6 Sutton Park Road, Sutton, SM1 2GD
Data Protection Policy
Policy Statement
The School is committed to protecting personal data and ensuring its lawful handling. Our Data Protection Policy establishes a rigorous framework aligned with the UK Data Protection Act 2018 and GDPR. We uphold fairness, transparency, and confidentiality in all data processing activities, applying these principles to safeguard the privacy of students, staff, and third parties.
Principles
- Lawfulness: Processing personal data lawfully, fairly, and transparently.
- Purpose Limitation: Collecting data for specified, explicit, and legitimate purposes.
- Data Minimisation: Limiting personal data collection to what is necessary.
- Accuracy: Keeping accurate data and taking steps to erase or rectify inaccuracies.
- Storage Limitation: Retaining personal data only as long as necessary for its intended purposes.
- Integrity and Confidentiality: Ensuring data is secure and protected against unauthorised or unlawful processing.
- Accountability: Demonstrating compliance with data protection principles.
- Consent: Obtaining clear consent for processing personal data when required.
- Rights: Respecting and facilitating the exercise of individuals’ rights regarding their personal data.
- Transparency: Being transparent about data management and processing activities.
- Training: Providing adequate training for staff involved in handling personal data.
- Review: Regularly reviewing and updating data protection measures and practices.
Regulatory Context
This Policy has been developed in line with the applicable laws, regulations, regulatory advice, and sector best practices, including the following:
Data Privacy and Security Commitment
Title |
---|
Rule
Data Protection Compliance Rule The School must process personal information to fulfil its teaching, operational, and statutory obligations, including reporting to the Office for Students (OfS) and the Higher Education Statistics Agency (HESA). This information includes data on applicants, students, employees, alumni, and other stakeholders. The School is committed to transparency and adhering to the Data Protection Act 2018 (DPA) to ensure data security and legal compliance. This policy aims to minimise risks such as breaches, reputational damage, financial penalties, and investigations by the Information Commissioner. A glossary of terms is available in Appendix 1. This rule ensures the School meets its legal obligations under the DPA while maintaining transparency and security in data handling. By adhering to these standards, the School protects individuals’ privacy, supports effective operations, and mitigates risks associated with data breaches. |
Data Controller
Title |
---|
Rule
Data Controller Responsibilities and Contact Information The School, as the data controller, is responsible for ensuring compliance with data protection principles under the Data Protection Act (DPA) and must demonstrate this compliance. In collaborative arrangements, data controller responsibilities may be shared as per the agreement. Direct any queries to the Director of Technology. This rule ensures clarity on the School’s role and responsibilities in data protection. It highlights the need for compliance and specifies how data controller duties are determined in partnerships. Providing contact details for queries facilitates easy access to necessary information. Data Processing Notification:
|
Data Processors
Title |
---|
Rule
Data Processor Agreements and Compliance When the School engages third parties (Data Processors) requiring access to personal data, such as IT suppliers or specialist service providers, a written agreement must be established. This agreement ensures the processor complies with data protection legislation. Document these agreements in the School or Department's Information Asset Register and have them reviewed by the Data Protection Officer (DPO). This rule ensures that third parties handling personal data are legally compliant with data protection laws. It provides a systematic approach to documenting and verifying data processor agreements, thereby safeguarding personal data and ensuring compliance with legal requirements. |
Data Protection Principles
Title |
---|
Rule
Data Processing Compliance All staff must process personal data, including special category and criminal record data, in line with the data protection principles outlined in Article 5 of the UK GDPR. This includes:
Refer to staff central pages or the relevant Privacy Notice for details on data retention schedules. This rule ensures compliance with UK GDPR by establishing clear guidelines for lawful, fair, and transparent data processing. It provides a framework for maintaining data accuracy, relevance, and security, while also addressing data retention and protection against unauthorised access or damage. |
Rule
Data Protection Measures The School, as a data controller, must implement appropriate technical and organisational measures to uphold data protection principles, including:
The Data Governance Group, led by the Director of Technology, will oversee compliance, which will also be subject to Internal Audit. This rule ensures the School meets data protection requirements by implementing essential measures. It promotes a robust framework for managing data securely and transparently, facilitates compliance with legal obligations, and strengthens overall data protection practices. |
Rule
Record-Keeping for Personal Data Each department or school must maintain a record of all personal data assets. While all staff are responsible for documenting the data they process, the Data/Asset Owner and Data Steward are primarily responsible for keeping this record current. The Director or President oversees data processing within their department or school. The Director of Technology will manage the systems for this record-keeping. Maintaining an accurate record of personal data assets ensures compliance with data protection regulations and supports accountability. This practice helps in effective data management, ensures that data processing is transparent and traceable, and allows for oversight and audits to uphold data protection standards. |
Lawful Basis for Processing Personal Data
Title |
---|
Rule
Lawful Basis and Special Protections for Data Processing The School must establish a lawful basis for processing personal data. The possible bases are:
The lawful basis for processing must be determined before handling data and will be documented in Privacy Notices and Information Asset Registers. For special category data and criminal records data, which involve higher risks, additional protections are required. Processing of this data must comply with Articles 9 and 10 of the UK GDPR and Schedule 1 of the Data Protection Act 2018. Relevant policies must be in place, and a Data Protection Impact Assessment (DPIA) must be completed and authorised by the Data Protection Officer. Research involving such data must include data protection safeguards in the ethics application process. Identifying a lawful basis ensures that data processing complies with legal requirements and upholds individuals' rights. Special category and criminal records data, due to their sensitivity, require enhanced protection to mitigate risks and ensure compliance with regulatory standards. Proper documentation and DPIAs support transparency and accountability in data processing activities. |
Data Subject Rights
Title |
---|
Advice
Rights of Individuals Regarding Personal Data All staff, students, and users have the following rights concerning their personal data:
Any requests or queries about data processing or access should be directed to the Data Compliance Team at dataprotection@theschool.ac.uk. Not all rights apply in every situation. These rights ensure transparency and control over personal data, aligning with data protection regulations. They provide individuals with the means to manage and safeguard their information effectively. Directing requests to the Data Compliance Team ensures proper handling and compliance with legal requirements. |
Advice
Complaints and Queries Regarding Data Processing If a data subject is dissatisfied with how their personal data is processed or has questions or concerns, they should first contact dataprotection@theschool.ac.uk. If the issue remains unresolved, they have the right to escalate their complaint to the Information Commissioner’s Office (ICO). This process ensures that concerns about data processing are addressed promptly and fairly. Providing a clear pathway for escalation to the ICO guarantees that data subjects have recourse if their issues are not resolved internally, in accordance with data protection regulations. |
Data Responsibilities at the School
Title |
---|
Rule
Oversight and Compliance for Personal Data Processing The Executive Committee (EC), through the Director of Technology, must:
This ensures that personal data processing aligns with legal requirements and the School's internal management framework, thereby maintaining compliance and accountability in data handling practices. |
Rule
Role and Responsibilities of the Senior Information Risk Owner (SIRO) The Senior Information Risk Owner (SIRO), a member of the Executive Committee (Director of Technology), oversees the organisation's information and data governance. They ensure that information assets and risks are managed effectively and escalated to the Executive Committee when necessary. The SIRO represents information governance within the organisation, promoting a culture of effective information use and protection. This role ensures robust management of information and data risks and fosters a culture of effective information use and protection, supporting the School’s strategic objectives and compliance with data protection regulations. |
Rule
Responsibilities of the President and Directors
This ensures that all staff are knowledgeable about their data protection responsibilities, promotes a culture of compliance, and maintains effective risk management for data processing across departments. |
Rule
Responsibilities of All Staff and Third Parties in Data Protection
These rules ensure that all staff and third parties adhere to data protection standards, maintain accurate personal data, and properly report breaches, thereby safeguarding the School's data integrity and compliance with legal requirements. |
Rule
Student Responsibilities for Personal Data
These rules ensure that students maintain accurate personal information, comply with data protection policies in their studies and employment, and follow proper procedures when handling personal data, thus aligning with legal and institutional data protection requirements. |
Data Protection Officer (DPO)
Title |
---|
Rule
Role of the Data Protection Officer (DPO) The School has appointed a Data Protection Officer (DPO) to ensure compliance with data protection legislation. The DPO, who is the Director of Technology, will:
The DPO does not set the purposes or means of personal data processing. The DPO ensures the School adheres to data protection laws by offering guidance, supporting compliance efforts, and acting as the liaison with regulatory bodies. This role helps maintain a culture of data protection and ensures proper implementation of legal requirements. |
Data Protection by Design and by Default
Title |
---|
Rule
Embedding Data Protection into System Development Data protection by design and by default must be applied at all times. This requires:
Data protection by design and by default ensures that privacy and security are integral to systems and processes, rather than being an afterthought. This approach helps to proactively address data protection issues and safeguard individuals' rights effectively. |
Rule
Conducting Data Protection Impact Assessments (DPIAs) The School will:
The DPIA process helps to identify and address privacy issues and risks to individuals’ rights at the design and implementation stages of new systems, services, products, or business practices. This proactive approach ensures that data protection is integrated into the development process, helping to mitigate risks effectively and comply with data protection regulations. The Director of Technology will oversee the implementation and adherence to this process. |
Periodic Evaluation and Upkeep of Policy Framework
Title |
---|
Rule
Policy Review and Approval The Data Protection Officer (DPO) will review this policy annually, or sooner if there is a significant change in legislation, strategy, or organisational structure. Major changes to the policy must be approved by the Executive Committee. Regular reviews ensure that the policy remains up-to-date with current legislation and organisational changes, maintaining compliance and effectiveness. Significant updates require Executive Committee approval to ensure alignment with overall organisational strategy and governance. |
Sharing and Storing Personal Data
Title |
---|
Rule
Personal Data Sharing and Security The School shall:
Proper management of personal data sharing is crucial for maintaining the School’s operational success, protecting its reputation, and preserving the trust of employees, students, and other stakeholders. By following these guidelines, the School ensures that data is shared legally, securely, and only as necessary, in compliance with data protection regulations. |
Rule
Storing and Sharing Securely Personal data must be stored and shared securely within network conditions, with additional measures applied for special category data where necessary. Data Owners are responsible for ensuring that staff with permissions to access and edit data are trained appropriately on the relevant systems. It is crucial that staff use only School-approved tools for processing personal data, as these tools have been technically assessed and include the correct contractual terms. If there is any uncertainty about a tool's approval status, staff should consult servicedesk@lsi.ac.uk. In general, freely available tools that do not have contractual agreements are unlikely to be approved or compliant and should not be used. This includes tools such as DropBox, Eventbrite, Mailchimp, and Zoom. The Director of Technology will oversee the systems to ensure compliance with these requirements. Ensuring that personal data is handled securely and using only approved tools is essential for compliance with data protection regulations. This approach protects the confidentiality and integrity of personal data, preventing unauthorised access and misuse, and thereby safeguarding the School's and individuals' data. |
International Data Transfers
Title |
---|
Rule
Transferring Personal Data Outside the UK Under Data Protection legislation, transferring personal data outside the UK is generally restricted unless specific conditions or safeguards are met. This ensures that data subjects receive an equivalent level of protection and that their rights are not compromised. Data may be transferred if:
Colleagues must consult the Data Protection Officer (DPO) to determine the most suitable safeguard. The chosen safeguard must be documented in contracts and/or data sharing agreements (DSA) and recorded in the School or Department’s Information Asset Register. Additionally, data subjects must be informed as per the transparency principle. For non-UK data transfers, a Data Protection Impact Assessment (DPIA) may be required, as such transfers are considered high risk. These measures ensure that personal data remains protected to the same standard when transferred outside the UK, maintaining data subject rights and compliance with data protection laws. Documenting safeguards and informing data subjects helps uphold transparency and accountability in data management practices. |
Training on Data Protection
Title |
---|
Rule
Training for Data Protection Compliance Training is essential to meet Data Protection legislation and the Accountability principle. The School must not only establish appropriate policies and procedures but also demonstrate their implementation and provide comprehensive training at all levels. Training must:
The Director of Technology will oversee the implementation and effectiveness of these training systems. Effective training ensures that the School complies with Data Protection laws and effectively manages data protection risks. By embedding a culture of good data protection practices and reinforcing key policies, the School protects personal data and upholds accountability. |
Automated Governance System (AGS) Policy
Title |
---|
Definition
Automated Governance System (AGS) Use The School utilises the Automated Governance System (AGS) to support its strategy of innovation. The AGS facilitates various functions, including:
The AGS operates in line with the School’s regulations and policies, including the IT Regulations, Data Protection Policy, and AI Policy. It supports the School’s mission efficiently while adhering to additional requirements such as the Sustainability & Environmental Policy outlined in the Vision and Values Statement. The AGS enhances the School's ability to innovate and deliver its mission effectively by streamlining key administrative functions. By integrating various processes into a single platform, the School ensures compliance with relevant regulations and supports its commitment to sustainability and effective performance measurement. |
Advice
Governance Support through AGS The Automated Governance System (AGS) supports the governance of the School by integrating and streamlining processes for Boards, Departments, and Committees. Each entity has a defined role in ensuring the effective operation of the School, as outlined in the School’s regulations and policies. The School acknowledges that a reliable and efficient online system is essential for robust governance. The AGS facilitates effective governance by centralising and managing key processes for various institutional bodies. This ensures adherence to established regulations and policies while maintaining a high level of operational efficiency. The system is crucial for the School to function effectively and uphold its governance standards. |
Rule
Data Protection Compliance through AGS The Automated Governance System (AGS) is vital for the School to fulfil its data protection obligations. The AGS integrates workflows to ensure data is processed and stored in line with the Data Protection Policy. This includes processing data lawfully, fairly, and transparently, and collecting it for legitimate purposes. The AGS supports secure recording for accountability, asset registers, and effective data stewardship. It ensures data is processed for lawful reasons, such as fulfilling contractual obligations, and upholds the rights of data subjects, including their right to access and obtain copies of their data. The Director of Technology, a member of the Executive Committee and the Senior Information Risk Owner (SIRO), oversees the AGS. The AGS helps the School comply with data protection principles by providing secure and transparent data management. It ensures adherence to legal requirements, supports accountability, and safeguards data subject rights. The Director of Technology’s oversight guarantees that the system operates effectively within the framework of data protection laws and policies. |
Data Protection Policy Violations and Response Procedures
Title |
---|
Rule
Compliance and Consequences for Data Protection All members of the School are responsible for complying with the Data Protection Act (DPA). Any negligent or intentional breach of the data protection policy by employees or students may lead to disciplinary action following a proper investigation. If a supplier fails to adhere to the policy or related data protection conditions, it may result in termination of the contract and/or claims for compensation. Any questions or concerns regarding the policy's interpretation or implementation should be directed to the Director of Technology. Strict adherence to the DPA is essential for maintaining data protection standards. Disciplinary actions and potential contract terminations are necessary to address breaches and ensure compliance. Clear channels for addressing questions ensure that policy implementation is consistent and well-managed. |
Data Breaches
Title |
---|
Rule
Reporting and Managing Personal Data Breaches The School must promptly identify and report personal data breaches to the Data Compliance team. This includes all breaches, whether accidental, suspected, or confirmed. Breaches must be reported to the Information Commissioner's Office (ICO) within 72 hours if they meet the criteria for ‘reportable breaches’. The Data Compliance team will assess the risk, advise on containment and mitigation, and determine whether the breach needs to be reported to the ICO or affected data subjects. We must also keep records of all breaches. Failure to handle and report breaches properly can lead to substantial fines from the ICO, up to £17,500,000 for severe cases. Timely reporting is crucial to fulfil legal obligations, minimise risks to individuals, and mitigate potential damage. Prompt action and proper reporting help avoid significant penalties and ensure compliance with data protection laws. What is a data breach? A personal data breach involves a security incident that results in the destruction, loss, alteration, unauthorised disclosure, or access to personal data. The impact and risk of a breach depend on various factors, including the type and amount of data, the circumstances of the breach, and the speed of the response. Examples of data breaches include:
For further guidance, please contact dataprotection@theSchool.ac.uk. |
Further Guidance
Title |
---|
Rule
Guidance on Data Protection Compliance Staff must seek guidance from the Director of Technology for advice on data protection matters, including processing special category and criminal convictions data, handling data rights requests, and reporting data breaches. If there is any uncertainty about how to handle data protection issues, staff must seek guidance from the Director of Technology. The Director of Technology provides expert advice to ensure compliance with data protection laws and best practices. Their guidance helps staff manage sensitive data correctly, adhere to legal requirements, and handle data protection issues effectively. This ensures the School remains compliant with relevant legislation and protects the rights of data subjects. Related Links:
For further questions, contact the Director of Technology. |
Appendix 1: Terminology and Definitions in Data Protection
Title |
---|
Definition
Glossary The following definitions clarify key data protection terms within the context of the School:
For further details on key definitions, visit the ICO's guide: ICO Key Definitions Understanding these key definitions ensures that all members of the School are aware of their data protection obligations and the terminology used in data management. This clarity helps in the correct handling of personal data, compliance with legal requirements, and effective communication regarding data protection matters. Accurate definitions are essential for implementing appropriate measures to protect personal data and to respond correctly to data breaches and other data protection issues. |
Appendix 2: Data Privacy Considerations for Social Media
Title |
---|
Rule
Social Media and Data Protection When using social media, do not publish colleagues' or students' personal information. Ensure that all processing aligns with the Data Protection Policy and the Data Protection Act 2018. All uploads, storage, and communications must be lawful and fair. Before using a social media account, inform all parties about the type of information being shared, its purpose, and who will have access to it. Familiarise yourself with privacy settings and adjust them according to the content and intended audience. Obtain and document appropriate informed consent. Ensure that passwords and access controls for School social media accounts are strong and secure. Avoid using the same password for School systems and social media sites. Change passwords regularly and never share them. Devices with stored social media login details should lock or log out automatically. If a device with login details is lost or stolen, change the passwords for all affected accounts and inform other account managers. Be cautious with social media postings to avoid revealing personal information such as your location or contact details. Only accept invitations from known contacts and verify identities if unsure. Avoid clicking on unsolicited links to prevent installing malicious software. Be aware that social media applications may share your profile data with third parties. Review privacy settings regularly. Adhere to the IT Regulations, including the Social Media Policy and Social Media Guidelines. Adhering to these rules helps protect personal information and ensures compliance with data protection legislation. Proper management of social media accounts prevents unauthorised access, reduces the risk of data breaches, and protects both individual and organisational data from malicious activities. Understanding and applying these practices supports a secure and responsible use of social media in alignment with legal and institutional requirements. |
Appendix 3: Data Protection Implications of CCTV Surveillance
Title |
---|
Rule
CCTV Monitoring and Data Protection The School operates a CCTV monitoring system to detect and deter crime and assist the Police and civil authorities during major emergencies. This system will be managed to respect individuals’ privacy rights. All CCTV footage is owned by the School, which holds the copyright. Cameras will be placed in public view with clear signage indicating their presence and purpose. Recorded footage will be retained according to the School's Records Retention Schedules. After the retention period, if the footage is not needed for evidence, it will be recycled. If the footage is required for legal proceedings, it will be kept for the duration necessary for the case. This approach ensures that CCTV monitoring supports security and emergency response while adhering to privacy laws and data protection principles. By clearly marking camera locations and following a defined retention schedule, the School balances security needs with respect for individual privacy and legal requirements. |
Metrics and KPIs
The following metrics will be measured and regularly reviewed as key performance indicators for the School to ensure the effectiveness of this policy and associated operations.
Title |
---|
Data Breach Incidents
This metric quantifies the number and severity of data breach incidents occurring within the School. It captures details regarding the nature of breaches, data affected, response times, and the outcomes of any investigations or remedial actions. Tracking data breach incidents is critical for identifying security vulnerabilities and assessing the effectiveness of the School's response protocols. Analysing breach patterns aids in proactively strengthening data protection measures and reducing future risks. |
Data Protection Training Completion
This metric measures the percentage of staff and students who have successfully completed mandatory data protection training. It takes into account the regularity and completion rates of training sessions, as well as any refresher courses undertaken. A high completion rate indicates widespread awareness and understanding of the data protection policy across the School, while lower rates may suggest a need for improved communication or training provisions. Tracking this metric ensures that the School maintains a high level of data protection competence among its members, which is vital for the secure management of personal data. Such training minimises the risk of data breaches and ensures compliance with the Data Protection Act 2018. |
DPIA Completion Rates
The Data Protection Impact Assessment (DPIA) Completion Rates metric tracks the number of DPIAs conducted versus the number required for 'high risk' data processing activities. It reflects the School's commitment to identifying and mitigating risks at the outset of a project. Recording DPIA completion rates ensures that the School adheres to best practices for data protection by design. It demonstrates a proactive approach to privacy and compliance with regulatory expectations for risk assessment. |
Subject Access Requests Fulfilled
This metric records the number of data subject access requests received and successfully fulfilled within the statutory timeframe. It reflects the School's efficiency and transparency in providing individuals with access to their personal data, as per their rights under the DPA. By measuring the handling of subject access requests, the School can assess its capacity to respond to data subjects swiftly and correctly, thereby upholding individuals' rights and the transparent nature of data processing endeavours. |