For many new businesses, celebrating a happy third birthday is a key milestone. However, reaching three years is not easy to achieve. This week we celebrated our third birthday and we had the opportunity to sit and discuss what we did well and also what we did wrong....
Archives
Howard Freeman
Accountants! When was the last time you reviewed your GDPR?
Accountants are very good with numbers as we all know and appreciate. However, is your data management up to the required standard? Was it within the last year. Did you cary out a thorough audit? Have you actually achieved compliance? Accountants! When was the last...
What is the most secure way to transmit data?
Safe information transfer is a must for modern organisations, but not all secure data transmission methods are equal. Here we explore the options available to you. A significant issue facing businesses is implementing secure data transmission methods when sending and...
GDPR Compliance Checklist
1. Obtain board-level support and put accountability measures in place 2. Plan your GDPR compliance project and its scope 3. Conduct a data inventory and data flow audit 4. Undertake a comprehensive risk assessment 5. Carry out a detailed gap analysis 6. Develop...
A Letter From the ICO
Many businesses have now received a letter from the ICO asking for a registration fee of £40 or £60. We are being asked all the time whether or not the letter is genuine and whether a business needs to pay. Every organisation or sole trader who processes personal...
Post-Brexit Data Protection
The Brexit transition period ended on 31st December 2020. UK organisations that process personal data must now comply with the following laws: The DPA (Data Protection Act) 2018 and UK GDPR (General Data Protection Regulation) if they process only domestic...
Data Subject Rights and the GDPR
The EU GDPR (General Data Protection Regulation) gives individuals eight rights relating to their personal data. Organisations must let individuals know how they can exercise these rights and meet requests promptly. Failure to do so is a breach of the GDPR....
GDPR and Encryption
Pseudonymisation and encryption are the only technological measures specifically mentioned in the GDPR (General Data Protection Regulation). But what exactly is meant by ‘pseudonymisation’ and ‘encryption’? Are these measures mandatory? More importantly, how can...
GDPR Processing Lawful Bases
The EU GDPR (General Data Protection Regulation) states that you need to identify a lawful basis before processing personal data. But, what is a lawful basis for processing? Do you always need individuals’ consent to process their data? And what is meant by the term...
ISO 27001 and GDPR Compliance
Anyone struggling with the EU GDPR (General Data Protection Regulation) should look no further than ISO 27001. It’s the international standard for information security. The ISO 27001 framework is close enough to the Regulation’s that many experts consider it a perfect...
GDPR Risk Assessments
Your business is required to comply with the GDPR (General Data Protection Regulation). Therefore you are obliged to conduct regular GDPR risk assessments. This isn’t just because the Regulation says that you should. Risk assessments are essential for...
DPIA (Data Protection Impact Assessment)
DPIA (data protection impact assessment) is a type of risk assessment designed to identify the risks affecting the security of personal data. A DPIA will help you understand the likely consequences of processing such data. Understanding what a DPIA is is all part...
Data Protection by Design and BY Default
Data protection by design and default is nothing new. But, while privacy by design was good practice under the Data Protection Act of 1998, data protection by design and by default are legal requirements of Article 25 of the GDPR. Here’s how data protection by design...
Personal Data and Sensitive Data
Do you know the difference? The GDPR includes a sub-category of sensitive personal data that comes with its own requirements. The GDPR (General Data Protection Regulation) has been in force for some time. So, no doubt you are familiar with the term ‘personal...
What is an Information Security Policy?
It is well known that your people are the weakest part of your business security defences. You can spend a great deal of time designing processes to protect your business. You can then invest in state-of-the-art technology to detect threats. However, these will only...
The Age Appropriate Design Code
The Children's Code The Children’s Code (or Age Appropriate Design Code to give its proper title) is a data protection code of practice for online services. This includes apps, online games, and web and social media sites that are likely to be accessed by...
Electronic Signatures
In July 2016, the EU issued the eIDAS regulation, which increased the significance of electronic signatures drastically. However, under the current circumstances, the value of signing documents online is higher than ever before. What is an electronic signature?...
DSP Toolkit for Care Homes
The recently launched NHS DSP Toolkit for Care Homes was designed to help care homes with an NHS email address. Full compliance, or standards met is also available allowing care homes to take part in Coordinate My Care. When registered, he care home faces a tad which...