personal data is protected by the DPA Sensitive personal data –any data relating to: •Health •Race or ethnic origin •Political opinions •Religious beliefs •Trade union membership •Sex life •Criminal proceedings or convictions
  • 11. Key terms Processing –obtaining, recording or holding information or carrying out any operation on the information including •Organising •Adapting •Retrieving •Disclosing •Blocking •Destroying Data subject –a living identifiable individual to whom the personal data relates
  • 12. Key Terms Data controller -Determines how data will be used -Usually owns or rents the data (may be done by 3rdparty on their behalf) -Required to notify (register) as a controller with the ICO -May be fined by ICO if any data breaches arise Data processor -Processes data on behalf of controller or other processor -Processing can be anything from data storage to advanced data manipulation and modelling -Includes companies that manage / broker / collect data on behalf of others
  • 13. The 8 Principles •Fairly and lawfully collected •Processed for specified and limited purposes •Adequate, relevant and not excessive •Accurate and kept up to date •Not kept for longer than necessary •Processed in accordance with Individuals’ rights •Security –appropriate technical and organisational measures •Not transferred outside the European Economic Area (EEA) unless adequate protections are in place •(EEA: The 28 member states of the EU, plus Iceland, Liechtenstein and Norway)
  • 14. Principle 1: Fairly and lawfully collected •Fair processing information provided •Organisation’s identity given •Purpose of collection made clear •Further information necessary •Correct permissions obtained -Implied consent: opt-out mechanism provided -Express consent: opt-in mechanism provided •Sensitive personal data only captured if strictly necessary
  • 15. Principle 2: Processed for limited purposes •Only process data for the purpose(s) you told the individual •Make the purpose(s) clear at the point of data collection •Change of circumstances –what happens to the data then? •Subsequent use of data for direct marketing purposes •Data cleansing –regular and ad hoc
  • 16. Principle 3: Adequate, relevant and not excessive •Minimum amount of information required •Additional information for specific individuals •Collect data that you will use now •Collection of data that ‘may be useful’ in the future is not permitted
  • 17. Principle 4: Accurate and kept up to date •Take reasonable steps to ensure accuracy (but what is ‘reasonable’?) •Ensure data is not incorrect or misleading •Undertake regular data cleansing •Clean data against the relevant preference service files and other appropriate cleansing files
  • 18. Principle 5: Not kept for longer than necessary •Keep for as long as purpose collected for •Suppression lists
  • 19. Principle 6: Processed in accordance with the rights of data subjects •Subject access requests •‘Where did you get my data from?’ •Right to prevent direct marketing •Customer service / legally required communications –no opt-out provision required •Right to have inaccurate data corrected
  • 20. Principle 7: Technological and organisational security •Data security must be appropriate–take account of: –Current state of technological development –Cost of implementing security measures –Potential harm that could result from a data breach –Nature of data to be protected –non/sensitive? •Need for risk assessment and risk management techniques •Record your findings and assessments
  • 21. Principle 7: Technological and organisational security (continued) •Ensure adequate organisational data security measures •Prevent unauthorised as well as unlawful processing or disclosure of data •Security measures by data controller anddata processor •Data processing and transfer agreements in place •Staff training •Data access on a ‘need to know’ basis –individual log-ins only •Secure disposal of data –internally/externally -keep records
  • 22. Principle 8: Processed within the EEA unless adequate protection in place •Data can be freely transferred within the EEA (providing data transfer agreements are in place) •Do not transfer data unless the country (destination and countries data is routed via) have an adequate level of data protection •Need to inform individuals before transferring their data outside the EEA but do not need their consent
  • 23. Understanding the law 2 •Privacy and Electronic Communications Regulations 2003 (PECR) –Came into force 11 December 2003 –Covers electronic communications –email, telephone, SMS
  • 24. Key rules •Sender must not conceal their identity •Communication must have valid address where opt-outs can be sent •Opt-in required for individuals (B2C) •Soft opt-in/existing customer exemption –available: –When you are collecting the address/mobile number in the sale or negotiations for the sale of a product or service; –You only send communications about similar products and services; –You provided an opportunity at time of collection to opt-out.
  • 25. Key points •Existing customer exemption: Not an excuse for unsolicited contact where correct permissions were never obtained •B2B –Opt-out and marketing message needs to directly relate to the work they do. •Subject headers in emails must be clear and accurate •Free and simple-to-use opt-out method must always be provided •Action unsubscribe requests promptly –add to internal suppression file •Maintain different flags for different types of communication – helps to avoid general opt-outs for all channels
  • 26. Practical tips for marketers •Data capture forms •Marketing permissions •Sourcing data •Regaining lost permission
  • 27. Data capture forms •Key information to include; –Why the data is being requested –What the data will be used for –Provision of an opt-in/out for marketing –Marketing channels to be used –Link to privacy policy •Key information to include in privacy policy –How the data subject can opt-out of marketing –If the data will be processed outside the EEA –How long the data will be kept for –How to make a subject access request –How to make a complaint regarding use of data
  • 28. Marketing permissions Own marketing3rd party marketingOwn marketing3rd party marketingMailopt-outopt-out (MPS screening)opt-outopt-outTelephoneopt-outopt-out (TPS screening)opt-outopt-out (TPS/ CTPS screening) Emailopt-in/ soft opt- inopt-inopt-in (unless corporate subscriber exemption) opt-in (unless corporate subscriber exemption) SMSopt-in/ soft opt- inopt-inopt-inopt-inFaxopt-inopt-inopt-outopt-out (FPS screening) B2CB2B
  • 29. Sourcing data/ Due diligence •Who compiled the list? When? Has it been amended or updated since? •When was consent obtained? •Who obtained consent and what was the context? •Was it opt-in or opt-out? •Was information provided clearly and intelligibly? How was it provided? •Did it list organisations by name, by description, or any third party?
  • 30. Regaining lost permissions •Why was permission lost: –Poor customer service? –Poor communications timing? –Inappropriate offers? –In-house technical issues –permissions not recorded on CRM system •Revalidation exercise –obtaining up-to-date data •Can very occasionally include request regarding marketing update in a service message providing it is a minor part of the message •If you have only lost permission for certain channels, contact via another channel to update permissions
  • 31. Determining whether data controller or data processor •Look at activities each party is carrying out •Data Controller –over-arching decisions •Data Processor –freedom to use technical knowledge •If both parties working well together and dealing with data protection compliance –no real issues •Important to determine for when things go wrong e.g. data breach •Establish roles and responsibilities before work starts •Obligations of both parties under DPA 1998 •Need for operational guidance behind data processing contract •Remember that a data processor will also be a data controller in respect of own employees .
  • 32. Summary and questions? Switchboard: (020)7291 3300 Legal helpdesk: legaladvice@dma.org.uk My direct email: james.milligan@dma.org.uk