SlideShare a Scribd company logo
1 of 108
Data Protection Act 1998 ,[object Object],[object Object],[object Object],[object Object]
BSI Training ,[object Object],[object Object],[object Object]
BSI Training Workshop ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BSI Training Workshop ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Introductions
Definitions
The Act ,[object Object],[object Object]
The Act ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Definitions ,[object Object],[object Object]
Definitions ,[object Object],[object Object],[object Object]
The Eight Principles
Principles ,[object Object],[object Object]
First Principle ,[object Object],[object Object],[object Object],[object Object],[object Object]
Schedule 2 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sensitive Data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Schedule 3 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Second Principle ,[object Object]
Third Principle ,[object Object]
Fourth Principle ,[object Object]
Fifth Principle ,[object Object]
Sixth Principle ,[object Object]
Seventh Principle ,[object Object]
Eighth Principle ,[object Object],[object Object]
Schedule 4 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Responsibilities
Responsibilities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Responsibilities ,[object Object],[object Object],[object Object],[object Object]
Responsibilities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Responsibilities ,[object Object],[object Object],[object Object],[object Object]
Responsibilities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Responsibilities ,[object Object],[object Object],[object Object],[object Object]
Responsibilities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Notification
Notification ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Notification ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Notification ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Notification ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Notification ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Notification ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Notification ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Notification ,[object Object],[object Object],[object Object],[object Object]
Notification ,[object Object],[object Object],[object Object],[object Object]
Data Processors
Data Processors ,[object Object],[object Object]
Data Processors ,[object Object],[object Object],[object Object]
Subject Access Procedures
Subject Access ,[object Object]
Subject Access ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Subject Access ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Subject Access ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Subject Access ,[object Object],[object Object],[object Object]
Manual Records
Manual Records ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Human Resources
Human Resources ,[object Object],[object Object],[object Object],[object Object],[object Object]
Do you need to audit?
Need to audit? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What an audit should achieve
Audit objectives ,[object Object],[object Object],[object Object],[object Object]
Audit objectives ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Audit objectives ,[object Object],[object Object],[object Object],[object Object],[object Object]
Data audit
Data audit ,[object Object],[object Object],[object Object],[object Object],[object Object]
Data audit ,[object Object],[object Object],[object Object],[object Object],[object Object]
Review responsibilities
Responsibilities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Procedures and processes
Processes & procedures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Processes & procedures ,[object Object],[object Object],[object Object],[object Object],[object Object]
Data Use ,[object Object],[object Object],[object Object]
Data Use ,[object Object],[object Object],[object Object]
People ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
People ,[object Object],[object Object],[object Object],[object Object]
Documentation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Documentation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data quality ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data quality ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data quality ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data quality ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data quality ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data quality ,[object Object],[object Object],[object Object],[object Object]
Data quality ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data quality ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data quality ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data quality ,[object Object],[object Object],[object Object],[object Object],[object Object]
Data quality ,[object Object],[object Object],[object Object],[object Object],[object Object]
Data quality ,[object Object],[object Object],[object Object],[object Object],[object Object]
Data quality ,[object Object],[object Object],[object Object],[object Object]
Security ,[object Object],[object Object],[object Object],[object Object],[object Object]
Security ,[object Object],[object Object],[object Object],[object Object],[object Object]
Security ,[object Object],[object Object],[object Object],[object Object],[object Object]
Security ,[object Object],[object Object],[object Object],[object Object]
Security ,[object Object],[object Object],[object Object]
Subject Access Request ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Subject Access Request ,[object Object],[object Object],[object Object],[object Object]
Subject Access Request ,[object Object],[object Object],[object Object],[object Object],[object Object]
Subject Access Request ,[object Object],[object Object],[object Object],[object Object],[object Object]
Subject Access Request ,[object Object],[object Object],[object Object],[object Object]
Subject Access Request ,[object Object],[object Object],[object Object],[object Object]
How to carry out an audit
Audit process ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Audit process ,[object Object],[object Object],[object Object],[object Object],[object Object]
Audit process ,[object Object],[object Object],[object Object],[object Object]
[object Object]
Corrective Actions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]
Data Protection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thank you Any Questions?   Alan Shipman 07702-125265 [email_address]

More Related Content

What's hot

Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Russell_Kennedy
 
Data protection ppt
Data protection pptData protection ppt
Data protection pptgrahamwell
 
Data Protection Act presentation
Data Protection Act presentationData Protection Act presentation
Data Protection Act presentationIan Clive Oultram
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data SecurityWilmerHale
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and PrivacyVertex Holdings
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologiessidra batool
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11mrmwood
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theftAmber Gupta
 
General data protection regulation
General data protection regulationGeneral data protection regulation
General data protection regulationFahad Ameen
 
Personal Data Protection Act - Employee Data Privacy
Personal Data Protection Act - Employee Data PrivacyPersonal Data Protection Act - Employee Data Privacy
Personal Data Protection Act - Employee Data PrivacylegalPadmin
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protectionsp_krishna
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityJisc Scotland
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsHarrison Clark Rickerbys
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
Auditing your EU entities for data protection compliance 5661651 1
Auditing your EU entities for data protection compliance 5661651 1Auditing your EU entities for data protection compliance 5661651 1
Auditing your EU entities for data protection compliance 5661651 1rtjbond
 

What's hot (20)

Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Data Protection Act presentation
Data Protection Act presentationData Protection Act presentation
Data Protection Act presentation
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
EU GDPR (training)
EU GDPR (training)  EU GDPR (training)
EU GDPR (training)
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11
 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theft
 
Data protection
Data protectionData protection
Data protection
 
General data protection regulation
General data protection regulationGeneral data protection regulation
General data protection regulation
 
Overview on data privacy
Overview on data privacy Overview on data privacy
Overview on data privacy
 
Personal Data Protection Act - Employee Data Privacy
Personal Data Protection Act - Employee Data PrivacyPersonal Data Protection Act - Employee Data Privacy
Personal Data Protection Act - Employee Data Privacy
 
Personal Data Protection in Malaysia
Personal Data Protection in MalaysiaPersonal Data Protection in Malaysia
Personal Data Protection in Malaysia
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information Security
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business Advisors
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Auditing your EU entities for data protection compliance 5661651 1
Auditing your EU entities for data protection compliance 5661651 1Auditing your EU entities for data protection compliance 5661651 1
Auditing your EU entities for data protection compliance 5661651 1
 

Viewers also liked

Business And The Law
Business And The LawBusiness And The Law
Business And The LawRobbieA
 
Equality and Diversity
Equality and Diversity  Equality and Diversity
Equality and Diversity Liz Yardley
 
Race relations act 1976
Race relations act 1976Race relations act 1976
Race relations act 1976RoseBishay
 
Race relations act
Race relations actRace relations act
Race relations actpeterst3
 
Has the Human Rights Act (1998) led to a more pronounced judicial interventio...
Has the Human Rights Act (1998) led to a more pronounced judicial interventio...Has the Human Rights Act (1998) led to a more pronounced judicial interventio...
Has the Human Rights Act (1998) led to a more pronounced judicial interventio...Sabita Amin
 
Data Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud ComputingData Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud ComputingCloud Legal Project
 
PDP Training Courses Catalogue - Ireland
PDP Training Courses Catalogue - IrelandPDP Training Courses Catalogue - Ireland
PDP Training Courses Catalogue - IrelandPDP
 
Charateristics of a good counselor
Charateristics of a good counselorCharateristics of a good counselor
Charateristics of a good counselorKent Jeru Dinglasan
 
Personal Information Collection: A Trade-Off Analysis
Personal Information Collection: A Trade-Off AnalysisPersonal Information Collection: A Trade-Off Analysis
Personal Information Collection: A Trade-Off AnalysisShannon Szabo-Pickering
 
Legal issues Text and Data Mining
Legal issues Text and Data MiningLegal issues Text and Data Mining
Legal issues Text and Data Miningopenminted_eu
 
Fundamentals of data security policy in i.t. management it-toolkits
Fundamentals of data security policy in i.t. management   it-toolkitsFundamentals of data security policy in i.t. management   it-toolkits
Fundamentals of data security policy in i.t. management it-toolkitsIT-Toolkits.org
 
Big Data Mining - Classification, Techniques and Issues
Big Data Mining - Classification, Techniques and IssuesBig Data Mining - Classification, Techniques and Issues
Big Data Mining - Classification, Techniques and IssuesKaran Deep Singh
 
Presentation from ALA Midwinter 2014 on Elsevier's new Text and Data Mining P...
Presentation from ALA Midwinter 2014 on Elsevier's new Text and Data Mining P...Presentation from ALA Midwinter 2014 on Elsevier's new Text and Data Mining P...
Presentation from ALA Midwinter 2014 on Elsevier's new Text and Data Mining P...Chris Shillum
 
General Data Protection Regulations (GDPR) Summary
General Data Protection Regulations (GDPR) Summary General Data Protection Regulations (GDPR) Summary
General Data Protection Regulations (GDPR) Summary Compliance3
 
EU Medical Device Clinical Research under the General Data Protection Regulation
EU Medical Device Clinical Research under the General Data Protection RegulationEU Medical Device Clinical Research under the General Data Protection Regulation
EU Medical Device Clinical Research under the General Data Protection RegulationErik Vollebregt
 
A business driven approach to security policy management a technical perspec...
A business driven approach to security policy management  a technical perspec...A business driven approach to security policy management  a technical perspec...
A business driven approach to security policy management a technical perspec...AlgoSec
 
Human rights act 1998
Human rights act 1998Human rights act 1998
Human rights act 1998HCEfareham
 

Viewers also liked (20)

Business And The Law
Business And The LawBusiness And The Law
Business And The Law
 
Equality and Diversity
Equality and Diversity  Equality and Diversity
Equality and Diversity
 
Race relations act 1976
Race relations act 1976Race relations act 1976
Race relations act 1976
 
Race relations act
Race relations actRace relations act
Race relations act
 
Has the Human Rights Act (1998) led to a more pronounced judicial interventio...
Has the Human Rights Act (1998) led to a more pronounced judicial interventio...Has the Human Rights Act (1998) led to a more pronounced judicial interventio...
Has the Human Rights Act (1998) led to a more pronounced judicial interventio...
 
DPA-Training1
DPA-Training1DPA-Training1
DPA-Training1
 
Data Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud ComputingData Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud Computing
 
PDP Training Courses Catalogue - Ireland
PDP Training Courses Catalogue - IrelandPDP Training Courses Catalogue - Ireland
PDP Training Courses Catalogue - Ireland
 
Charateristics of a good counselor
Charateristics of a good counselorCharateristics of a good counselor
Charateristics of a good counselor
 
Personal Information Collection: A Trade-Off Analysis
Personal Information Collection: A Trade-Off AnalysisPersonal Information Collection: A Trade-Off Analysis
Personal Information Collection: A Trade-Off Analysis
 
Legal issues Text and Data Mining
Legal issues Text and Data MiningLegal issues Text and Data Mining
Legal issues Text and Data Mining
 
Fundamentals of data security policy in i.t. management it-toolkits
Fundamentals of data security policy in i.t. management   it-toolkitsFundamentals of data security policy in i.t. management   it-toolkits
Fundamentals of data security policy in i.t. management it-toolkits
 
Lecture1
Lecture1Lecture1
Lecture1
 
Big Data Mining - Classification, Techniques and Issues
Big Data Mining - Classification, Techniques and IssuesBig Data Mining - Classification, Techniques and Issues
Big Data Mining - Classification, Techniques and Issues
 
Act studyguide
Act studyguideAct studyguide
Act studyguide
 
Presentation from ALA Midwinter 2014 on Elsevier's new Text and Data Mining P...
Presentation from ALA Midwinter 2014 on Elsevier's new Text and Data Mining P...Presentation from ALA Midwinter 2014 on Elsevier's new Text and Data Mining P...
Presentation from ALA Midwinter 2014 on Elsevier's new Text and Data Mining P...
 
General Data Protection Regulations (GDPR) Summary
General Data Protection Regulations (GDPR) Summary General Data Protection Regulations (GDPR) Summary
General Data Protection Regulations (GDPR) Summary
 
EU Medical Device Clinical Research under the General Data Protection Regulation
EU Medical Device Clinical Research under the General Data Protection RegulationEU Medical Device Clinical Research under the General Data Protection Regulation
EU Medical Device Clinical Research under the General Data Protection Regulation
 
A business driven approach to security policy management a technical perspec...
A business driven approach to security policy management  a technical perspec...A business driven approach to security policy management  a technical perspec...
A business driven approach to security policy management a technical perspec...
 
Human rights act 1998
Human rights act 1998Human rights act 1998
Human rights act 1998
 

Similar to Data Protection Act 1998 Introduction

Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Qualsys Ltd
 
Information Risk Management Overview
Information Risk Management OverviewInformation Risk Management Overview
Information Risk Management Overviewelvinchan
 
Conducting a self-audit of data protection compliance
Conducting a self-audit of data protection complianceConducting a self-audit of data protection compliance
Conducting a self-audit of data protection complianceFintan Swanton
 
GDPR in the Healthcare Industry
GDPR in the Healthcare IndustryGDPR in the Healthcare Industry
GDPR in the Healthcare IndustryEMMAIntl
 
GDPR: Your Journey to Compliance
GDPR: Your Journey to ComplianceGDPR: Your Journey to Compliance
GDPR: Your Journey to ComplianceCobweb
 
MRS Operations Network: GDPR - Organisational Measures
MRS Operations Network: GDPR - Organisational MeasuresMRS Operations Network: GDPR - Organisational Measures
MRS Operations Network: GDPR - Organisational MeasuresMRS
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessSirius
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsHarrison Clark Rickerbys
 
Practical steps to take in preparation for the Protection of Personal Informa...
Practical steps to take in preparation for the Protection of Personal Informa...Practical steps to take in preparation for the Protection of Personal Informa...
Practical steps to take in preparation for the Protection of Personal Informa...Werksmans Attorneys
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by QualsysQualsys Ltd
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009asundaram1
 
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...Harrison Clark Rickerbys
 
Wolters Kluwer GDPR Webinar 9 May 2018
Wolters Kluwer GDPR Webinar 9 May 2018 Wolters Kluwer GDPR Webinar 9 May 2018
Wolters Kluwer GDPR Webinar 9 May 2018 Jonathan Chilton
 
Data Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data SubjectData Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data SubjectJohn Macasio
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Actmrmwood
 
Building a register of data processing
Building a register of data processingBuilding a register of data processing
Building a register of data processingTim Gough
 
GDPR master class accountable research organisations (january 2018)
GDPR master class   accountable research organisations (january 2018)GDPR master class   accountable research organisations (january 2018)
GDPR master class accountable research organisations (january 2018)MRS
 
Practical Tips for General Data Protection Regulations (GDPR)
Practical Tips for General Data Protection Regulations (GDPR)Practical Tips for General Data Protection Regulations (GDPR)
Practical Tips for General Data Protection Regulations (GDPR)Inside Outcomes CIC
 

Similar to Data Protection Act 1998 Introduction (20)

Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
 
Information Risk Management Overview
Information Risk Management OverviewInformation Risk Management Overview
Information Risk Management Overview
 
Conducting a self-audit of data protection compliance
Conducting a self-audit of data protection complianceConducting a self-audit of data protection compliance
Conducting a self-audit of data protection compliance
 
Frankston
FrankstonFrankston
Frankston
 
GDPR in the Healthcare Industry
GDPR in the Healthcare IndustryGDPR in the Healthcare Industry
GDPR in the Healthcare Industry
 
GDPR: Your Journey to Compliance
GDPR: Your Journey to ComplianceGDPR: Your Journey to Compliance
GDPR: Your Journey to Compliance
 
MRS Operations Network: GDPR - Organisational Measures
MRS Operations Network: GDPR - Organisational MeasuresMRS Operations Network: GDPR - Organisational Measures
MRS Operations Network: GDPR - Organisational Measures
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
 
GDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business AdvisorsGDPR Breakfast Briefing for Business Advisors
GDPR Breakfast Briefing for Business Advisors
 
Practical steps to take in preparation for the Protection of Personal Informa...
Practical steps to take in preparation for the Protection of Personal Informa...Practical steps to take in preparation for the Protection of Personal Informa...
Practical steps to take in preparation for the Protection of Personal Informa...
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009
 
GDPR for your Payroll Bureau
GDPR for your Payroll BureauGDPR for your Payroll Bureau
GDPR for your Payroll Bureau
 
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...
 
Wolters Kluwer GDPR Webinar 9 May 2018
Wolters Kluwer GDPR Webinar 9 May 2018 Wolters Kluwer GDPR Webinar 9 May 2018
Wolters Kluwer GDPR Webinar 9 May 2018
 
Data Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data SubjectData Privacy Protection Competrency Guide by a Data Subject
Data Privacy Protection Competrency Guide by a Data Subject
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
Building a register of data processing
Building a register of data processingBuilding a register of data processing
Building a register of data processing
 
GDPR master class accountable research organisations (january 2018)
GDPR master class   accountable research organisations (january 2018)GDPR master class   accountable research organisations (january 2018)
GDPR master class accountable research organisations (january 2018)
 
Practical Tips for General Data Protection Regulations (GDPR)
Practical Tips for General Data Protection Regulations (GDPR)Practical Tips for General Data Protection Regulations (GDPR)
Practical Tips for General Data Protection Regulations (GDPR)
 

More from meritnorthwest

Merit Event - Introducing Windows Server 2008, SQL Server 2008 and Visual Stu...
Merit Event - Introducing Windows Server 2008, SQL Server 2008 and Visual Stu...Merit Event - Introducing Windows Server 2008, SQL Server 2008 and Visual Stu...
Merit Event - Introducing Windows Server 2008, SQL Server 2008 and Visual Stu...meritnorthwest
 
Merit Event - E-Mail Marketing - How to do it Right!!!
Merit Event - E-Mail Marketing - How to do it Right!!!Merit Event - E-Mail Marketing - How to do it Right!!!
Merit Event - E-Mail Marketing - How to do it Right!!!meritnorthwest
 
Merit Event - Does "Technology Mean Business" Mean Business
Merit Event - Does "Technology Mean Business" Mean BusinessMerit Event - Does "Technology Mean Business" Mean Business
Merit Event - Does "Technology Mean Business" Mean Businessmeritnorthwest
 
Merit Event - North West Broadband Fund
Merit Event - North West Broadband FundMerit Event - North West Broadband Fund
Merit Event - North West Broadband Fundmeritnorthwest
 
Merit Event - Open Your Mind To Open Source Software
Merit Event - Open Your Mind To Open Source SoftwareMerit Event - Open Your Mind To Open Source Software
Merit Event - Open Your Mind To Open Source Softwaremeritnorthwest
 
Merit Event - Customer Relationship Management - What are the benefits?
Merit Event - Customer Relationship Management - What are the benefits?Merit Event - Customer Relationship Management - What are the benefits?
Merit Event - Customer Relationship Management - What are the benefits?meritnorthwest
 
Merit Event - Closing the Back Door in Your Systems
Merit Event - Closing the Back Door in Your SystemsMerit Event - Closing the Back Door in Your Systems
Merit Event - Closing the Back Door in Your Systemsmeritnorthwest
 
Merit Event - Mobile Voice and Data Convergence
Merit Event - Mobile Voice and Data ConvergenceMerit Event - Mobile Voice and Data Convergence
Merit Event - Mobile Voice and Data Convergencemeritnorthwest
 
Merit Event - O2 Blackberry Presentation
Merit Event - O2 Blackberry PresentationMerit Event - O2 Blackberry Presentation
Merit Event - O2 Blackberry Presentationmeritnorthwest
 
Merit Event - ITIL Framework
Merit Event - ITIL FrameworkMerit Event - ITIL Framework
Merit Event - ITIL Frameworkmeritnorthwest
 
Merit Event - Monitor, Secure & Control Your Network with JMC IT & Lightspeed...
Merit Event - Monitor, Secure & Control Your Network with JMC IT & Lightspeed...Merit Event - Monitor, Secure & Control Your Network with JMC IT & Lightspeed...
Merit Event - Monitor, Secure & Control Your Network with JMC IT & Lightspeed...meritnorthwest
 

More from meritnorthwest (11)

Merit Event - Introducing Windows Server 2008, SQL Server 2008 and Visual Stu...
Merit Event - Introducing Windows Server 2008, SQL Server 2008 and Visual Stu...Merit Event - Introducing Windows Server 2008, SQL Server 2008 and Visual Stu...
Merit Event - Introducing Windows Server 2008, SQL Server 2008 and Visual Stu...
 
Merit Event - E-Mail Marketing - How to do it Right!!!
Merit Event - E-Mail Marketing - How to do it Right!!!Merit Event - E-Mail Marketing - How to do it Right!!!
Merit Event - E-Mail Marketing - How to do it Right!!!
 
Merit Event - Does "Technology Mean Business" Mean Business
Merit Event - Does "Technology Mean Business" Mean BusinessMerit Event - Does "Technology Mean Business" Mean Business
Merit Event - Does "Technology Mean Business" Mean Business
 
Merit Event - North West Broadband Fund
Merit Event - North West Broadband FundMerit Event - North West Broadband Fund
Merit Event - North West Broadband Fund
 
Merit Event - Open Your Mind To Open Source Software
Merit Event - Open Your Mind To Open Source SoftwareMerit Event - Open Your Mind To Open Source Software
Merit Event - Open Your Mind To Open Source Software
 
Merit Event - Customer Relationship Management - What are the benefits?
Merit Event - Customer Relationship Management - What are the benefits?Merit Event - Customer Relationship Management - What are the benefits?
Merit Event - Customer Relationship Management - What are the benefits?
 
Merit Event - Closing the Back Door in Your Systems
Merit Event - Closing the Back Door in Your SystemsMerit Event - Closing the Back Door in Your Systems
Merit Event - Closing the Back Door in Your Systems
 
Merit Event - Mobile Voice and Data Convergence
Merit Event - Mobile Voice and Data ConvergenceMerit Event - Mobile Voice and Data Convergence
Merit Event - Mobile Voice and Data Convergence
 
Merit Event - O2 Blackberry Presentation
Merit Event - O2 Blackberry PresentationMerit Event - O2 Blackberry Presentation
Merit Event - O2 Blackberry Presentation
 
Merit Event - ITIL Framework
Merit Event - ITIL FrameworkMerit Event - ITIL Framework
Merit Event - ITIL Framework
 
Merit Event - Monitor, Secure & Control Your Network with JMC IT & Lightspeed...
Merit Event - Monitor, Secure & Control Your Network with JMC IT & Lightspeed...Merit Event - Monitor, Secure & Control Your Network with JMC IT & Lightspeed...
Merit Event - Monitor, Secure & Control Your Network with JMC IT & Lightspeed...
 

Recently uploaded

GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfDanny Diep To
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerAggregage
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxRakhi Bazaar
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdfMintel Group
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOne Monitar
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsKnowledgeSeed
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryWhittensFineJewelry1
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
BAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptxBAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptxran17april2001
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdfChris Skinner
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifeBhavana Pujan Kendra
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreNZSG
 
Send Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSendBig4
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in PhilippinesDavidSamuel525586
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 

Recently uploaded (20)

GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon Harmer
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applications
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
BAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptxBAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptx
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in Life
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource Centre
 
Send Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.com
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in Philippines
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 

Data Protection Act 1998 Introduction