SlideShare una empresa de Scribd logo
1 de 23
Data Protection for CYP
organisations
This presentation is intended to help you
understand aspects of the Data Protection
Act 1998 and related legislation.
It is not intended to provide detailed advice
on specific points, and is not necessarily a full
statement of the law.
Data Protection overview


    ∗ Prevent harm to the individuals whose data we hold,
      or other people (How?)
    ∗ Reassure people that we use their information
      responsibly, so that they trust us (How?)
    ∗ Comply with specific legal requirements (Such as?)




3
Preventing harm


    ∗ Keep information only in the right hands
    ∗ Hold accurate, good quality data




4
Reassuring people so that they
               trust us

    ∗ Be transparent – open and honest, don’t hide things
      or go behind people’s back
    ∗ Offer people a reasonable choice over how you use
      their data, and what for




5
Additional legal obligations


    ∗   Right to opt out of direct marketing
    ∗   Right of Subject Access
    ∗   Notification
    ∗   (And others)




6
The Data Protection Principles

1. Data ‘processing’ must be ‘fair’ and legal
2. You must limit your use of data to the purpose(s) you
   obtained it for
3. Data must be adequate, relevant & not excessive
4. Data must be accurate & up to date
5. Data must not be held longer than necessary
6. Data Subjects’ rights must be respected
7. You must have appropriate security
8. Special rules apply to transfers abroad

7
Security (Principle 7)


    Security is about ensuring that the boundaries set by your
    confidentiality policies are protected, so that information
    does not fall into the wrong hands.
    The Data Protection Act says you must prevent:
       ∗ unauthorised access to personal data
       ∗ accidental loss or damage of personal data
    The security measures must be appropriate.
    They must also be technical and organisational.
    The Information Commissioner can impose a penalty of up
    to £500,000 for gross breaches of security.
8
Penalties for security breaches

∗ Herts. County Council twice faxed details of child abuse cases to the
  wrong people
∗ Ealing & Hounslow councils were jointly responsible for the theft of an
  unencrypted laptop containing 1700 clients’ details from an employee’s
  house
∗ Worcs. County Council e-mailed highly sensitive data about a large
  number of vulnerable people to 23 unintended recipients
∗ Powys County Council mixed up two child protection reports and
  posted part of one to someone who recognised the people involved
∗ A lawyer’s website was hacked and details of at least 6000 people
  leaked
Lessons from security breaches


∗ ‘Data in transit’ is where most serious breaches occur
∗ Simple mistakes are usually the cause:
  ∗ Sending things to the wrong people – by fax, e-mail or in
    the post – or losing laptops, USB sticks, etc.
∗ Disclosing confidential material, even about only one
  or two people is serious
∗ Laptops must be encrypted
∗ Your website security is your responsibility
Cloud computing
                  ISP


       E-mail
                          Web site
                Backup
       Word
     processing

          Database
                  ?      Photos
Cloud computing
                  ISP


       E-mail
                          Web site
                Backup


                    ?
       Word              Photos
     processing

          Database
Cloud computing characteristics


Cheap and flexible, especially for small organisations:
∗ Standard offering
∗ Available anywhere there is an internet connection
∗ Suppliers claim good security and service levels
Based on:
∗ Shared facilities
∗ Location of data irrelevant (and may be obscure)
∗ May be layers of sub-contract
Cloud examples


∗   Office programs (Microsoft 365, Google Apps)
∗   Storage & processing capacity (Amazon)
∗   Contact management database (Salesforce, CiviCRM)
∗   Photo/video storage and sharing (Picasa, YouTube)
∗   Online meetings & phone calls (GoToMeeting, Skype)
∗   Social networking sites when used by organisations
Security and the cloud

∗ Breaches do occur
∗ Standard terms and conditions often non-negotiable
∗ Due diligence
  ∗ Understand what you are checking
  ∗ International standards
    ∗   ISO 27000 series (from British Standards Institute)
    ∗   self-assessed less reliable than certified
    ∗   check credentials of certifying company
    ∗   relevance & scope (ISO 27000 Statement of Applicability)
  ∗ HMG Security Framework substantially based on ISO 27000
  ∗ SAS70 (US) – auditing process, not security
What else can go wrong?

∗ Loss of service
  ∗ at their end
  ∗ at your end
∗ Retrieving your data if the service ceases or you get
  into a dispute
∗ Contract terms which allow the supplier to make use
  of your data (mainly consumer-oriented services)
∗ Unclear ownership/location of data and the
  equipment it is stored on (within Europe, no problem)
∗ Unilateral changes in policy by provider
And finally …


∗ Most countries have laws allowing authorities to
  access data
∗ US Patriot Act ostensibly anti-terrorist
  ∗ has also been used in non-terrorist cases
  ∗ supplier may not agree (or even be allowed) to inform
    customer of access
∗ Include in risk assessment
So what do you need to do?


∗ Check the contract (or standard terms and conditions) very
  carefully on areas like:
  ∗ security
  ∗ location of data (especially if it could be outside the EEA)
  ∗ liability/sub contractors
  ∗ back-up/access
  ∗ copyright (e.g. Google)
∗ Use your findings to make and record a risk assessment and get
  authorisation to proceed
∗ Be transparent with your Data Subjects
The new cookie law


∗ Privacy and Electronic Communications (EC Directive)
  (Amendment) Regulations 2011 came into force on
  26th May 2011
∗ Information Commissioner announced a year’s grace
  before enforcement action would be taken
∗ Information Commissioner issued guidance in
  December 2011, updated May 2012
What the Regulations say


∗ You must not store information (e.g. through a
  cookie) on someone else’s computer unless:
  ∗ they have clear information about the purpose; and
  ∗ they have given consent
∗ You only have to ask them the first time
∗ They can consent through browser settings (but …)
∗ You don’t need consent for cookies that are ‘strictly
  necessary’ for the functioning of a website
What the Information
         Commissioner says

∗ He wants ‘good solutions rather than rushed ones’.
∗ No ‘wave of knee-jerk formal enforcement action’ as
  long as people are making the effort to comply.
∗ There are ‘pockets of good practice’ and while he
  ‘cannot endorse specific products or services’, there
  are ‘people going about this the right way’.
∗ Analytics cookies are covered, but not a priority.
What do we need to do?


∗   Document what cookies we have
∗   Assess how intrusive they are
∗   Decide whether we really need them all
∗   Provide appropriate information
    ∗ In the privacy statement
    ∗ At appropriate points on the website
∗ Decide what we need consent for and how to get it
∗ Work out how people can withdraw consent
“After-sales service”


∗ Any queries:
  ∗ paul@paulticher.com
  ∗ www.paulticher.com
  ∗ 0116 273 8191

Más contenido relacionado

La actualidad más candente

La actualidad más candente (18)

Diretiva Comunitária Proteção de Dados Pessoais
Diretiva Comunitária Proteção de Dados Pessoais Diretiva Comunitária Proteção de Dados Pessoais
Diretiva Comunitária Proteção de Dados Pessoais
 
Privacy by design
Privacy by designPrivacy by design
Privacy by design
 
EU GDPR - 12 Steps To Compliance
EU GDPR - 12 Steps To Compliance EU GDPR - 12 Steps To Compliance
EU GDPR - 12 Steps To Compliance
 
Data Privacy & Compliance Considerations on Using Cloud Services
Data Privacy & Compliance Considerations on Using Cloud ServicesData Privacy & Compliance Considerations on Using Cloud Services
Data Privacy & Compliance Considerations on Using Cloud Services
 
Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)
 
Modelling the General Data Protection Regulation
Modelling the General Data Protection RegulationModelling the General Data Protection Regulation
Modelling the General Data Protection Regulation
 
GDPR The New Data Protection Law coming into effect May 2018. What does it me...
GDPR The New Data Protection Law coming into effect May 2018. What does it me...GDPR The New Data Protection Law coming into effect May 2018. What does it me...
GDPR The New Data Protection Law coming into effect May 2018. What does it me...
 
EU US Privacy Shield vs. GDPR Infographic from TRUSTe
EU US Privacy Shield vs. GDPR Infographic from TRUSTeEU US Privacy Shield vs. GDPR Infographic from TRUSTe
EU US Privacy Shield vs. GDPR Infographic from TRUSTe
 
VMTN6642E - GDPR Slide Deck
VMTN6642E - GDPR Slide DeckVMTN6642E - GDPR Slide Deck
VMTN6642E - GDPR Slide Deck
 
Gdpr action plan - ISSA
Gdpr action plan - ISSAGdpr action plan - ISSA
Gdpr action plan - ISSA
 
The EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to knowThe EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to know
 
What does GDPR mean for your charity?
What does GDPR mean for your charity?What does GDPR mean for your charity?
What does GDPR mean for your charity?
 
GDPR Awareness for YOU
GDPR Awareness for YOUGDPR Awareness for YOU
GDPR Awareness for YOU
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
 
Data protection
Data protectionData protection
Data protection
 
GDPR for dummies
GDPR for dummies  GDPR for dummies
GDPR for dummies
 
Introduction to gdpr
Introduction to gdprIntroduction to gdpr
Introduction to gdpr
 
GDPR: More reasons for information security
GDPR: More reasons for information securityGDPR: More reasons for information security
GDPR: More reasons for information security
 

Similar a Data protection For CYP Organisations

CHASE 2014 data protection presentation Paul Ticher
CHASE 2014 data protection presentation Paul TicherCHASE 2014 data protection presentation Paul Ticher
CHASE 2014 data protection presentation Paul Ticher
amy_hatton
 

Similar a Data protection For CYP Organisations (20)

Blake Lapthorn's In-House Lawyer and Decision Maker's forum - 12 September 2013
Blake Lapthorn's In-House Lawyer and Decision Maker's forum - 12 September 2013Blake Lapthorn's In-House Lawyer and Decision Maker's forum - 12 September 2013
Blake Lapthorn's In-House Lawyer and Decision Maker's forum - 12 September 2013
 
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 Introduction to EU General Data Protection Regulation: Planning, Implementat... Introduction to EU General Data Protection Regulation: Planning, Implementat...
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...
 
GDPR Part 1: Quick Facts
GDPR Part 1: Quick FactsGDPR Part 1: Quick Facts
GDPR Part 1: Quick Facts
 
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
 
Kawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the CloudKawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the Cloud
 
Cross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive dataCross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive data
 
CASE STUDY: New EU legislation: how to avoid data disaster
CASE STUDY: New EU legislation: how to avoid data disasterCASE STUDY: New EU legislation: how to avoid data disaster
CASE STUDY: New EU legislation: how to avoid data disaster
 
CHASE 2014 data protection presentation Paul Ticher
CHASE 2014 data protection presentation Paul TicherCHASE 2014 data protection presentation Paul Ticher
CHASE 2014 data protection presentation Paul Ticher
 
Isaca new delhi india - privacy and big data
Isaca new delhi india - privacy and big dataIsaca new delhi india - privacy and big data
Isaca new delhi india - privacy and big data
 
Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1Data Privacy for Information Security Professionals Part 1
Data Privacy for Information Security Professionals Part 1
 
Gdpr action plan
Gdpr action plan Gdpr action plan
Gdpr action plan
 
Safe Harbor Webinar
Safe Harbor WebinarSafe Harbor Webinar
Safe Harbor Webinar
 
The EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organizationThe EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organization
 
Data Protection: Transitioning to the GDPR
Data Protection: Transitioning to the GDPRData Protection: Transitioning to the GDPR
Data Protection: Transitioning to the GDPR
 
9 Practical Steps 2 GDPR Compliance
9 Practical Steps 2 GDPR Compliance9 Practical Steps 2 GDPR Compliance
9 Practical Steps 2 GDPR Compliance
 
Scott Appleton: GDPR - Big Bang or Data Evolution?
Scott Appleton: GDPR - Big Bang or Data Evolution?Scott Appleton: GDPR - Big Bang or Data Evolution?
Scott Appleton: GDPR - Big Bang or Data Evolution?
 
Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event Vuzion Love Cloud GDPR Event
Vuzion Love Cloud GDPR Event
 
GDPR webinar presentation | LawBite
GDPR webinar presentation | LawBiteGDPR webinar presentation | LawBite
GDPR webinar presentation | LawBite
 
What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...What All Organisations Need to Know About Data Protection and Cloud Computing...
What All Organisations Need to Know About Data Protection and Cloud Computing...
 

Más de Cliff Ashcroft

Using technology to help deliver Advice Services
Using technology to help deliver Advice ServicesUsing technology to help deliver Advice Services
Using technology to help deliver Advice Services
Cliff Ashcroft
 

Más de Cliff Ashcroft (20)

Facebook for Charities
Facebook for CharitiesFacebook for Charities
Facebook for Charities
 
Google Analytics for charities
Google Analytics for charitiesGoogle Analytics for charities
Google Analytics for charities
 
EU General Data Protection Regulation - Update 2017
EU General Data Protection Regulation - Update 2017EU General Data Protection Regulation - Update 2017
EU General Data Protection Regulation - Update 2017
 
Webinar: Office 365 for Beginners
Webinar: Office 365 for BeginnersWebinar: Office 365 for Beginners
Webinar: Office 365 for Beginners
 
Using Technology to Help deliver Advice Services
Using Technology to Help deliver Advice ServicesUsing Technology to Help deliver Advice Services
Using Technology to Help deliver Advice Services
 
Google Analytics for Charities
Google Analytics for CharitiesGoogle Analytics for Charities
Google Analytics for Charities
 
Office 365 and using SharePoint Online
Office 365 and using SharePoint OnlineOffice 365 and using SharePoint Online
Office 365 and using SharePoint Online
 
Top 10 social media tips
Top 10 social media tipsTop 10 social media tips
Top 10 social media tips
 
Community IT resources
Community IT resourcesCommunity IT resources
Community IT resources
 
Computanews 07
Computanews 07Computanews 07
Computanews 07
 
Computanews 02
Computanews 02Computanews 02
Computanews 02
 
Computanews #1 (1984)
Computanews #1 (1984)Computanews #1 (1984)
Computanews #1 (1984)
 
Using technology to help deliver Advice Services
Using technology to help deliver Advice ServicesUsing technology to help deliver Advice Services
Using technology to help deliver Advice Services
 
E access13
E access13E access13
E access13
 
Connecting Care @ National Care Forum
Connecting Care @ National Care ForumConnecting Care @ National Care Forum
Connecting Care @ National Care Forum
 
Cloudsourcing2013
Cloudsourcing2013Cloudsourcing2013
Cloudsourcing2013
 
Lasa esolutions campaigning and awareness
Lasa esolutions campaigning and awarenessLasa esolutions campaigning and awareness
Lasa esolutions campaigning and awareness
 
User experience
User experienceUser experience
User experience
 
Better Digital Marketing
Better Digital MarketingBetter Digital Marketing
Better Digital Marketing
 
Lucy Buck
Lucy BuckLucy Buck
Lucy Buck
 

Último

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 

Data protection For CYP Organisations

  • 1. Data Protection for CYP organisations
  • 2. This presentation is intended to help you understand aspects of the Data Protection Act 1998 and related legislation. It is not intended to provide detailed advice on specific points, and is not necessarily a full statement of the law.
  • 3. Data Protection overview ∗ Prevent harm to the individuals whose data we hold, or other people (How?) ∗ Reassure people that we use their information responsibly, so that they trust us (How?) ∗ Comply with specific legal requirements (Such as?) 3
  • 4. Preventing harm ∗ Keep information only in the right hands ∗ Hold accurate, good quality data 4
  • 5. Reassuring people so that they trust us ∗ Be transparent – open and honest, don’t hide things or go behind people’s back ∗ Offer people a reasonable choice over how you use their data, and what for 5
  • 6. Additional legal obligations ∗ Right to opt out of direct marketing ∗ Right of Subject Access ∗ Notification ∗ (And others) 6
  • 7. The Data Protection Principles 1. Data ‘processing’ must be ‘fair’ and legal 2. You must limit your use of data to the purpose(s) you obtained it for 3. Data must be adequate, relevant & not excessive 4. Data must be accurate & up to date 5. Data must not be held longer than necessary 6. Data Subjects’ rights must be respected 7. You must have appropriate security 8. Special rules apply to transfers abroad 7
  • 8. Security (Principle 7) Security is about ensuring that the boundaries set by your confidentiality policies are protected, so that information does not fall into the wrong hands. The Data Protection Act says you must prevent: ∗ unauthorised access to personal data ∗ accidental loss or damage of personal data The security measures must be appropriate. They must also be technical and organisational. The Information Commissioner can impose a penalty of up to £500,000 for gross breaches of security. 8
  • 9. Penalties for security breaches ∗ Herts. County Council twice faxed details of child abuse cases to the wrong people ∗ Ealing & Hounslow councils were jointly responsible for the theft of an unencrypted laptop containing 1700 clients’ details from an employee’s house ∗ Worcs. County Council e-mailed highly sensitive data about a large number of vulnerable people to 23 unintended recipients ∗ Powys County Council mixed up two child protection reports and posted part of one to someone who recognised the people involved ∗ A lawyer’s website was hacked and details of at least 6000 people leaked
  • 10. Lessons from security breaches ∗ ‘Data in transit’ is where most serious breaches occur ∗ Simple mistakes are usually the cause: ∗ Sending things to the wrong people – by fax, e-mail or in the post – or losing laptops, USB sticks, etc. ∗ Disclosing confidential material, even about only one or two people is serious ∗ Laptops must be encrypted ∗ Your website security is your responsibility
  • 11. Cloud computing ISP E-mail Web site Backup Word processing Database ? Photos
  • 12. Cloud computing ISP E-mail Web site Backup ? Word Photos processing Database
  • 13. Cloud computing characteristics Cheap and flexible, especially for small organisations: ∗ Standard offering ∗ Available anywhere there is an internet connection ∗ Suppliers claim good security and service levels Based on: ∗ Shared facilities ∗ Location of data irrelevant (and may be obscure) ∗ May be layers of sub-contract
  • 14. Cloud examples ∗ Office programs (Microsoft 365, Google Apps) ∗ Storage & processing capacity (Amazon) ∗ Contact management database (Salesforce, CiviCRM) ∗ Photo/video storage and sharing (Picasa, YouTube) ∗ Online meetings & phone calls (GoToMeeting, Skype) ∗ Social networking sites when used by organisations
  • 15. Security and the cloud ∗ Breaches do occur ∗ Standard terms and conditions often non-negotiable ∗ Due diligence ∗ Understand what you are checking ∗ International standards ∗ ISO 27000 series (from British Standards Institute) ∗ self-assessed less reliable than certified ∗ check credentials of certifying company ∗ relevance & scope (ISO 27000 Statement of Applicability) ∗ HMG Security Framework substantially based on ISO 27000 ∗ SAS70 (US) – auditing process, not security
  • 16. What else can go wrong? ∗ Loss of service ∗ at their end ∗ at your end ∗ Retrieving your data if the service ceases or you get into a dispute ∗ Contract terms which allow the supplier to make use of your data (mainly consumer-oriented services) ∗ Unclear ownership/location of data and the equipment it is stored on (within Europe, no problem) ∗ Unilateral changes in policy by provider
  • 17. And finally … ∗ Most countries have laws allowing authorities to access data ∗ US Patriot Act ostensibly anti-terrorist ∗ has also been used in non-terrorist cases ∗ supplier may not agree (or even be allowed) to inform customer of access ∗ Include in risk assessment
  • 18. So what do you need to do? ∗ Check the contract (or standard terms and conditions) very carefully on areas like: ∗ security ∗ location of data (especially if it could be outside the EEA) ∗ liability/sub contractors ∗ back-up/access ∗ copyright (e.g. Google) ∗ Use your findings to make and record a risk assessment and get authorisation to proceed ∗ Be transparent with your Data Subjects
  • 19. The new cookie law ∗ Privacy and Electronic Communications (EC Directive) (Amendment) Regulations 2011 came into force on 26th May 2011 ∗ Information Commissioner announced a year’s grace before enforcement action would be taken ∗ Information Commissioner issued guidance in December 2011, updated May 2012
  • 20. What the Regulations say ∗ You must not store information (e.g. through a cookie) on someone else’s computer unless: ∗ they have clear information about the purpose; and ∗ they have given consent ∗ You only have to ask them the first time ∗ They can consent through browser settings (but …) ∗ You don’t need consent for cookies that are ‘strictly necessary’ for the functioning of a website
  • 21. What the Information Commissioner says ∗ He wants ‘good solutions rather than rushed ones’. ∗ No ‘wave of knee-jerk formal enforcement action’ as long as people are making the effort to comply. ∗ There are ‘pockets of good practice’ and while he ‘cannot endorse specific products or services’, there are ‘people going about this the right way’. ∗ Analytics cookies are covered, but not a priority.
  • 22. What do we need to do? ∗ Document what cookies we have ∗ Assess how intrusive they are ∗ Decide whether we really need them all ∗ Provide appropriate information ∗ In the privacy statement ∗ At appropriate points on the website ∗ Decide what we need consent for and how to get it ∗ Work out how people can withdraw consent
  • 23. “After-sales service” ∗ Any queries: ∗ paul@paulticher.com ∗ www.paulticher.com ∗ 0116 273 8191