Data Protection Policy
Policy Statement
The School is committed to protecting personal data and ensuring its lawful handling. Our Data Protection Policy establishes a rigorous framework aligned with the Data Protection Act 2018 and the UK GDPR, operating within the School’s Information Governance framework (including systems-of-record, Data Owner accountability, assurance, and evidence expectations). We uphold fairness, transparency, and confidentiality in all data processing activities, applying these principles to safeguard the privacy of students, staff, and third parties.
Principles
- Lawfulness: Processing personal data lawfully, fairly, and transparently.
- Purpose Limitation: Collecting data for specified, explicit, and legitimate purposes.
- Data Minimisation: Limiting personal data collection to what is necessary.
- Accuracy: Keeping accurate data and taking steps to erase or rectify inaccuracies.
- Storage Limitation: Retaining personal data only as long as necessary for its intended purposes.
- Integrity and Confidentiality: Ensuring data is secure and protected against unauthorised or unlawful processing.
- Accountability: Demonstrating compliance with data protection principles.
- Lawful basis (including consent where required): Establishing and documenting an appropriate lawful basis for processing personal data, using consent only where it is the correct lawful basis and can be freely given, specific, informed and unambiguous.
- Rights: Respecting and facilitating the exercise of individuals’ rights regarding their personal data.
- Transparency: Being transparent about data management and processing activities.
- Training: Providing adequate training for staff involved in handling personal data.
- Review: Regularly reviewing and updating data protection measures and practices.
Regulatory Context
This Policy has been developed in line with the applicable laws, regulations, regulatory advice, and sector best practices, including the following:
| Authority | Name | Url |
|---|---|---|
| UK Government |
Consumer Rights Act 2015
A UK law that consolidates consumer rights, covering contracts for goods, services, digital content, and providing remedies for faulty goods and services. |
Redirect |
| UK Government |
Data Protection Act 2018
Legislation aimed at controlling the processing of personal data, laying down principles with respect to the processing of personal data, and the rights of data subjects |
Redirect |
| Office for Students (OfS) |
Regulatory framework for higher education in England
This framework outlines OfS' primary aim to ensure positive outcomes for students, including access, success, and progress in higher education. It covers quality academic experience, progress into employment, and value for money. |
Redirect |
| Quality Assurance Agency (QAA) |
The Quality Code
This code represents a shared understanding of quality practice across the UK higher education sector, protecting public and student interests and championing the UK's reputation for quality. |
Redirect |
| Competition and Markets Authority (CMA) |
Higher education: consumer law advice for providers
Advice to help higher education providers understand their responsibilities under consumer protection law, especially regarding undergraduate students. |
Redirect |
| Information Commissioner's Office (ICO) |
Guide for higher education institutions
Provides guidance for higher education providers on their obligations under data protection law. |
Redirect |
Data Privacy and Security Commitment
The School must process personal information to fulfil its teaching, operational, and statutory obligations, including reporting to the Office for Students (OfS) and the Higher Education Statistics Agency (HESA). This information includes data on applicants, students, employees, alumni, and other stakeholders. The School is committed to transparency and adhering to the Data Protection Act 2018 (DPA) to ensure data security and legal compliance. This policy aims to minimise risks such as breaches, reputational damage, financial penalties, and investigations by the Information Commissioner. A glossary of terms is available in Appendix 1. This rule ensures the School meets its legal obligations under the DPA while maintaining transparency and security in data handling. By adhering to these standards, the School protects individuals’ privacy, supports effective operations, and mitigates risks associated with data breaches. |
Data Controller
The School, as the data controller, is responsible for ensuring compliance with data protection principles under the Data Protection Act (DPA) and must demonstrate this compliance. In collaborative arrangements, data controller responsibilities may be shared as per the agreement. Data Owners (as defined in the Information Governance Policy) are accountable for the purposes, lawful basis mapping, transparency expectations, data quality and appropriate use of personal data within their domains, and for ensuring evidence is retained in the School’s governance and assurance repository (AGS) where required. Day-to-day privacy operations (RoPA, DPIAs, DSAR coordination, breach documentation and lessons learned) are coordinated by the Internal Data Protection Lead, with information security and systems controls operated by the Director of Technology, in line with the Information Governance Policy. Direct any queries to the Internal Data Protection Lead (privacy coordination) or the Director of Technology (information security and systems controls), as appropriate. This rule ensures clarity on the School’s role and responsibilities in data protection. It highlights the need for compliance and specifies how data controller duties are determined in partnerships. Providing contact details for queries facilitates easy access to necessary information. |
The School maintains up-to-date notification of its data processing activities with the Information Commissioner’s Office (ICO). The registration number is Z5395727. The School is registered as a Data Controller at:
|
Data Processors
When the School engages third parties (Data Processors) requiring access to personal data, such as IT suppliers or specialist service providers, a written agreement must be established. This agreement ensures the processor complies with data protection legislation. Document these agreements in the School’s governed registers and repositories (including the supplier/processor register and relevant contract records) and have them reviewed by the Internal Data Protection Lead (privacy and governance coordination), with information security assurance from the Director of Technology where required. This rule ensures that third parties handling personal data are legally compliant with data protection laws. It provides a systematic approach to documenting and verifying data processor agreements, thereby safeguarding personal data and ensuring compliance with legal requirements. |
Data Protection Principles
All staff must process personal data, including special category and criminal record data, in line with the data protection principles outlined in Article 5 of the UK GDPR. This includes:
Refer to staff central pages, the relevant Privacy Notice, and the School’s Data Retention Schedule (as explained in the Information Governance Policy) for details on retention and disposal requirements This rule ensures compliance with UK GDPR by establishing clear guidelines for lawful, fair, and transparent data processing. It provides a framework for maintaining data accuracy, relevance, and security, while also addressing data retention and protection against unauthorised access or damage. |
The School, as a data controller, must implement appropriate technical and organisational measures to uphold data protection principles, including:
Data protection compliance is overseen through the School’s governance structure in line with the Information Governance Policy: Data Owners are accountable for lawful basis, transparency, appropriate use and data quality within their domains; operational oversight is provided through the Executive Committee, supported by the Information Governance Lead (Director of Technology) and coordinated privacy operations by the Internal Data Protection Lead; independent scrutiny and assurance is provided through QCAC, with escalation to the Board of Governors where material. This rule ensures the School meets data protection requirements by implementing essential measures. It promotes a robust framework for managing data securely and transparently, facilitates compliance with legal obligations, and strengthens overall data protection practices. |
Each department must maintain records of personal data processing and assets in the School’s governed registers and repositories, and must ensure personal data is captured and maintained in the School’s systems-of-record (as defined in the Information Governance Policy) rather than unmanaged local copies or ‘shadow’ datasets. Evidence must be stored/linked in the governance evidence repository (AGS) where required. Data Owners (as defined in the Information Governance Policy) are accountable for completeness and accuracy of records in their domains, coordinated by the Internal Data Protection Lead, with systems support from the Director of Technology. Maintaining an accurate record of personal data assets ensures compliance with data protection regulations and supports accountability. This practice helps in effective data management, ensures that data processing is transparent and traceable, and allows for oversight and audits to uphold data protection standards. |
Lawful Basis for Processing Personal Data
The School must establish a lawful basis for processing personal data. The possible bases are:
The lawful basis for processing must be determined before handling data and will be documented in Privacy Notices and the School’s governed registers and repositories (including RoPA documentation where applicable). For each processing activity, the relevant Data Owner (as defined in the Information Governance Policy) is accountable for confirming and maintaining the lawful basis and purpose within their domain, with coordination of RoPA maintenance and assurance evidence by the Internal Data Protection Lead. For special category data and criminal records data, which involve higher risks, additional protections are required. Processing of this data must comply with Articles 9 and 10 of the UK GDPR and Schedule 1 of the Data Protection Act 2018. Relevant policies must be in place, and a Data Protection Impact Assessment (DPIA) must be completed and coordinated by the Internal Data Protection Lead, with approval recorded through the School’s governance arrangements and stored in the governance evidence repository. Research involving such data must include data protection safeguards in the ethics application process. Identifying a lawful basis ensures that data processing complies with legal requirements and upholds individuals' rights. Special category and criminal records data, due to their sensitivity, require enhanced protection to mitigate risks and ensure compliance with regulatory standards. Proper documentation and DPIAs support transparency and accountability in data processing activities. |
Data Subject Rights
All staff, students, and users have the following rights concerning their personal data:
Any requests or queries about data processing or access should be directed to the Internal Data Protection Lead at dataprotection@lsi-ac.uk, who coordinates DSAR logging, identity verification, retrieval from systems-of-record (as defined in the Information Governance Policy), and response within statutory timescales. Data Owners and relevant service teams must support timely retrieval and decision-making on records within their domains. DSAR handling must follow the School’s governed DSAR process and evidence expectations (including logging and records of decision-making) as set out in the Information Governance Policy. Not all rights apply in every situation. These rights ensure transparency and control over personal data, aligning with data protection regulations. They provide individuals with the means to manage and safeguard their information effectively. Directing requests to the Internal Data Protection Lead ensures proper handling and compliance with legal requirements. |
If a data subject is dissatisfied with how their personal data is processed or has questions or concerns, they should first contact the Internal Data Protection Lead at dataprotection@lsi-ac.uk. If the issue remains unresolved, they have the right to escalate their complaint to the Information Commissioner’s Office (ICO). This process ensures that concerns about data processing are addressed promptly and fairly. Providing a clear pathway for escalation to the ICO guarantees that data subjects have recourse if their issues are not resolved internally, in accordance with data protection regulations. |
Data Responsibilities at the School
The Executive Committee (EC) must oversee implementation of data protection controls. Data Owners (as defined in the Information Governance Policy) are accountable for compliant processing, data quality, and appropriate use within their domains. The EC is supported by the Information Governance Lead (Director of Technology) and coordinated privacy operations by the Internal Data Protection Lead. This ensures that personal data processing aligns with legal requirements and the School's internal management framework, thereby maintaining compliance and accountability in data handling practices. |
The Senior Information Risk Owner (SIRO), a member of the Executive Committee (Director of Technology), oversees information risk management and information security assurance, ensuring information risks are identified, managed and escalated through the governance routes set out in the Information Governance Policy. They ensure that information assets and risks are managed effectively and escalated to the Executive Committee when necessary. The SIRO represents information governance within the organisation, promoting a culture of effective information use and protection. This role ensures robust management of information and data risks and fosters a culture of effective information use and protection, supporting the School’s strategic objectives and compliance with data protection regulations. |
This ensures that all staff are knowledgeable about their data protection responsibilities, promotes a culture of compliance, and maintains effective risk management for data processing across departments. |
These rules ensure that all staff and third parties adhere to data protection standards, maintain accurate personal data, and properly report breaches, thereby safeguarding the School's data integrity and compliance with legal requirements. |
These rules ensure that students maintain accurate personal information, comply with data protection policies in their studies and employment, and follow proper procedures when handling personal data, thus aligning with legal and institutional data protection requirements. |
Internal Data Protection Lead
The School has appointed an Internal Data Protection Lead to coordinate privacy operations and compliance activity. The Internal Data Protection Lead will coordinate RoPA maintenance, DPIAs, DSARs, breach documentation and lessons learned, and support a culture of privacy across the School. They will:
The Internal Data Protection Lead does not set the purposes or means of personal data processing. The Internal Data Protection Lead supports compliance by coordinating privacy operations, advising on risk and controls, and coordinating communications with the ICO where required, with escalation through QCAC and (where material) the Board of Governors. The Internal Data Protection Lead ensures the School adheres to data protection laws by offering guidance, supporting compliance efforts, and acting as the liaison with regulatory bodies. This role helps maintain a culture of data protection and ensures proper implementation of legal requirements. |
Data Protection by Design and by Default
Data protection by design and by default must be applied at all times. This requires:
Data protection by design and by default ensures that privacy and security are integral to systems and processes, rather than being an afterthought. This approach helps to proactively address data protection issues and safeguard individuals' rights effectively. |
The School will:
The DPIA process helps to identify and address privacy issues and risks to individuals’ rights at the design and implementation stages of new systems, services, products, or business practices. This proactive approach ensures that data protection is integrated into the development process, helping to mitigate risks effectively and comply with data protection regulations. The Internal Data Protection Lead will coordinate implementation and adherence to this process, with operational input from the Director of Technology where technical and security controls are required. |
Periodic Evaluation and Upkeep of Policy Framework
This policy will be reviewed annually (or sooner after material change) under the School’s governance arrangements, coordinated by the Internal Data Protection Lead with operational input from the Director of Technology, and approved in line with delegated authority. Version control, archiving and evidence of what applied at any point in time will be maintained in the governance and assurance system-of-record (AGS) in line with the Information Governance Policy. Regular reviews ensure that the policy remains up-to-date with current legislation and organisational changes, maintaining compliance and effectiveness. Significant updates require Executive Committee approval to ensure alignment with overall organisational strategy and governance. |
Sharing and Storing Personal Data
The School shall:
In some cases, the School may be asked to provide notices e.g. from the Higher Education Statistics Agency (HESA) on Collection notices, HESA Student Collection Notices, and HESA Staff Collection Notices. Proper management of personal data sharing is crucial for maintaining the School’s operational success, protecting its reputation, and preserving the trust of employees, students, and other stakeholders. By following these guidelines, the School ensures that data is shared legally, securely, and only as necessary, in compliance with data protection regulations. |
Personal data must be stored and shared securely within network conditions, with additional measures applied for special category data where necessary. Data Owners are responsible for ensuring that staff with permissions to access and edit data are trained appropriately on the relevant systems. It is crucial that staff use only School-approved tools for processing personal data, as these tools have been technically assessed and include the correct contractual terms. If there is any uncertainty about a tool's approval status, staff should consult servicedesk@lsi.ac.uk. In general, freely available tools that do not have contractual agreements are unlikely to be approved or compliant and should not be used. This may include tools such as DropBox, Eventbrite, Mailchimp, and Zoom where they are not under an appropriate contract and not approved through the School’s governance and supplier controls. Staff must use only School-approved tools for processing personal data, as confirmed through the School’s governed registers and onboarding controls. Personal data must be captured and maintained in the School’s systems-of-record and governed repositories (as defined in the Information Governance Policy), and must not be duplicated into unmanaged local trackers or external tools. Ensuring that personal data is handled securely and using only approved tools is essential for compliance with data protection regulations. This approach protects the confidentiality and integrity of personal data, preventing unauthorised access and misuse, and thereby safeguarding the School's and individuals' data. |
International Data Transfers
Under Data Protection legislation, transferring personal data outside the UK is generally restricted unless specific conditions or safeguards are met. This ensures that data subjects receive an equivalent level of protection and that their rights are not compromised. Data may be transferred if:
Colleagues must consult the Internal Data Protection Lead to determine the most suitable safeguard, and record the safeguard in contracts and/or data sharing agreements and in the governed registers. Additionally, data subjects must be informed as per the transparency principle. For non-UK data transfers, a Data Protection Impact Assessment (DPIA) may be required, as such transfers are considered high risk. These measures ensure that personal data remains protected to the same standard when transferred outside the UK, maintaining data subject rights and compliance with data protection laws. Documenting safeguards and informing data subjects helps uphold transparency and accountability in data management practices. |
Training on Data Protection
Training is essential to meet Data Protection legislation and the Accountability principle. The School must not only establish appropriate policies and procedures but also demonstrate their implementation and provide comprehensive training at all levels. Training must:
The Director of Technology will oversee the implementation and effectiveness of these training systems. Effective training ensures that the School complies with Data Protection laws and effectively manages data protection risks. By embedding a culture of good data protection practices and reinforcing key policies, the School protects personal data and upholds accountability. |
Automated Governance System (AGS) Policy
The School utilises the Automated Governance System (AGS) to support its strategy of innovation. The AGS facilitates various functions, including:
The AGS operates in line with the School’s regulations and policies, including the IT Regulations, Data Protection Policy, and AI Policy. It supports the School’s mission efficiently while adhering to additional requirements such as the Sustainability & Environmental Policy outlined in the Vision and Values Statement. The AGS enhances the School's ability to innovate and deliver its mission effectively by streamlining key administrative functions. By integrating various processes into a single platform, the School ensures compliance with relevant regulations and supports its commitment to sustainability and effective performance measurement. |
The Automated Governance System (AGS) supports the governance of the School by integrating and streamlining processes for Boards, Departments, and Committees. Each entity has a defined role in ensuring the effective operation of the School, as outlined in the School’s regulations and policies. The School acknowledges that a reliable and efficient online system is essential for robust governance. The AGS facilitates effective governance by centralising and managing key processes for various institutional bodies. This ensures adherence to established regulations and policies while maintaining a high level of operational efficiency. The system is crucial for the School to function effectively and uphold its governance standards. |
The Automated Governance System (AGS) is vital for the School to fulfil its data protection obligations. The AGS integrates workflows to ensure data is processed and stored in line with the Data Protection Policy. This includes processing data lawfully, fairly, and transparently, and collecting it for legitimate purposes. The School maintains governed registers and evidence repositories to support accountability (including RoPA documentation, DPIAs, DSAR and breach logs, and assurance evidence) coordinated by the Internal Data Protection Lead and supported by the Director of Technology through appropriate systems. It ensures data is processed for lawful reasons, such as fulfilling contractual obligations, and upholds the rights of data subjects, including their right to access and obtain copies of their data. The Director of Technology, a member of the Executive Committee and the Senior Information Risk Owner (SIRO), oversees the AGS. The AGS helps the School comply with data protection principles by providing secure and transparent data management. It ensures adherence to legal requirements, supports accountability, and safeguards data subject rights. The Director of Technology’s oversight guarantees that the system operates effectively within the framework of data protection laws and policies. |
Data Protection Policy Violations and Response Procedures
All members of the School are responsible for complying with the Data Protection Act (DPA). Any negligent or intentional breach of the data protection policy by employees or students may lead to disciplinary action following a proper investigation. If a supplier fails to adhere to the policy or related data protection conditions, it may result in termination of the contract and/or claims for compensation. Any questions or concerns regarding privacy compliance and interpretation of this policy should be directed to the Internal Data Protection Lead. Queries relating to information security and systems controls should be directed to the Director of Technology. Strict adherence to the DPA is essential for maintaining data protection standards. Disciplinary actions and potential contract terminations are necessary to address breaches and ensure compliance. Clear channels for addressing questions ensure that policy implementation is consistent and well-managed. |
Data Breaches
The School must promptly identify and report personal data breaches to the Internal Data Protection Lead using the designated reporting process. This includes all breaches, whether accidental, suspected, or confirmed. Breaches must be reported to the ICO within 72 hours where reportable, and the School must ensure all incidents are logged within 24 hours and triaged within 48 hours, in line with the incident logging and triage expectations set out in the Information Governance Policy.The Internal Data Protection Lead will coordinate risk assessment, containment and mitigation actions, notification decisions, and records of all breaches, with operational and technical support from the Director of Technology and relevant Data Owners for affected domains. Personal data breach handling must follow the School’s governed incident and breach process and evidence expectations (including escalation where material) as set out in the Information Governance Policy. Failure to handle and report breaches properly can lead to substantial fines from the ICO, up to £17,500,000 for severe cases. Timely reporting is crucial to fulfil legal obligations, minimise risks to individuals, and mitigate potential damage. Prompt action and proper reporting help avoid significant penalties and ensure compliance with data protection laws. What is a data breach? A personal data breach involves a security incident that results in the destruction, loss, alteration, unauthorised disclosure, or access to personal data. The impact and risk of a breach depend on various factors, including the type and amount of data, the circumstances of the breach, and the speed of the response. Examples of data breaches include:
For further guidance, please contact dataprotection@lsi-ac.uk |
Further Guidance
Staff must seek guidance from the Internal Data Protection Lead for privacy compliance matters, and from the Director of Technology for information security and systems controls. The Internal Data Protection Lead and Director of Technology provide expert advice to ensure compliance with data protection laws and best practices. Their guidance helps staff manage sensitive data correctly, adhere to legal requirements, and handle data protection issues effectively. This ensures the School remains compliant with relevant legislation and protects the rights of data subjects. Related Links:
For further questions, contact the Internal Data Protection Lead for privacy compliance matters, and the Director of Technology for information security and systems controls |
Appendix 1: Terminology and Definitions in Data Protection
The following definitions clarify key data protection terms within the context of the School:
For further details on key definitions, visit the ICO's guide: ICO Key Definitions Understanding these key definitions ensures that all members of the School are aware of their data protection obligations and the terminology used in data management. This clarity helps in the correct handling of personal data, compliance with legal requirements, and effective communication regarding data protection matters. Accurate definitions are essential for implementing appropriate measures to protect personal data and to respond correctly to data breaches and other data protection issues. |
Appendix 2: Data Privacy Considerations for Social Media
When using social media, do not publish colleagues' or students' personal information. Ensure that all processing aligns with the Data Protection Policy and the Data Protection Act 2018. All uploads, storage, and communications must be lawful and fair. Before using a social media account, inform all parties about the type of information being shared, its purpose, and who will have access to it. Familiarise yourself with privacy settings and adjust them according to the content and intended audience. Obtain and document appropriate informed consent. Ensure that passwords and access controls for School social media accounts are strong and secure. Avoid using the same password for School systems and social media sites. Change passwords regularly and never share them. Devices with stored social media login details should lock or log out automatically. If a device with login details is lost or stolen, change the passwords for all affected accounts and inform other account managers. Be cautious with social media postings to avoid revealing personal information such as your location or contact details. Only accept invitations from known contacts and verify identities if unsure. Avoid clicking on unsolicited links to prevent installing malicious software. Be aware that social media applications may share your profile data with third parties. Review privacy settings regularly. Adhere to the IT Regulations, including the Social Media Policy and Social Media Guidelines. Adhering to these rules helps protect personal information and ensures compliance with data protection legislation. Proper management of social media accounts prevents unauthorised access, reduces the risk of data breaches, and protects both individual and organisational data from malicious activities. Understanding and applying these practices supports a secure and responsible use of social media in alignment with legal and institutional requirements. |
Appendix 3: Data Protection Implications of CCTV Surveillance
The School operates a CCTV monitoring system to detect and deter crime and assist the Police and civil authorities during major emergencies. This system will be managed to respect individuals’ privacy rights. All CCTV footage is owned by the School, which holds the copyright. Cameras will be placed in public view with clear signage indicating their presence and purpose. Recorded footage will be retained according to the School's Records Retention Schedules. After the retention period, if the footage is not needed for evidence, it will be recycled. If the footage is required for legal proceedings, it will be kept for the duration necessary for the case. This approach ensures that CCTV monitoring supports security and emergency response while adhering to privacy laws and data protection principles. By clearly marking camera locations and following a defined retention schedule, the School balances security needs with respect for individual privacy and legal requirements. |
The following metrics will be measured and regularly reviewed as key performance indicators for the School to ensure the effectiveness of this policy and associated operations.
Data Breach IncidentsThis metric quantifies the number and severity of data breach incidents occurring within the School. It captures details regarding the nature of breaches, data affected, response times, and the outcomes of any investigations or remedial actions. Tracking data breach incidents is critical for identifying security vulnerabilities and assessing the effectiveness of the School's response protocols. Analysing breach patterns aids in proactively strengthening data protection measures and reducing future risks. |
Data Protection Training CompletionThis metric measures the percentage of staff and students who have successfully completed mandatory data protection training. It takes into account the regularity and completion rates of training sessions, as well as any refresher courses undertaken. A high completion rate indicates widespread awareness and understanding of the data protection policy across the School, while lower rates may suggest a need for improved communication or training provisions. Tracking this metric ensures that the School maintains a high level of data protection competence among its members, which is vital for the secure management of personal data. Such training minimises the risk of data breaches and ensures compliance with the Data Protection Act 2018. |
DPIA Completion RatesThe Data Protection Impact Assessment (DPIA) Completion Rates metric tracks the number of DPIAs conducted versus the number required for 'high risk' data processing activities. It reflects the School's commitment to identifying and mitigating risks at the outset of a project. Recording DPIA completion rates ensures that the School adheres to best practices for data protection by design. It demonstrates a proactive approach to privacy and compliance with regulatory expectations for risk assessment. |
Subject Access Requests FulfilledThis metric records the number of data subject access requests received and successfully fulfilled within the statutory timeframe. It reflects the School's efficiency and transparency in providing individuals with access to their personal data, as per their rights under the DPA. By measuring the handling of subject access requests, the School can assess its capacity to respond to data subjects swiftly and correctly, thereby upholding individuals' rights and the transparent nature of data processing endeavours. |