SlideShare a Scribd company logo
Wednesday 24 June 2015, Centurion House, Manchester
James Milligan, Solicitor, DMA
@DMA_UK #dmadata
An introduction to data protection
Agenda
2.00 pm Registration
2:15 pm Welcome and Why is data protection important?
2.20 pm Understanding the law
The Data Protection Act 1998
Key terms
8 Principles
3.10 pm Break
3.30 pm Understanding the law
The Privacy and Electronic Communications Regulation 2003
Key rules
Key points
4:00 pm Practical tips for marketers
4.20 pm Summary and questions
4.30 pm Close
Why is it important?
• It helps us to protect information about ourselves and others
• It helps us avoid damage to the reputation of our organisation
• It makes good business sense – it can increase efficiency and
effectiveness
• It helps us avoid enforcement action by the Information
Commissioner
– both employers and employees can be prosecuted
– companies can face a monetary penalty of up to £500,000
for major breaches
Understanding the law - DPA
• Data Protection Act 1998 (DPA)
– Came into force 1 March 2000
– Replaced 1984 Act
– Covers doing anything with data
– Applies electronic records and some manual records
Key terms
• Personal data
– any data that can be used to identify a living individual
– Examples of personal data can include:
• Name and address
• Email address (even business email addresses if they are non generic)
• Name and telephone number
• Photographs
– Only personal data is protected by the DPA
• Sensitive personal data
– any data relating to:
• Health
• Race or ethnic origin
• Political opinions
• Religious beliefs
• Trade union membership
• Sex life
• Criminal proceedings or convictions
Key terms
• Processing
– obtaining, recording or holding information or carrying out any
operation on the information including
• Organising
• Adapting
• Retrieving
• Disclosing
• Blocking
• Destroying
• Data subject
– a living identifiable individual to whom the personal data relates
Key terms
• Data controller
- Determines how data will be used
- Usually owns or rents the data (may be done by 3rd party on their
behalf)
- Required to notify (register) as a controller with the ICO
- May be fined by ICO if any data breaches arise
• Data processor
- Processes data on behalf of controller or other processor
- Processing can be anything from data storage to
advanced data manipulation and modelling
- Includes companies that manage / broker / collect data on
behalf of others
Determining whether data controller or
data processor
• Look at activities each party is carrying out
• Data Controller – over-arching decisions
• Data Processor – freedom to use technical knowledge
• If both parties working well together and dealing with data protection
compliance – no real issues
• Important to determine for when things go wrong e.g. data breach
• Establish roles and responsibilities before work starts
• Obligations of both parties under DPA 1998
• Need for operational guidance behind data processing contract
• Remember that a data processor will also be a data controller in
respect of own employees.
The 8 principles
• Fairly and lawfully collected
• Processed for specified and limited purposes
• Adequate, relevant and not excessive
• Accurate and kept up to date
• Not kept for longer than necessary
• Processed in accordance with Individuals’ rights
• Security – appropriate technical and organisational measures
• Not transferred outside the European Economic Area (EEA)
unless adequate protections are in place
• (EEA: The 28 member states of the EU, plus Iceland,
Liechtenstein and Norway)
Principle 1: Fairly and lawfully collected
• Fair processing information provided
• Organisation’s identity given
• Purpose of collection made clear
• Further information necessary
• Correct permissions obtained
- Implied consent: opt-out mechanism provided
- Express consent: opt-in mechanism provided
• Sensitive personal data only captured if strictly necessary
Principle 2: Processed for limited
purposes
• Only process data for the purpose(s) you told the individual
• Make the purpose(s) clear at the point of data collection
• Change of circumstances – what happens to the data then?
• Subsequent use of data for direct marketing purposes
• Data cleansing – regular and ad hoc
Principle 3: Adequate, relevant and
not excessive
• Minimum amount of information required
• Additional information for specific individuals
• Collect data that you will use now
• Collection of data that ‘may be useful’ in the future is
not permitted
Principle 4: Accurate and kept up to
date
• Take reasonable steps to ensure accuracy (but what
is ‘reasonable’?)
• Ensure data is not incorrect or misleading
• Undertake regular data cleansing
• Clean data against the relevant preference service
files and other appropriate cleansing files
Principle 5: Not kept for longer than
necessary
• Keep for as long as purpose collected for
• Suppression lists
Principle 6: Processed in accordance
with the right of data subjects
• Subject access requests
• ‘Where did you get my data from?’
• Right to prevent direct marketing
• Customer service / legally required communications –
no opt-out provision required
• Right to have inaccurate data corrected
Principle 7: Technological and
organisational security
• Data security must be appropriate – take account of:
– Current state of technological development
– Cost of implementing security measures
– Potential harm that could result from a data breach
– Nature of data to be protected – non/sensitive?
• Need for risk assessment and risk management techniques
• Record your findings and assessments
Principle 7: Technological and
organisational security
• Ensure adequate organisational data security measures
• Prevent unauthorised as well as unlawful processing or disclosure of data
• Security measures by data controller and data processor
• Data processing and transfer agreements in place
• Staff training
• Data access on a ‘need to know’ basis – individual log-ins only
• Secure disposal of data – internally/externally - keep records
Principle 8: Processed within the EEA
unless adequate protection in place
• Data can be freely transferred within the EEA (providing
data transfer agreements are in place)
• Do not transfer data unless the country (destination and
countries data is routed via) have an adequate level of
data protection
• Need to inform individuals before transferring their data
outside the EEA but do not need their consent
Understanding the law - PECR
• Privacy and Electronic Communications Regulations 2003
(PECR)
– Came into force 11 December 2003
– Covers electronic communications – email, telephone,
SMS
Nuisance calls
• 2013 2 parliamentary inquiries
– All Party Parliamentary Group on Nuisance Calls
– Commons Select Committee on Culture Media and Sport
• 2014 Government Published Nuisance Call Action Plan
• Which? Taskforce on Consent
• Govt. consultation end of 2014 on lowering threshold
– Need for significant damage and distress
– 3 options in consultation paper
• Option 1- do nothing
• Option 2 – annoyance, inconvenience or anxiety
• Option 3- remove existing legal threshold
– Govt. opted for option 3
Nuisance calls
• Threshold may have been removed but still have to
prove serious contravention and criminal
negligence on the part of the organisation
• In force since April 6 2015 – applies to activities
after this date
• 2015 Budget – £ 3.5 million to be invested in ways
to protect vulnerable consumers from nuisance
calls
Key rules
• Sender must not conceal their identity
• Communication must have valid address where opt-outs can
be sent
• Opt-in required for individuals (B2C)
• Soft opt-in/existing customer exemption – available:
– When you are collecting the address/mobile number in the
sale or negotiations for the sale of a product or service;
– You only send communications about similar products and
services;
– You provided an opportunity at time of collection to opt-out.
Key points
• Existing customer exemption: Not an excuse for unsolicited contact
where correct permissions were never obtained
• B2B – Opt-out and marketing message needs to directly relate to the
work they do.
• Subject headers in emails must be clear and accurate
• Free and simple-to-use opt-out method must always be provided
• Action unsubscribe requests promptly – add to internal suppression
file
• Maintain different flags for different types of communication – helps to
avoid general opt-outs for all channels
Practical tips for marketers
• Data capture forms
• Marketing permissions
• Sourcing data
• Regaining lost permission
Data capture forms
• Key information to include;
– Why the data is being requested
– What the data will be used for
– Provision of an opt-in/out for marketing
– Marketing channels to be used
– Link to privacy policy
• Key information to include in privacy policy
– How the data subject can opt-out of marketing
– If the data will be processed outside the EEA
– How long the data will be kept for
– How to make a subject access request
– How to make a complaint regarding use of data
Marketing permissions
Own marketing 3rd party marketing Own marketing 3rd party marketing
Mail opt-out
opt-out (MPS
screening) opt-out opt-out
Telephone opt-out
opt-out (TPS
screening) opt-out
opt-out (TPS/ CTPS
screening)
Email
opt-in/ soft opt-
in opt-in
opt-in (unless
corporate
subscriber
exemption)
opt-in (unless
corporate subscriber
exemption)
SMS
opt-in/ soft opt-
in opt-in opt-in opt-in
Fax opt-in opt-in opt-out
opt-out (FPS
screening)
B2C B2B
Sourcing data/due diligence
• Who compiled the list? When? Has it been
amended or updated since?
• When was consent obtained?
• Who obtained consent and what was the context?
• Was it opt-in or opt-out?
• Was information provided clearly and intelligibly?
How was it provided?
• Did it list organisations by name, by description, or
any third party?
Regaining lost permissions
• Why was permission lost:
– Poor customer service?
– Poor communications timing?
– Inappropriate offers?
– In-house technical issues – permissions not recorded on
CRM system
• Revalidation exercise – obtaining up-to-date data
• Can very occasionally include request regarding marketing
update in a service message providing it is a minor part of the
message
• If you have only lost permission for certain channels, contact
via another channel to update permissions
Data protection toolkit
www.dma.org.uk/product/data-protection-toolkit
Summary and questions
Contacts
James Milligan
DMA Solicitor
T - 020 7291 3347
james.milligan@dma.org.uk
Legal Advice Email Box
legaladvice@dma.org.uk

More Related Content

What's hot

3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE
CFG
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
GrittyCC
 

What's hot (20)

3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE
 
An Introduction to Data Protection (London) - June 2015
An Introduction to Data Protection (London) - June 2015An Introduction to Data Protection (London) - June 2015
An Introduction to Data Protection (London) - June 2015
 
Data protection
Data protectionData protection
Data protection
 
ABM Display Advertising Success in the World of GDPR [PPT]
ABM Display Advertising Success in the World of GDPR [PPT]ABM Display Advertising Success in the World of GDPR [PPT]
ABM Display Advertising Success in the World of GDPR [PPT]
 
Legal update
Legal updateLegal update
Legal update
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business Advisors
 
Data Loss: Derelication of Duties?
Data Loss: Derelication of Duties?Data Loss: Derelication of Duties?
Data Loss: Derelication of Duties?
 
Ppt
PptPpt
Ppt
 
What does GDPR mean for your business?
What does GDPR mean for your business?What does GDPR mean for your business?
What does GDPR mean for your business?
 
Domain management and brand protection in the era of the EU's GDPR
Domain management and brand protection in the era of the EU's GDPRDomain management and brand protection in the era of the EU's GDPR
Domain management and brand protection in the era of the EU's GDPR
 
DLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesDLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The Challenges
 
GDPR in practice
GDPR in practiceGDPR in practice
GDPR in practice
 
Data Protection Seminar_GDPR_ISOLAS_26-06-17
Data Protection Seminar_GDPR_ISOLAS_26-06-17Data Protection Seminar_GDPR_ISOLAS_26-06-17
Data Protection Seminar_GDPR_ISOLAS_26-06-17
 
Using Social Business Software and being compliant with EU data protection la...
Using Social Business Software and being compliant with EU data protection la...Using Social Business Software and being compliant with EU data protection la...
Using Social Business Software and being compliant with EU data protection la...
 
General Data Protection Regulation (GDPR) for Identity Architects
General Data Protection Regulation (GDPR) for Identity ArchitectsGeneral Data Protection Regulation (GDPR) for Identity Architects
General Data Protection Regulation (GDPR) for Identity Architects
 
GDPR Is Around the Corner - Don't Panic
GDPR Is Around the Corner - Don't PanicGDPR Is Around the Corner - Don't Panic
GDPR Is Around the Corner - Don't Panic
 
GDPR Overview
GDPR OverviewGDPR Overview
GDPR Overview
 
Insider Threat Experiences
Insider Threat ExperiencesInsider Threat Experiences
Insider Threat Experiences
 
GDPR will be the new regulation on may 2018
GDPR will be the new regulation on may 2018GDPR will be the new regulation on may 2018
GDPR will be the new regulation on may 2018
 

Viewers also liked

Current trends in data security nursing research ppt
Current trends in data security nursing research pptCurrent trends in data security nursing research ppt
Current trends in data security nursing research ppt
Nursing Path
 
國光石化開發案的成本效益分析 -環保署--原規模及縮小規模版--修正版
國光石化開發案的成本效益分析 -環保署--原規模及縮小規模版--修正版國光石化開發案的成本效益分析 -環保署--原規模及縮小規模版--修正版
國光石化開發案的成本效益分析 -環保署--原規模及縮小規模版--修正版
佳真 王
 
Inpres 4 2010
Inpres 4   2010Inpres 4   2010
Inpres 4 2010
tiarslide
 
Primavaraaaa
PrimavaraaaaPrimavaraaaa
Primavaraaaa
ion42
 
Content Marketing Trending Topics in Tech
Content Marketing Trending Topics in TechContent Marketing Trending Topics in Tech
Content Marketing Trending Topics in Tech
UBM (Technology)
 
Did you know
Did you knowDid you know
Did you know
nkyec
 
Rapp - DMA Scotland Mobile Event
Rapp - DMA Scotland Mobile EventRapp - DMA Scotland Mobile Event
Rapp - DMA Scotland Mobile Event
Rachel Aldighieri
 
DMA Go integrated, wednesday 28 march 2012
DMA Go integrated, wednesday 28 march 2012 DMA Go integrated, wednesday 28 march 2012
DMA Go integrated, wednesday 28 march 2012
Rachel Aldighieri
 

Viewers also liked (20)

Introduction to Research Data Management - 2016-02-03 - MPLS Division, Univer...
Introduction to Research Data Management - 2016-02-03 - MPLS Division, Univer...Introduction to Research Data Management - 2016-02-03 - MPLS Division, Univer...
Introduction to Research Data Management - 2016-02-03 - MPLS Division, Univer...
 
Current trends in data security nursing research ppt
Current trends in data security nursing research pptCurrent trends in data security nursing research ppt
Current trends in data security nursing research ppt
 
Introduction to Information security
Introduction to Information securityIntroduction to Information security
Introduction to Information security
 
Introduction to Data Management and Sharing
Introduction to Data Management and SharingIntroduction to Data Management and Sharing
Introduction to Data Management and Sharing
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
5352 final week 4
5352 final week 45352 final week 4
5352 final week 4
 
Century Change JDE
Century Change JDECentury Change JDE
Century Change JDE
 
Ejemplos de los tipos de aprendizaje
Ejemplos de los tipos de aprendizajeEjemplos de los tipos de aprendizaje
Ejemplos de los tipos de aprendizaje
 
History project
History projectHistory project
History project
 
國光石化開發案的成本效益分析 -環保署--原規模及縮小規模版--修正版
國光石化開發案的成本效益分析 -環保署--原規模及縮小規模版--修正版國光石化開發案的成本效益分析 -環保署--原規模及縮小規模版--修正版
國光石化開發案的成本效益分析 -環保署--原規模及縮小規模版--修正版
 
완성...
완성...완성...
완성...
 
Inpres 4 2010
Inpres 4   2010Inpres 4   2010
Inpres 4 2010
 
Strategies To Navigate Through A Financial Storm
Strategies To Navigate Through A Financial StormStrategies To Navigate Through A Financial Storm
Strategies To Navigate Through A Financial Storm
 
Primavaraaaa
PrimavaraaaaPrimavaraaaa
Primavaraaaa
 
Content Marketing Trending Topics in Tech
Content Marketing Trending Topics in TechContent Marketing Trending Topics in Tech
Content Marketing Trending Topics in Tech
 
1 elliot muscant
1 elliot muscant1 elliot muscant
1 elliot muscant
 
Did you know
Did you knowDid you know
Did you know
 
Huda
HudaHuda
Huda
 
Rapp - DMA Scotland Mobile Event
Rapp - DMA Scotland Mobile EventRapp - DMA Scotland Mobile Event
Rapp - DMA Scotland Mobile Event
 
DMA Go integrated, wednesday 28 march 2012
DMA Go integrated, wednesday 28 march 2012 DMA Go integrated, wednesday 28 march 2012
DMA Go integrated, wednesday 28 march 2012
 

Similar to An introduction to data protection - Manchester - 24/06/15

Data protection janine paterson - direct marketing association
Data protection   janine paterson - direct marketing associationData protection   janine paterson - direct marketing association
Data protection janine paterson - direct marketing association
iof_events
 
Data Protection Act presentation
Data Protection Act presentationData Protection Act presentation
Data Protection Act presentation
Ian Clive Oultram
 
Legal update Leeds - 7 October 2014
Legal update Leeds -  7 October 2014Legal update Leeds -  7 October 2014
Legal update Leeds - 7 October 2014
Rachel Aldighieri
 
Worldwide Laws Privacy Presentation 2006
Worldwide Laws Privacy Presentation 2006Worldwide Laws Privacy Presentation 2006
Worldwide Laws Privacy Presentation 2006
Kimberly Verska
 
The dma legal update summer 2014
The dma legal update summer 2014 The dma legal update summer 2014
The dma legal update summer 2014
Rachel Aldighieri
 

Similar to An introduction to data protection - Manchester - 24/06/15 (20)

Data protection janine paterson - direct marketing association
Data protection   janine paterson - direct marketing associationData protection   janine paterson - direct marketing association
Data protection janine paterson - direct marketing association
 
Data Protection Act presentation
Data Protection Act presentationData Protection Act presentation
Data Protection Act presentation
 
Gdpr for business full
Gdpr for business fullGdpr for business full
Gdpr for business full
 
Prepare Your Firm for GDPR
Prepare Your Firm for GDPRPrepare Your Firm for GDPR
Prepare Your Firm for GDPR
 
GDPR – what does it mean for charities and what you need to consider - Iain P...
GDPR – what does it mean for charities and what you need to consider - Iain P...GDPR – what does it mean for charities and what you need to consider - Iain P...
GDPR – what does it mean for charities and what you need to consider - Iain P...
 
GDPR: Key Article Overview
GDPR: Key Article OverviewGDPR: Key Article Overview
GDPR: Key Article Overview
 
GDPR Privacy Introduction
GDPR Privacy IntroductionGDPR Privacy Introduction
GDPR Privacy Introduction
 
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 Introduction to EU General Data Protection Regulation: Planning, Implementat... Introduction to EU General Data Protection Regulation: Planning, Implementat...
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 
Public sector breakfast club, October 2016, Exeter
Public sector breakfast club, October 2016, ExeterPublic sector breakfast club, October 2016, Exeter
Public sector breakfast club, October 2016, Exeter
 
Legal update Leeds - 7 October 2014
Legal update Leeds -  7 October 2014Legal update Leeds -  7 October 2014
Legal update Leeds - 7 October 2014
 
GDPR: What does it mean for your business?
GDPR: What does it mean for your business?GDPR: What does it mean for your business?
GDPR: What does it mean for your business?
 
Worldwide Laws Privacy Presentation 2006
Worldwide Laws Privacy Presentation 2006Worldwide Laws Privacy Presentation 2006
Worldwide Laws Privacy Presentation 2006
 
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business Advisors
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulation
 
GDPR for your Payroll Bureau
GDPR for your Payroll BureauGDPR for your Payroll Bureau
GDPR for your Payroll Bureau
 
The dma legal update summer 2014
The dma legal update summer 2014 The dma legal update summer 2014
The dma legal update summer 2014
 
Scott Appleton: GDPR - Big Bang or Data Evolution?
Scott Appleton: GDPR - Big Bang or Data Evolution?Scott Appleton: GDPR - Big Bang or Data Evolution?
Scott Appleton: GDPR - Big Bang or Data Evolution?
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 

More from Rachel Aldighieri

In search of the perfect customer journey - Manchester
In search of the perfect customer journey - ManchesterIn search of the perfect customer journey - Manchester
In search of the perfect customer journey - Manchester
Rachel Aldighieri
 

More from Rachel Aldighieri (20)

Navigating B2B marketing
Navigating B2B marketingNavigating B2B marketing
Navigating B2B marketing
 
Taking the lead: customer acquisition barometer 2015
Taking the lead: customer acquisition barometer 2015Taking the lead: customer acquisition barometer 2015
Taking the lead: customer acquisition barometer 2015
 
The value of mail: what planners and marketers need to know
The value of mail: what planners and marketers need to knowThe value of mail: what planners and marketers need to know
The value of mail: what planners and marketers need to know
 
Sharpen your social media skills
Sharpen your social media skillsSharpen your social media skills
Sharpen your social media skills
 
Stop selling and start serving: how to bring data, creativity and technology ...
Stop selling and start serving: how to bring data, creativity and technology ...Stop selling and start serving: how to bring data, creativity and technology ...
Stop selling and start serving: how to bring data, creativity and technology ...
 
FEDMA - Legal Fact Pack Summary and Pre-order Form
FEDMA - Legal Fact Pack Summary and Pre-order FormFEDMA - Legal Fact Pack Summary and Pre-order Form
FEDMA - Legal Fact Pack Summary and Pre-order Form
 
European Legal and Privacy Update with FEDMA
European Legal and Privacy Update with FEDMAEuropean Legal and Privacy Update with FEDMA
European Legal and Privacy Update with FEDMA
 
DMA Awards unplugged: a practical workshop - Thursday 13 August
DMA Awards unplugged: a practical workshop - Thursday 13 AugustDMA Awards unplugged: a practical workshop - Thursday 13 August
DMA Awards unplugged: a practical workshop - Thursday 13 August
 
DMA Awards unplugged - 30 July 2015
DMA Awards unplugged - 30 July 2015DMA Awards unplugged - 30 July 2015
DMA Awards unplugged - 30 July 2015
 
DMA Copywriting census reveal - Manchester
DMA Copywriting census reveal - ManchesterDMA Copywriting census reveal - Manchester
DMA Copywriting census reveal - Manchester
 
Data detailed: how to buy and sell information responsibly - 08.07.2015
Data detailed: how to buy and sell information responsibly - 08.07.2015Data detailed: how to buy and sell information responsibly - 08.07.2015
Data detailed: how to buy and sell information responsibly - 08.07.2015
 
Legal update - 1 July
Legal update - 1 JulyLegal update - 1 July
Legal update - 1 July
 
Data privacy: what the consumer really thinks - 30.06.2015
Data privacy: what the consumer really thinks - 30.06.2015Data privacy: what the consumer really thinks - 30.06.2015
Data privacy: what the consumer really thinks - 30.06.2015
 
In search of the perfect customer journey - Manchester
In search of the perfect customer journey - ManchesterIn search of the perfect customer journey - Manchester
In search of the perfect customer journey - Manchester
 
ZEDTalk 3: Creativity & ROI
ZEDTalk 3: Creativity & ROIZEDTalk 3: Creativity & ROI
ZEDTalk 3: Creativity & ROI
 
Simon Gill, Chief Creative Officer, DigitasLBi
Simon Gill, Chief Creative Officer, DigitasLBiSimon Gill, Chief Creative Officer, DigitasLBi
Simon Gill, Chief Creative Officer, DigitasLBi
 
Mark Hancock, Planning Director, The Real Adventure Unlimited...
Mark Hancock, Planning Director, The Real Adventure Unlimited...Mark Hancock, Planning Director, The Real Adventure Unlimited...
Mark Hancock, Planning Director, The Real Adventure Unlimited...
 
Tim Lindsay, Chief Executive Officer, D&AD
Tim Lindsay, Chief Executive Officer, D&ADTim Lindsay, Chief Executive Officer, D&AD
Tim Lindsay, Chief Executive Officer, D&AD
 
David Meikle, Founding Partner, Redsalt
David Meikle, Founding Partner, RedsaltDavid Meikle, Founding Partner, Redsalt
David Meikle, Founding Partner, Redsalt
 
Thinking inside the box data permission strategies - Wednesday 18 November
Thinking inside the box data permission strategies - Wednesday 18 NovemberThinking inside the box data permission strategies - Wednesday 18 November
Thinking inside the box data permission strategies - Wednesday 18 November
 

Recently uploaded

Liquid Staking: An Overview for Beginners in 2024
Liquid Staking: An Overview for Beginners in 2024Liquid Staking: An Overview for Beginners in 2024
Liquid Staking: An Overview for Beginners in 2024
nehapardhi711
 
Relatório da OMS / Unicef / IBFAN sobre a situação do Código Internacional de...
Relatório da OMS / Unicef / IBFAN sobre a situação do Código Internacional de...Relatório da OMS / Unicef / IBFAN sobre a situação do Código Internacional de...
Relatório da OMS / Unicef / IBFAN sobre a situação do Código Internacional de...
Prof. Marcus Renato de Carvalho
 
Unlocking Success: The Leading SEO Reseller Services in India
Unlocking Success: The Leading SEO Reseller Services in IndiaUnlocking Success: The Leading SEO Reseller Services in India
Unlocking Success: The Leading SEO Reseller Services in India
PitchPineMedia1
 
Search Engine Marketing - Competitor and Keyword research
Search Engine Marketing  - Competitor and Keyword researchSearch Engine Marketing  - Competitor and Keyword research
Search Engine Marketing - Competitor and Keyword research
ETMARK ACADEMY
 
Digital Commerce Lecture for Advanced Digital & Social Media Strategy at UCLA...
Digital Commerce Lecture for Advanced Digital & Social Media Strategy at UCLA...Digital Commerce Lecture for Advanced Digital & Social Media Strategy at UCLA...
Digital Commerce Lecture for Advanced Digital & Social Media Strategy at UCLA...
Valters Lauzums
 

Recently uploaded (20)

How to Run Landing Page Tests On and Off Paid Social Platforms
How to Run Landing Page Tests On and Off Paid Social PlatformsHow to Run Landing Page Tests On and Off Paid Social Platforms
How to Run Landing Page Tests On and Off Paid Social Platforms
 
Digital Marketing Training In Bangalore
Digital Marketing Training In BangaloreDigital Marketing Training In Bangalore
Digital Marketing Training In Bangalore
 
Liquid Staking: An Overview for Beginners in 2024
Liquid Staking: An Overview for Beginners in 2024Liquid Staking: An Overview for Beginners in 2024
Liquid Staking: An Overview for Beginners in 2024
 
Relatório da OMS / Unicef / IBFAN sobre a situação do Código Internacional de...
Relatório da OMS / Unicef / IBFAN sobre a situação do Código Internacional de...Relatório da OMS / Unicef / IBFAN sobre a situação do Código Internacional de...
Relatório da OMS / Unicef / IBFAN sobre a situação do Código Internacional de...
 
Monthly Social Media News Update May 2024
Monthly Social Media News Update May 2024Monthly Social Media News Update May 2024
Monthly Social Media News Update May 2024
 
Ash By Ash Benson Rebrand Creative Direction
Ash By Ash Benson Rebrand Creative DirectionAsh By Ash Benson Rebrand Creative Direction
Ash By Ash Benson Rebrand Creative Direction
 
What is Digital Marketing? Advantages and Disadvantages
What is Digital Marketing? Advantages and DisadvantagesWhat is Digital Marketing? Advantages and Disadvantages
What is Digital Marketing? Advantages and Disadvantages
 
SMM Cheap - No. 1 SMM panel in the world
SMM Cheap - No. 1 SMM panel in the worldSMM Cheap - No. 1 SMM panel in the world
SMM Cheap - No. 1 SMM panel in the world
 
ThinkNow 2024 Consumer Financial Wellness Report
ThinkNow 2024 Consumer Financial Wellness ReportThinkNow 2024 Consumer Financial Wellness Report
ThinkNow 2024 Consumer Financial Wellness Report
 
34-Rahul-Mande.pdf PROJECT REPORT MBA 4TH SEMESTER
34-Rahul-Mande.pdf PROJECT REPORT MBA 4TH SEMESTER34-Rahul-Mande.pdf PROJECT REPORT MBA 4TH SEMESTER
34-Rahul-Mande.pdf PROJECT REPORT MBA 4TH SEMESTER
 
The Old Oak - Press Kit - Cannes Film Festival 2023
The Old Oak - Press Kit - Cannes Film Festival 2023The Old Oak - Press Kit - Cannes Film Festival 2023
The Old Oak - Press Kit - Cannes Film Festival 2023
 
The Wealth of a Homeonwers association is analogous to the wealth of a Nation
The Wealth of a Homeonwers association is analogous to the wealth of a NationThe Wealth of a Homeonwers association is analogous to the wealth of a Nation
The Wealth of a Homeonwers association is analogous to the wealth of a Nation
 
SAUDI ARABIA MARKET OVERVIEW-PARTICLE BOARD.docx.pdf
SAUDI ARABIA MARKET OVERVIEW-PARTICLE BOARD.docx.pdfSAUDI ARABIA MARKET OVERVIEW-PARTICLE BOARD.docx.pdf
SAUDI ARABIA MARKET OVERVIEW-PARTICLE BOARD.docx.pdf
 
Unlocking Success: The Leading SEO Reseller Services in India
Unlocking Success: The Leading SEO Reseller Services in IndiaUnlocking Success: The Leading SEO Reseller Services in India
Unlocking Success: The Leading SEO Reseller Services in India
 
Kế hoạch Digital Marketing cho bánh Cosy
Kế hoạch Digital Marketing cho bánh CosyKế hoạch Digital Marketing cho bánh Cosy
Kế hoạch Digital Marketing cho bánh Cosy
 
AI-Powered Personalization: Principles, Use Cases, and Its Impact on CRO
AI-Powered Personalization: Principles, Use Cases, and Its Impact on CROAI-Powered Personalization: Principles, Use Cases, and Its Impact on CRO
AI-Powered Personalization: Principles, Use Cases, and Its Impact on CRO
 
Search Engine Marketing - Competitor and Keyword research
Search Engine Marketing  - Competitor and Keyword researchSearch Engine Marketing  - Competitor and Keyword research
Search Engine Marketing - Competitor and Keyword research
 
Top 3 Ways to Align Sales and Marketing Teams for Rapid Growth
Top 3 Ways to Align Sales and Marketing Teams for Rapid GrowthTop 3 Ways to Align Sales and Marketing Teams for Rapid Growth
Top 3 Ways to Align Sales and Marketing Teams for Rapid Growth
 
Digital Commerce Lecture for Advanced Digital & Social Media Strategy at UCLA...
Digital Commerce Lecture for Advanced Digital & Social Media Strategy at UCLA...Digital Commerce Lecture for Advanced Digital & Social Media Strategy at UCLA...
Digital Commerce Lecture for Advanced Digital & Social Media Strategy at UCLA...
 
Core Web Vitals SEO Workshop - improve your performance [pdf]
Core Web Vitals SEO Workshop - improve your performance [pdf]Core Web Vitals SEO Workshop - improve your performance [pdf]
Core Web Vitals SEO Workshop - improve your performance [pdf]
 

An introduction to data protection - Manchester - 24/06/15

  • 1. Wednesday 24 June 2015, Centurion House, Manchester James Milligan, Solicitor, DMA @DMA_UK #dmadata An introduction to data protection
  • 2. Agenda 2.00 pm Registration 2:15 pm Welcome and Why is data protection important? 2.20 pm Understanding the law The Data Protection Act 1998 Key terms 8 Principles 3.10 pm Break 3.30 pm Understanding the law The Privacy and Electronic Communications Regulation 2003 Key rules Key points 4:00 pm Practical tips for marketers 4.20 pm Summary and questions 4.30 pm Close
  • 3. Why is it important? • It helps us to protect information about ourselves and others • It helps us avoid damage to the reputation of our organisation • It makes good business sense – it can increase efficiency and effectiveness • It helps us avoid enforcement action by the Information Commissioner – both employers and employees can be prosecuted – companies can face a monetary penalty of up to £500,000 for major breaches
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. Understanding the law - DPA • Data Protection Act 1998 (DPA) – Came into force 1 March 2000 – Replaced 1984 Act – Covers doing anything with data – Applies electronic records and some manual records
  • 13. Key terms • Personal data – any data that can be used to identify a living individual – Examples of personal data can include: • Name and address • Email address (even business email addresses if they are non generic) • Name and telephone number • Photographs – Only personal data is protected by the DPA • Sensitive personal data – any data relating to: • Health • Race or ethnic origin • Political opinions • Religious beliefs • Trade union membership • Sex life • Criminal proceedings or convictions
  • 14. Key terms • Processing – obtaining, recording or holding information or carrying out any operation on the information including • Organising • Adapting • Retrieving • Disclosing • Blocking • Destroying • Data subject – a living identifiable individual to whom the personal data relates
  • 15. Key terms • Data controller - Determines how data will be used - Usually owns or rents the data (may be done by 3rd party on their behalf) - Required to notify (register) as a controller with the ICO - May be fined by ICO if any data breaches arise • Data processor - Processes data on behalf of controller or other processor - Processing can be anything from data storage to advanced data manipulation and modelling - Includes companies that manage / broker / collect data on behalf of others
  • 16. Determining whether data controller or data processor • Look at activities each party is carrying out • Data Controller – over-arching decisions • Data Processor – freedom to use technical knowledge • If both parties working well together and dealing with data protection compliance – no real issues • Important to determine for when things go wrong e.g. data breach • Establish roles and responsibilities before work starts • Obligations of both parties under DPA 1998 • Need for operational guidance behind data processing contract • Remember that a data processor will also be a data controller in respect of own employees.
  • 17. The 8 principles • Fairly and lawfully collected • Processed for specified and limited purposes • Adequate, relevant and not excessive • Accurate and kept up to date • Not kept for longer than necessary • Processed in accordance with Individuals’ rights • Security – appropriate technical and organisational measures • Not transferred outside the European Economic Area (EEA) unless adequate protections are in place • (EEA: The 28 member states of the EU, plus Iceland, Liechtenstein and Norway)
  • 18. Principle 1: Fairly and lawfully collected • Fair processing information provided • Organisation’s identity given • Purpose of collection made clear • Further information necessary • Correct permissions obtained - Implied consent: opt-out mechanism provided - Express consent: opt-in mechanism provided • Sensitive personal data only captured if strictly necessary
  • 19. Principle 2: Processed for limited purposes • Only process data for the purpose(s) you told the individual • Make the purpose(s) clear at the point of data collection • Change of circumstances – what happens to the data then? • Subsequent use of data for direct marketing purposes • Data cleansing – regular and ad hoc
  • 20. Principle 3: Adequate, relevant and not excessive • Minimum amount of information required • Additional information for specific individuals • Collect data that you will use now • Collection of data that ‘may be useful’ in the future is not permitted
  • 21. Principle 4: Accurate and kept up to date • Take reasonable steps to ensure accuracy (but what is ‘reasonable’?) • Ensure data is not incorrect or misleading • Undertake regular data cleansing • Clean data against the relevant preference service files and other appropriate cleansing files
  • 22. Principle 5: Not kept for longer than necessary • Keep for as long as purpose collected for • Suppression lists
  • 23. Principle 6: Processed in accordance with the right of data subjects • Subject access requests • ‘Where did you get my data from?’ • Right to prevent direct marketing • Customer service / legally required communications – no opt-out provision required • Right to have inaccurate data corrected
  • 24. Principle 7: Technological and organisational security • Data security must be appropriate – take account of: – Current state of technological development – Cost of implementing security measures – Potential harm that could result from a data breach – Nature of data to be protected – non/sensitive? • Need for risk assessment and risk management techniques • Record your findings and assessments
  • 25. Principle 7: Technological and organisational security • Ensure adequate organisational data security measures • Prevent unauthorised as well as unlawful processing or disclosure of data • Security measures by data controller and data processor • Data processing and transfer agreements in place • Staff training • Data access on a ‘need to know’ basis – individual log-ins only • Secure disposal of data – internally/externally - keep records
  • 26. Principle 8: Processed within the EEA unless adequate protection in place • Data can be freely transferred within the EEA (providing data transfer agreements are in place) • Do not transfer data unless the country (destination and countries data is routed via) have an adequate level of data protection • Need to inform individuals before transferring their data outside the EEA but do not need their consent
  • 27. Understanding the law - PECR • Privacy and Electronic Communications Regulations 2003 (PECR) – Came into force 11 December 2003 – Covers electronic communications – email, telephone, SMS
  • 28.
  • 29. Nuisance calls • 2013 2 parliamentary inquiries – All Party Parliamentary Group on Nuisance Calls – Commons Select Committee on Culture Media and Sport • 2014 Government Published Nuisance Call Action Plan • Which? Taskforce on Consent • Govt. consultation end of 2014 on lowering threshold – Need for significant damage and distress – 3 options in consultation paper • Option 1- do nothing • Option 2 – annoyance, inconvenience or anxiety • Option 3- remove existing legal threshold – Govt. opted for option 3
  • 30. Nuisance calls • Threshold may have been removed but still have to prove serious contravention and criminal negligence on the part of the organisation • In force since April 6 2015 – applies to activities after this date • 2015 Budget – £ 3.5 million to be invested in ways to protect vulnerable consumers from nuisance calls
  • 31. Key rules • Sender must not conceal their identity • Communication must have valid address where opt-outs can be sent • Opt-in required for individuals (B2C) • Soft opt-in/existing customer exemption – available: – When you are collecting the address/mobile number in the sale or negotiations for the sale of a product or service; – You only send communications about similar products and services; – You provided an opportunity at time of collection to opt-out.
  • 32. Key points • Existing customer exemption: Not an excuse for unsolicited contact where correct permissions were never obtained • B2B – Opt-out and marketing message needs to directly relate to the work they do. • Subject headers in emails must be clear and accurate • Free and simple-to-use opt-out method must always be provided • Action unsubscribe requests promptly – add to internal suppression file • Maintain different flags for different types of communication – helps to avoid general opt-outs for all channels
  • 33. Practical tips for marketers • Data capture forms • Marketing permissions • Sourcing data • Regaining lost permission
  • 34. Data capture forms • Key information to include; – Why the data is being requested – What the data will be used for – Provision of an opt-in/out for marketing – Marketing channels to be used – Link to privacy policy • Key information to include in privacy policy – How the data subject can opt-out of marketing – If the data will be processed outside the EEA – How long the data will be kept for – How to make a subject access request – How to make a complaint regarding use of data
  • 35. Marketing permissions Own marketing 3rd party marketing Own marketing 3rd party marketing Mail opt-out opt-out (MPS screening) opt-out opt-out Telephone opt-out opt-out (TPS screening) opt-out opt-out (TPS/ CTPS screening) Email opt-in/ soft opt- in opt-in opt-in (unless corporate subscriber exemption) opt-in (unless corporate subscriber exemption) SMS opt-in/ soft opt- in opt-in opt-in opt-in Fax opt-in opt-in opt-out opt-out (FPS screening) B2C B2B
  • 36. Sourcing data/due diligence • Who compiled the list? When? Has it been amended or updated since? • When was consent obtained? • Who obtained consent and what was the context? • Was it opt-in or opt-out? • Was information provided clearly and intelligibly? How was it provided? • Did it list organisations by name, by description, or any third party?
  • 37. Regaining lost permissions • Why was permission lost: – Poor customer service? – Poor communications timing? – Inappropriate offers? – In-house technical issues – permissions not recorded on CRM system • Revalidation exercise – obtaining up-to-date data • Can very occasionally include request regarding marketing update in a service message providing it is a minor part of the message • If you have only lost permission for certain channels, contact via another channel to update permissions
  • 40. Contacts James Milligan DMA Solicitor T - 020 7291 3347 james.milligan@dma.org.uk Legal Advice Email Box legaladvice@dma.org.uk