DATA PROTECTION POLICY STATUTORY

Size: px
Start display at page:

Download "DATA PROTECTION POLICY STATUTORY"

Transcription

1 DATA PROTECTION POLICY MAIDEN ERLEGH TRUST STATUTORY INITIAL APPROVAL July 2017 REVIEW FREQUENCY At least every two years REVIEWED

2 CONTENTS PART ONE: POLICY STATEMENT & OBJECTIVES PART TWO: STATUS OF THE POLICY PART THREE: DEFINITION OF TERMS PART FOUR: DATA PROTECTION PRINCIPLES PART FIVE: FAIR AND LAWFUL PROCESSING PART SIX: PROCESSING FOR LIMITED PURPOSES PART SEVEN: ADEQUATE, RELEVANT AND NON-EXCESSIVE PROCESSING PART EIGHT: ACCURATE DATA PART NINE: TIMELY PROCESSING PART TEN: PROCESSING IN LINE WITH DATA SUBJECT'S RIGHTS PART ELEVEN: DATA SECURITY PART TWELVE: DEALING WITH SUBJECT ACCESS REQUESTS PART THIRTEEN: PROVIDING INFORMATION OVER THE TELEPHONE PART FOURTEEN: AUTHORISED DISCLOSURES PART FIFTEEN: CCTV PART SIXTEEN: POLICY REVIEW PART SEVENTEEN: ENQUIRIES APPENDIX 1: APPENDIX 2: CCTV CODE OF PRACTICE CCTV DISCLOSURE FORM

3 1. Policy statement and Objectives 1.1 The objectives of this Data Protection Policy are to ensure that Maiden Erlegh Trust (the Trust ) and its directors, governors and employees are informed about, and comply with, their obligations under the Data Protection Act 1998 ( the Act ). 1.2 Everyone has rights with regard to how their personal information is handled. During the course of our activities we will collect, store and process personal information about a number of different groups of people and we recognise the need to treat it in an appropriate and lawful manner. 1.3 The types of information that we may be required to handle include details of current, past and prospective employees and students, parents, directors, Local Advisory Board (LAB) members, suppliers and other individuals that we communicate with. The information, which may be held on paper or on a computer or other media, is subject to certain legal safeguards specified in the Act and other regulations. The Act imposes restrictions on how we may use that information. 1.4 This policy does not form part of any employee's contract of employment and it may be amended at any time. Any breach of this policy will be taken seriously and may result in disciplinary action and serious breaches may result in dismissal. Breach of the Act may expose the Trust to enforcement action by the Information Commissioner or fines. Furthermore, certain breaches of the Act can give rise to personal criminal liability for the Trust s employees. At the very least, a breach of the Act could damage our reputation and have serious consequences for the Trust. 1.5 The Trust has notified the Information Commissioner that it processes personal information, and is on the register of data controllers, registration number Z It is the responsibility of the Director of Finance and Operations to confirm or amend the entry when the entry becomes inaccurate, incomplete or requires renewal each year. 2. Status of the policy 2.1 This policy has been approved by the Directors of the Trust. It sets out our rules on data protection and the legal conditions that must be satisfied in relation to the obtaining, handling, processing, storage, transportation and destruction of personal information. 2.2 The Data Protection Compliance Manager is responsible for ensuring compliance with the Act and with this policy. That post is held by Mr Jonathon Peck, Director of Finance and Operations. Any questions or concerns about the operation of this policy should be referred in the first instance to the Data Protection Compliance Manager. 2.3 If you consider that the policy has not been followed in respect of personal data about yourself or others you should raise the matter with the Data Protection Compliance Manager. 3. Definition of terms Data is information which is stored electronically, on a computer, or in certain paper-based filing systems. Data subjects for the purpose of this policy include all living individuals about whom we hold personal data. A data subject need not be a UK national or resident. All data subjects have legal rights in relation to their personal data. 1

4 Personal data means data relating to a living individual who can be identified from that data (or from that data and other information in our possession). Personal data can be factual (such as a name, address or date of birth) or it can be an opinion (such as a school report) and can include telephone numbers, photographs and CCTV images. Data controllers are the people who or organisations which determine the purposes for which, and the manner in which, any personal data is processed. They have a responsibility to establish practices and policies in line with the Act. We are the data controller of all personal data used in our business. Data users include employees whose work involves using personal data. Data users have a duty to protect the information they handle by following our data protection and security policies at all times. Data processors include any person who processes personal data on behalf of a data controller. Employees of data controllers are excluded from this definition, but it could include suppliers which handle personal data on our behalf. Parent has the meaning given in the Education Act 1996 and includes any person having parental responsibility or care of a child. Processing is any activity that involves use of the data. It includes obtaining, recording or holding the data, or carrying out any operation or set of operations on the data including organising, amending, retrieving, using, disclosing, erasing or destroying it. Processing also includes transferring personal data to third parties. Sensitive personal data includes information about a person's racial or ethnic origin, political opinions, religious or similar beliefs, trade union membership, physical or mental health or condition or sexual life, or about the commission of, or proceedings for, any offence committed or alleged to have been committed by that person, the disposal of such proceedings or the sentence of any court in such proceedings. Sensitive personal data can only be processed under strict conditions, and will usually require the express consent of the person concerned. 4. Data protection principles 4.1 Anyone processing personal data must comply with the eight enforceable principles of good practice. These provide that personal data must be: - Processed fairly and lawfully. - Processed for limited purposes and in an appropriate way. - Adequate, relevant and not excessive for the purpose. - Accurate. - Not kept longer than necessary for the purpose. - Processed in line with data subjects' rights. - Secure. 4.2 Not transferred to people or organisations situated in countries without adequate protection. 5. Fair and lawful processing 5.1 The Act is intended not to prevent the processing of personal data, but to ensure that it is done fairly and without adversely affecting the rights of the data subject. The data subject must be told who the data controller is (in this case the Trust), who the data controller's 2

5 representative is (in this case the Data Protection Compliance Manager), the purpose for which the data is to be processed by us, and the identities of anyone to whom the data may be disclosed or transferred. 5.2 For personal data to be processed lawfully, certain conditions have to be met. These may include, among other things, requirements that the data subject has consented to the processing, or that the processing is necessary for the legitimate interest of the data controller or the party to whom the data is disclosed. When sensitive personal data is being processed, more than one condition must be met. In most cases the data subject's explicit consent to the processing of such data will be required. 6. Processing for limited purposes 6.1 Personal data may only be processed for the specific purposes notified to the data subject when the data was first collected, or for any other purposes specifically permitted by the Act. This means that personal data must not be collected for one purpose and then used for another. If it becomes necessary to change the purpose for which the data is processed, the data subject must be informed of the new purpose before any processing occurs. 7. Adequate, relevant and non-excessive processing 7.1 Personal data should only be collected to the extent that it is required for the specific purpose notified to the data subject. Any data which is not necessary for that purpose should not be collected in the first place. 7.2 In order to ensure compliance with this principle, the Trust will check records regularly for missing, irrelevant or seemingly excessive information and may contact data subjects to verify certain items of data. Decisions on data to be deleted must come from the Data Protection Compliance Manager, after taking appropriate guidance. 8. Accurate data 8.1 Personal data must be accurate and kept up to date. Information which is incorrect or misleading is not accurate and steps should therefore be taken to check the accuracy of any personal data at the point of collection and at regular intervals afterwards. Inaccurate or out-of-date data should be destroyed. 8.2 If a data subject informs the Trust of a change of circumstances their computer record will be updated as soon as is practicable. A printout of their data record will be provided to data subjects periodically so they can check its accuracy and make any amendments. 8.3 Where a data subject challenges the accuracy of their data, the Trust will immediately mark the record as potentially inaccurate, or 'challenged'. In the case of any dispute, we shall try to resolve the issue informally, but if this proves impossible, disputes will be referred to the board of trustees for their judgement. If the problem cannot be resolved at this stage, the data subject should refer their complaint to the Information Commissioner s Office. Until resolved the 'challenged' marker will remain and all disclosures of the affected information will contain both versions of the information. 8.4 Notwithstanding paragraph 8.3, a data subject continues to have rights under the Act and may refer a complaint to the Information Commissioner s Office regardless of whether the procedure set out in paragraph 8.3 has been followed. 3

6 9. Timely processing 9.1 Personal data should not be kept longer than is necessary for the purpose for which it is held. This means that data should be destroyed or erased from our systems when it is no longer required. 9.2 It is the duty of the Data Protection Compliance Manager, after taking appropriate guidance for legal considerations, to ensure that obsolete data are properly erased. The Trust has a retention schedule for all data. 10. Processing in line with data subject's rights 10.1 Data must be processed in line with data subjects' rights. Data subjects have a right to: - Request access to any data held about them by a data controller; - Prevent the processing of their data for direct-marketing purposes; - Ask to have inaccurate data amended; and - Prevent processing that is likely to cause damage or distress to themselves or anyone else. 11. Data security The Trust has taken steps to ensure that appropriate security measures are taken against unlawful or unauthorised processing of personal data, and against the accidental loss of, or damage to, personal data. Data subjects may apply to the courts for compensation if they have suffered damage from such a loss The Act requires us to put in place procedures and technologies to maintain the security of all personal data from the point of collection to the point of destruction. Personal data may only be transferred to a third-party data processor if they agree to comply with those procedures and policies, or if they put in place adequate measures themselves. Consideration should be given as to whether contracts with third party data-processors contain suitable contractual obligations on the third party to comply with the Act and to indemnify the Trust for if they breach the Act Maintaining data security means guaranteeing the confidentiality, integrity and availability of the personal data, defined as follows: - Confidentiality means that only people who are authorised to use the data can access it. - Integrity means that personal data should be accurate and suitable for the purpose for which it is processed. - Availability means that authorised users should be able to access the data if they need it for authorised purposes. Personal data should therefore be stored on our central computer system instead of individual PCs. 1 Some schools may have a separate data security policy in which case you may refer to it in paragraph 11 instead of the text set out above. If your school does not have a separate data security policy then you can include the wording set out in paragraphs and amend the title of this document so that it refers to a Data Protection and Data Security Policy 4

7 11.4 Security procedures include: 2 - Physical Security: Appropriate building security measures are in place, such as alarms, window bars, deadlocks and computer hardware cable locks. Only authorised persons are allowed in the server room. Disks, tapes and printouts are locked away securely when not in use. Visitors to the School are required to sign in and out, to wear identification badges whilst in the School and are, where appropriate, accompanied. - Computer Security: Security software is installed on all computers containing personal data. Only authorised users are allowed access to the computer files and password changes are regularly undertaken. Computer files are backed up (i.e. security copies are taken) regularly. Data users should ensure that individual monitors do not show confidential information to passers-by and that they log off from their PC when it is left unattended. - Procedural Security: In order to be given authorised access to the computer, staff will have to undergo checks and will sign a confidentiality agreement. All staff are trained in their Data Protection obligations and their knowledge updated as necessary. Computer printouts as well as source documents are shredded before disposal Paper documents should be shredded and floppy disks and CD-ROMs should be given to the IT department to be physically destroyed when they are no longer required The Trust has a Bring Your Own Device policy for employees to sign where personal data held by the Trust is processed on their personal mobile phones, tablets, computers or other devices. 12. Dealing with subject access requests 12.1 The Act extends to all data subjects a right of access to their own personal data. A formal request from a data subject for information that we hold about them must be made in writing. A fee may be payable by the data subject for provision of this information. Any member of staff who receives a written request should forward it to their line manager or the Data Protection Compliance Manager IMMEDIATELY as there are statutory time limits for responding (currently 40 calendar days) In order to ensure that people receive only information about themselves it is essential that a formal system of requests is in place. Where a request for subject access is received from a pupil, the Trust s policy is that: Requests from pupils who are considered mature enough to understand their rights under the Act will be processed as a subject access request as outlined below and the data will be given directly to the pupil (subject to any exemptions that apply under the Act or other legislation). The Information Commissioner s guidance is that it may be reasonable to adopt a presumption that by the age of 12 a child has sufficient maturity to understand their rights and to make an access request themselves if they wish. In every case it will be for the Trust, as data controller, to assess whether the child is capable of understanding their rights 2 Paragraph 11.4 is an example of some of the security procedures that schools may put in place. However, it is very important that you tailor this section according to your Trust s own practices as it must reflect what you actually do to keep data secure. If there are no data security practices in place at your school then you must address this and consider whether training is necessary. 3 The timescale of 40 calendar days cannot be extended and will continue regardless of whether the school is closed for holidays (unlike the Freedom of Information Act 2000). It is therefore advisable that subject access requests are dealt with as soon as possible. 5

8 under the Act and the implications of their actions, and so decide whether the parent needs to make the request on the child s behalf. A parent would normally be expected to make a request on a child s behalf if the child is younger than 12 years of age. Requests from pupils who do not appear to understand the nature of the request will be referred to their parents or carers. Requests from parents in respect of their own child will be processed as requests made on behalf of the data subject (the child) and the data will be sent in a sealed envelope to the requesting parent (subject to any exemptions that apply under the Act or other legislation) unless the Trust considers the child to be mature enough to understand their rights under the Act, in which case the Trust shall ask the child for their consent to disclosure of the personal data (subject to any enactment or guidance which permits the Trust to disclose the personal data to a parent without the child s consent). Subject to paragraph 14, if consent is not given to disclosure, the Trust shall not disclose the personal data if to do so would breach any of the eight data protection principles It should be noted that the Education (Pupil Information) (England) Regulations 2005 do not apply to academies so the rights available to parents in those Regulations to access their child s educational records are not applicable to schools in the Trust. Instead, requests from parents for personal data about their child must be dealt with under the Act (as outlined above). This is without prejudice to the obligation on the Trust in the Education (Independent School Standards) (England) Regulations 2014 to provide an annual report of each registered pupil's progress and attainment in the main subject areas taught to every parent (unless they agree otherwise in writing) Following receipt of a subject access request, and provided that there is sufficient information to process the request, an entry will be made in the Trust s Subject Access log book, showing the date of receipt, the data subject s name, the name and address of requester (if different), the type of data required (e.g. Student Record, Personnel Record), and the planned date for supplying the information (not more than 40 days from the request date). Should more information be required to establish either the identity of the data subject (or agent) or the type of data requested, the date of entry in the log will be date on which sufficient information has been provided. 13. Providing information over the telephone 13.1 Any member of staff dealing with telephone enquiries should be careful about disclosing any personal information held by us whilst also applying common sense to the particular circumstances. In particular they should: - Check the caller's identity to make sure that information is only given to a person who is entitled to it. - Suggest that the caller put their request in writing if they are not sure about the caller's identity and where their identity cannot be checked. - Refer to their line manager or the Data Protection Compliance Manager for assistance in difficult situations. No-one should be bullied into disclosing personal information. 14. Authorised disclosures 14.1 The School will, in general, only disclose data about individuals with their consent or unless the law requires or allows us to. There are circumstances under which the Trust may need to disclose data without explicit consent for that occasion including (but not limited to) the following: 6

9 - Pupil data disclosed to authorised recipients related to education and administration necessary for the Trust to perform its statutory duties and obligations. - Pupil data disclosed to authorised recipients in respect of their child s health, safety and welfare. - Pupil data disclosed to parents in respect of their child s progress, achievements, attendance, attitude or general demeanour within or in the vicinity of the Trust. - Staff data disclosed to relevant authorities e.g. in respect of payroll and administrative matters. - Unavoidable disclosures, for example to an engineer during maintenance of the computer system. In such circumstances the engineer would be required to sign a form promising not to disclose the data outside the Trust. - Disclosures required as a result of a court order or pursuant to an act of Parliament. - Disclosures to the Police where the Trust is satisfied that the information is needed to prevent or detect a crime or to catch and prosecute a suspect Only authorised and trained staff are allowed to make external disclosures of personal data in accordance with the Act. Data used within the Trust by administrative staff, teachers and welfare officers will only be made available where the person requesting the information is a professional legitimately working within the School who needs to know the information in order to do their work. 15. CCTV 15.1 CCTV cameras are located in those areas where the school has identified a need. The school s CCTV system is used solely for purposes(s) identified below and is not used to routinely monitor staff conduct. - protect the academy buildings and their assets; - increase personal safety and reduce the fear of crime; - support the Police in a bid to deter and detect crime; - assist in identifying, apprehending and prosecuting offenders; - protect members of the public and private property; and - assist in managing the academy - More information on the Trusts use of CCTV can be found in Appendix Policy Review 16.1 It is the responsibility of the Directors to facilitate the review of this policy every two years. Recommendations for any amendments should be reported to the Data Protection Compliance Manager. We will continue to review the effectiveness of this policy to ensure it is achieving its stated objectives. 17. Enquiries 17.1 Further information about the School s Data Protection Policy is available from the Data Protection Compliance Manager. General information about the Act can be obtained from the Information Commissioner s Office: 7

10 Useful References The Information Commissioner s Office 8

11 APPENDIX 1: Under the Protection of Freedoms Act 2012 the processing of personal data captured by CCTV systems (including images identifying individuals) is governed by the Data Protection Act and the Information Commissioner s Office (ICO) has issued a code of practice on compliance with legal obligations under that Act. The Data Controller is Maiden Erlegh Trust and has notified the Information Commissioner s Office (ICO) of this and the purposes for use of CCTV. Each school within the Trust uses CCTV equipment to: Assist in the prevention, investigation and detection of crime Facilitate the identification, apprehension and prosecution of offenders in relation to crime and public order and as an aid to public safety Assist with the provision of a safer public environment Assist with the promotion of the principles of customer care No school within the Trust will use the CCTV system for covert monitoring. CCTV is operated 24 hours a day 7 days a week. CCTV cameras record visual images only and do not record sound. Location Cameras are located in those areas where the school has identified a need. The school s CCTV system is used solely for purposes(s) identified above and is not used to routinely monitor staff conduct. Cameras will only be used in exceptional circumstances in areas where the subject has a heightened expectation of privacy e.g. changing rooms or toilets. In these areas, the school will use increased signage in order that those under surveillance are fully aware of its use. Maintenance Each CCTV system in school will be maintained by a specialist CCTV contractor and this may include periodic inspections of footage. Identification Each school will ensure that there are prominent signs placed around the site which are clearly visible and readable and contain details of the purpose for using CCTV and who to contact about the scheme. Administration All operatives and employees with access to images are aware of the procedures that need to be followed when accessing or disclosing the recorded images. Operators are trained in their responsibilities under the CCTV Code of Practice. Access to recorded images is restricted to staff that need to have access in order to achieve the purpose of using the equipment. School staff can view CCTV footage in order to make a decision as to whether to search a student for an item as described in the DfE document Searching, screening and confiscation If the recorded footage reveals that misconduct has been committed by a member of staff, this evidence may be used in a disciplinary case. 9

12 Image storage, viewing and retention Recorded images will be stored in a way that ensures the integrity of the image and in a way that allows specific times and dates to be identified. Live images can be seen on a monitor in the office/reception area of each school. These images are not visible by members of the public or students. Recorded images can only be viewed in a restricted area by approved staff. The Headteacher of each school decides who is an approved member of staff to view and operate the CCTV system. The recorded images are viewed only when there is suspected criminal activity or activity which contravenes the school code of conduct for staff, students and visitors. Each school reserves the right to use images captured on CCTV where there is activity that the school cannot be expected to ignore such as criminal activity, potential gross misconduct, or behaviour which puts others at risk. Where images are extracted from the CCTV system, the reason for its retention is recorded, where it is kept, any use made of the images. Disclosure Maiden Erlegh Trust (the Data Controller) has delegated authority to disclose recorded images to or view live data by third parties, including the Police, to members of the Senior Leadership team in each school. Disclosure/viewing will only be granted: - If its release/viewing is fair to the individuals concerned. - If there is an overriding legal obligation (e.g. information access rights). - If it is consistent with the purpose for which the system was established. All requests for viewing by and disclosure to third parties are recorded using the form in Appendix 2. Subject access requests Individuals whose images are recorded have a right to view images of themselves and, unless they agree otherwise, to be provided with a copy of the images. If a school receives a request under the Data Protection Act it will comply with requests within 40 calendar days of receiving the request. The school may charge a fee for the provision of a copy of the images. If the school receives a request under the Freedom of Information Act it will comply with requests within 20 working days of receiving the request. As a general rule, if the viewer can identify any person other than, or in addition to, the person requesting access, it will be deemed personal data and its disclosure is unlikely as a Freedom of Information request. Those requesting access must provide enough detail to allow the operator to identify that they are the subject of the images, and for the operator to locate the images on the system. Requests for access should be addressed to the data controller. Refusal to disclose images may be appropriate where its release is: - Likely to cause substantial and unwarranted damage to that individual. 10

13 - To prevent automated decisions from being taken in relation to that individual. Monitoring and review The efficacy of this code of practice will be kept under review. If the Trust decides to change the way in which it uses CCTV, it will inform the Information Commissioner within 28 days. 11

14 APPENDIX 2: Maiden Erlegh Trust DATA PROTECTION ACT 1998 Disclosure of data to 3 rd party, including Police ReferenceNumber. Section A Description of Data required to be disclosed (To be completed by a School Representative) (Please tick as required) View Take possession of original Copy Given verbally Description of document(s) Disclosure of Data contained within computerised records (including CCTV images) (Please tick as required) View Take possession of disc copy Printout Given verbally State what data is required and where data stored (i.e. address of named person from SIMS). School representative making copy Name.. Signature Date. School representative making disclosure/handing over copy this must be agreed by a member of SLG prior to handing over copy. Name Signature... 12

15 Date SLG signature.. Section B overleaf to be completed Section B Reason Data required a) To be completed by Police Officer or b) to be completed by other agency a) I can confirm that the data detailed on page 1 is required by me for any of the following reasons contained within sections 28(1), 29(1)(a) and (b) and 35(2)(a) of the Act. For the purpose of safeguarding national security The prevention or detection of crime For the purpose of, or in connection with, any legal proceedings (including prospective legal proceedings) Is otherwise necessary for the purposes of establishing, exercising or defending legal rights (Please tick as required) Name.Collar Number. Police Force Station.... Signature Date... Crime/Incident No b) I can confirm that the above data is required by me for any of the following reasons contained within sections 28(1), 29(1)(a) and (b) and 35(2)(a) of the Act. For the purpose of safeguarding national security The prevention or detection of crime For the purpose of, or in connection with, any legal proceedings (including prospective legal proceedings) Is otherwise necessary for the purposes of establishing, exercising or defending legal rights (Please tick as required) Name. 13

16 Position (if applicable). Business/Agency (if applicable)... Business/Agency/Home address (whichever is applicable) Signature Date Reference No. Completed forms must be returned to the Director of Finance and Operations. Office use: Date receipt Date Added to disclosure log 14

DATA PROTECTION AND FREEDOM OF INFORMATION POLICY

DATA PROTECTION AND FREEDOM OF INFORMATION POLICY DATA PROTECTION AND FREEDOM OF INFORMATION POLICY Version 1.0 Date 11/11/2016 Approved by Board of Directors 09/02/2017 Version Date Description Revision author 1.0 11/11/2016 Trust Version Created FMW

More information

European College of Business and Management Data Protection Policy

European College of Business and Management Data Protection Policy European College of Business and Management Data Protection Policy 1. INTRODUCTION 1.1 The European College of Business and Management (ECBM) is committed to full compliance with the Data Protection Act

More information

Data Protection Act 1998 Policy

Data Protection Act 1998 Policy Data Protection Act 1998 Policy Responsibility for Policy: Relevant to: University Secretary All Staff, Students and Academic Partnerships Approved by: SMT in September 2016 Responsibility for Document

More information

Staff Data Protection Policy

Staff Data Protection Policy Staff Data Protection Policy Version: 9.0 Approval Status: Approved Document Owner: Graham Feek Classification: External Review Date: 02/11/2016 Effective from: 1 July 2015 Table of Contents 1. The Data

More information

A closed circuit television system is used at the Memorial Hall by the Parish Council.

A closed circuit television system is used at the Memorial Hall by the Parish Council. BREADSALL PARISH COUNCIL CCTV CODE OF PRACTICE A closed circuit television system is used at the Memorial Hall by the Parish Council. The safety of residents using the car park and visitors to the buildings

More information

DATA PROTECTION (JERSEY) LAW 2005 CODE OF PRACTICE & GUIDANCE ON THE USE OF CCTV GD6

DATA PROTECTION (JERSEY) LAW 2005 CODE OF PRACTICE & GUIDANCE ON THE USE OF CCTV GD6 DATA PROTECTION (JERSEY) LAW 2005 CODE OF PRACTICE & GUIDANCE ON THE USE OF CCTV GD6 2 DATA PROTECTION (JERSEY) LAW 2005: CODE OF PRACTICE & GUIDANCE ON THE USE OF CCTV PART 1: CODE OF PRACTICE Introduction

More information

Data Protection Policy

Data Protection Policy Data Protection Policy St Barnabas & St Philip s Church of England Primary School P:\Policies and Documents\Data Protection Policy.docx 1 Responsibility: Contents: It is the responsibility of the Governors

More information

The installation of CCTV can provide information on activities at the Water,

The installation of CCTV can provide information on activities at the Water, ST CHAD S WATER LNR CCTV CODE OF PRACTICE St Chad s Fishing Club A closed circuit television system is used at St Chad s Water LNR, Church Wilne (known in the Code as the Water) by the St Chad s Fishing

More information

Access to Personal Information Procedure

Access to Personal Information Procedure Purpose of The sixth principle of the Data Protection Act 1998 gives rights to individuals in respect of the personal data that organisations hold about them. The Act says that: Personal data shall be

More information

CCTV Code of Practice

CCTV Code of Practice CCTV Code of Practice Belfast Trust CCTV Code of Practice Introduction Closed Circuit Television (CCTV) systems are in place across the Belfast trust. These systems comprise of cameras installed at strategic

More information

CCTV CODE OF PRACTICE

CCTV CODE OF PRACTICE EDINBURGH NAPIER UNIVERSITY CCTV CODE OF PRACTICE Introduction The monitoring, recording, holding and processing of images of identifiable individuals constitutes personal data as defined by the Data Protection

More information

Data Protection Policy

Data Protection Policy Complaints Procedure If anyone in the school community feels that this policy is not being followed then they should raise the matter first with the Headteacher and, if concerns persists, with the Chair

More information

How we use Personal Information

How we use Personal Information How we use Personal Information Introduction This document explains how Essex Police obtains, holds, uses and discloses information about people - their personal information 1 -, the steps we take to ensure

More information

DATA SHARING AND PROCESSING

DATA SHARING AND PROCESSING DATA SHARING AND PROCESSING Capita Business Services Limited March 2016 Version 1.3 TABLE OF CONTENTS: Item Heading Page 1 Data Processing Agreement 2 2 Data Protection Act 1998 2 3 Data Protection Act

More information

CCTV POLICY. Document Type Corporate Policy. Unique Identifier HS-103

CCTV POLICY. Document Type Corporate Policy. Unique Identifier HS-103 CCTV POLICY Document Type Corporate Policy Unique Identifier HS-103 Document Purpose This policy covers the internal and external use of close circuit television in and around buildings owned by, or leased

More information

The London Borough of Barnet. The Metropolitan Police Barnet Borough Division

The London Borough of Barnet. The Metropolitan Police Barnet Borough Division The London Borough of Barnet in partnership with The Metropolitan Police Barnet Borough Division Code of Practice for the operation of Closed Circuit Television October 2014 Change Control Item Reason

More information

GENERAL PROTOCOL FOR SHARING INFORMATION BETWEEN AGENCIES IN KINGSTON UPON HULL AND THE EAST RIDING OF YORKSHIRE

GENERAL PROTOCOL FOR SHARING INFORMATION BETWEEN AGENCIES IN KINGSTON UPON HULL AND THE EAST RIDING OF YORKSHIRE GENERAL PROTOCOL FOR SHARING INFORMATION BETWEEN AGENCIES IN KINGSTON UPON HULL AND THE EAST RIDING OF YORKSHIRE 2008 CONTENTS 1. INTRODUCTION Purpose of this document 1-6 2. KEY LEGISLATION AND GUIDANCE

More information

Data Protection. Policy & Procedure. Greater Manchester Police

Data Protection. Policy & Procedure. Greater Manchester Police Data Protection Policy & Procedure Greater Manchester Police October 2014 Table of Contents 1. Policy Statement... 1 1.1 Aims... 1 2. Scope... 1 3. Roles & Responsibilities... 2 4. Terms and Definitions...

More information

PROCEDURE (Essex) / Linked SOP (Kent) Data Protection. Number: W 1011 Date Published: 24 November 2016

PROCEDURE (Essex) / Linked SOP (Kent) Data Protection. Number: W 1011 Date Published: 24 November 2016 1.0 Summary of Changes 1.1 This procedure/sop has had an additional paragraph added at 3.8.6 relating to data processing of information by direct access to Athena. 2.0 What this Procedure/SOP is About

More information

How we use Personal Information

How we use Personal Information How we use Personal Information Introduction This document explains how British Transport Police obtains, holds, uses and discloses information about people - their personal information 1 -, the steps

More information

BJB Motor Company Limited (BJB) - Data Protection Act 1998 Policy & Procedures

BJB Motor Company Limited (BJB) - Data Protection Act 1998 Policy & Procedures BJB Motor Company Limited (BJB) - Data Protection Act 1998 Policy & Procedures Version History and Document Approval Version History: Version Date Author Reason 1.0 31 st December 2017 Barry Wilson Document

More information

SUBSIDIARY LEGISLATION DATA PROTECTION (PROCESSING OF PERSONAL DATA IN THE POLICE SECTOR) REGULATIONS

SUBSIDIARY LEGISLATION DATA PROTECTION (PROCESSING OF PERSONAL DATA IN THE POLICE SECTOR) REGULATIONS DATA PROTECTION (PROCESSING OF PERSONAL DATA IN THE POLICE SECTOR) [S.L.440.05 1 SUBSIDIARY LEGISLATION 440.05 DATA PROTECTION (PROCESSING OF PERSONAL DATA IN THE POLICE SECTOR) REGULATIONS 30th September,

More information

Purpose specific Information Sharing Agreement. Community Safety Accreditation Scheme Part 2

Purpose specific Information Sharing Agreement. Community Safety Accreditation Scheme Part 2 Document Information Summary Partners ISA Ref: As Part 1 An agreement to formalise the information sharing arrangements for the purpose of specific Information sharing pursuant to Crime and Disorder reduction

More information

Charities & Not-for-Profits Overview of Data Protection Law

Charities & Not-for-Profits Overview of Data Protection Law Charities & Not-for-Profits Overview of Data Protection Law The Data Protection Law provides a framework for the processing of data relating to individuals that serves to balance the needs of organisations

More information

Mannofield Parish Church. Registered Scottish Charity No: SC (the Congregation ) Data Protection Policy

Mannofield Parish Church. Registered Scottish Charity No: SC (the Congregation ) Data Protection Policy Mannofield Parish Church Registered Scottish Charity No: SC 001680 (the Congregation ) Data Protection Policy December 2018 CONTENTS 1. Overview 2. Data Protection Principles 3. Personal Data 4. Special

More information

Data Protection. Guidance for Schools

Data Protection. Guidance for Schools Data Protection Guidance for Schools Please Note: This booklet is intended to act as a general guide for school staff to follow when dealing with personal information during their daily work. It is not

More information

Security Video Surveillance Policy

Security Video Surveillance Policy Security Video Surveillance Policy Policy Statement The Municipality of Central Elgin (the Municipality) recognizes the need to balance an individual s right to privacy and the need to ensure the safety

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Durrington High School as part of the Durrington Multi Academy Trust collects and uses personal information about staff, pupils, parents and other individuals who come into contact

More information

Port Glasgow St Andrew s Data Protection Policy

Port Glasgow St Andrew s Data Protection Policy Port Glasgow St Andrew s Data Protection Policy CONTENTS 1. Overview 2. Data Protection Principles 3. Personal Data 4. Special Category Data 5. Processing 6. How personal data should be processed 7. Privacy

More information

PRIVACY MANAGEMENT PLAN

PRIVACY MANAGEMENT PLAN PRIVACY MANAGEMENT PLAN September 2015 Contents 1. Introduction... 3 1.2 Purpose... 3 1.3 Scope... 3 1.3 Section 41 Directions... 3 1.4 Complaints... 4 2. Definitions... 4 2.1 Personal Information... 4

More information

POLICY MANUAL. Policy department: Legal References: Policy Number: Cross References: Policy Title: Adoption Date: Review Date: Revision Date:

POLICY MANUAL. Policy department: Legal References: Policy Number: Cross References: Policy Title: Adoption Date: Review Date: Revision Date: POLICY MANUAL Legal References: Freedom of Information and Protection on Privacy Act Guide to Using Surveillance Cameras in Public Areas Cross References: Adoption Date: November 23, 2015 Resolution No.

More information

Data Protection Act 1998

Data Protection Act 1998 Data Protection Act 1998 1998 CHAPTER 29 ARRANGEMENT OF SECTIONS Part I Preliminary 1. Basic interpretative provisions. 2. Sensitive personal data. 3. The special purposes. 4. The data protection principles.

More information

St. Paul s C of E Primary School

St. Paul s C of E Primary School St. Paul s C of E Primary School Data Protection Policy Reviewed January 2016 Next Review Date January 2019 St. Paul s C. of E. Primary School DATA PROTECTION POLICY School Aim Statement Everyone working

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Perth: Craigie and Moncreiffe CHARITY NO. SC001330 CONTENTS 1. Overview 2. Data Protection Principles 3. Personal Data 4. Special Category Data 5. Processing 6. How personal data

More information

ARTICLE 29 Data Protection Working Party

ARTICLE 29 Data Protection Working Party ARTICLE 29 Data Protection Working Party 11580/03/EN WP 82 Opinion 6/2003 on the level of protection of personal data in the Isle of Man Adopted on 21 November 2003 This Working Party was set up under

More information

Criminal Records Checks

Criminal Records Checks 1 Sir Christopher Hatton Academy Criminal Records Checks Policy for the use of Criminal Records Checks and vetting adults with access to Sir Christopher Hatton Academy and its pupils. Statement on the

More information

Data Protection Policy

Data Protection Policy Data Protection Policy The school collects and uses certain types of personal information about staff, pupils, parents and other individuals who come into contact with the school in order provide education

More information

CODE OF PRACTICE FOR COMMUNITY- BASED CCTV SYSTEMS

CODE OF PRACTICE FOR COMMUNITY- BASED CCTV SYSTEMS CODE OF PRACTICE FOR COMMUNITY- BASED CCTV SYSTEMS 1 INTRODUCTION This Code of Practice sets out the basic conditions of use for Community-Based CCTV systems by applicants for the Department of Justice,

More information

AIA Australia Limited

AIA Australia Limited AIA Australia Limited Privacy policies & procedures May 2010 The Power of We AIA.COM.AU AIA Australia Limited Privacy policies & procedures Contents Purpose 3 Policy 3 National Privacy Principles Policy

More information

BACKGROUND INFORMATION

BACKGROUND INFORMATION Data Protection 1. BACKGROUND INFORMATION The law governing Data Protection is covered by the Data Protection Act 1998. It implements the EC Data Protection Directive (95/46/EC) in the UK. The Act came

More information

Privacy. Purpose. Scope. Policy. Appendix A

Privacy. Purpose. Scope. Policy. Appendix A Privacy NZQA Quality Management System Policy Appendix A Purpose To ensure NZQA and personnel meet the legal obligations under the Privacy Act 1993 and in relation to its functions under section 246A of

More information

Closed Circuit Television Code of Practice

Closed Circuit Television Code of Practice Closed Circuit Television Code of Practice Introduction and accountability The College has in place a comprehensive closed circuit television ( CCTV ) system to assist in providing a safe and secure environment

More information

Policies and Procedures

Policies and Procedures Policies and Procedures QMS3: POL5 Privacy Policy Policy Details Responsible area General Endorsed by CEO Date 22 November 2017 Review date 22 November 2018 Policy Statement At Linx Institute, we are committed

More information

Law Enforcement processing (Part 3 of the DPA 2018)

Law Enforcement processing (Part 3 of the DPA 2018) Law Enforcement processing (Part 3 of the DPA 2018) Introduction This part of the Act transposes the EU Data Protection Directive 2016/680 (Law Enforcement Directive) into domestic UK law. The Directive

More information

General Rules on the Processing of Personal Data SCHEDULE 1 DATA TRANSFER AGREEMENT (Data Controller to Data Controller transfers)...

General Rules on the Processing of Personal Data SCHEDULE 1 DATA TRANSFER AGREEMENT (Data Controller to Data Controller transfers)... DATA PROTECTION REGULATIONS 2015 DATA PROTECTION REGULATIONS 2015 General Rules on the Processing of Personal Data... 1 Rights of Data Subjects... 6 Notifications to the Registrar... 7 The Registrar...

More information

Great Leighs Primary School. Data Protection and Freedom of Information Policy. Adopted: April Review Date: April 2018.

Great Leighs Primary School. Data Protection and Freedom of Information Policy. Adopted: April Review Date: April 2018. Great Leighs Primary School Data Protection and Freedom of Information Policy Adopted: April 2015 Review Date: April 2018 Contents 1. Introduction... 1 2. Purpose... 1 3. What is Personal Information?...

More information

DATA PROCESSING AGREEMENT. between [Customer] (the "Controller") and LINK Mobility (the "Processor")

DATA PROCESSING AGREEMENT. between [Customer] (the Controller) and LINK Mobility (the Processor) DATA PROCESSING AGREEMENT between [Customer] (the "Controller") and LINK Mobility (the "Processor") Controller Contact Information Name: Title: Address: Phone: Email: Processor Contact Information Name:

More information

Data Protection Policy. Revisions and Editions Log

Data Protection Policy. Revisions and Editions Log Data Protection Policy Revisions and Editions Log Data Protection Policy adopted February 2015 Review Resources Comm February 2016 Reviewed Feb 2017 FGB Next review Feb 2018 School Data Protection Policy

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Co-ordinator Will Taylor Date of Completion June 2017 Date of adoption by Governors June 2017 Date to be reviewed June 2019 Introduction The new Data Protection Act 1998 (EU Directive

More information

Data Protection Policy and Procedure

Data Protection Policy and Procedure Data Protection Policy and Procedure Reference No. P09:2007 Implementation date 12022008 Version Number Version 2.0 Reference No: Name. Linked documents Policy Section Procedure Section Yes Yes Suitable

More information

Privacy Policy. This Privacy Policy sets out the Law Society's policies in relation to the management of Personal Information.

Privacy Policy. This Privacy Policy sets out the Law Society's policies in relation to the management of Personal Information. Privacy Policy Law Society of South Australia Privacy Policy The Law Society of South Australia (Law Society or we, us or our) deals with information privacy in accordance with the Privacy Act 1988 (Cth)

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Policy & Procedure Number: 73 Date of Board of Trustees Review: Summer 2017 Next Review Due: Summer 2019 Trust Link: Mr I Kirkham Revision Number: v1 A Commitment to Excellence 1

More information

Statutory Frameworks. Safeguarding and Prevent. 1. Safeguarding

Statutory Frameworks. Safeguarding and Prevent. 1. Safeguarding Safeguarding and Prevent Statutory Frameworks 1. Safeguarding The legal framework for the protection of children in the UK is set out in the Children Act 1989. A child is defined by this act as any person

More information

ORMISTON HORIZON ACADEMY. Disclosure and Barring Checks Policy

ORMISTON HORIZON ACADEMY. Disclosure and Barring Checks Policy ORMISTON HORIZON ACADEMY Disclosure and Barring Checks Policy Ormiston Academies Trust Date adopted: 1 st November 2016 Next review date: 1 st November 2017 Policy Version Control Policy prepared by Responsible

More information

PROTECTION OF PERSONAL INFORMATION ACT NO. 4 OF 2013

PROTECTION OF PERSONAL INFORMATION ACT NO. 4 OF 2013 PROTECTION OF PERSONAL INFORMATION ACT NO. 4 OF 2013 [ASSENTED TO 19 NOVEMBER, 2013] [DATE OF COMMENCEMENT TO BE PROCLAIMED] (Unless otherwise indicated) (The English text signed by the President) This

More information

DISCLOSURE AND BARRING SERVICE (DBS) POLICY

DISCLOSURE AND BARRING SERVICE (DBS) POLICY DISCLOSURE AND BARRING SERVICE (DBS) POLICY Article 19 (protection from violence, abuse and neglect) Governments must do all they can to ensure that children are protected from all forms of violence, abuse,

More information

Consolidated text PROJET DE LOI ENTITLED. The Data Protection (Bailiwick of Guernsey) Law, 2001 [CONSOLIDATED TEXT] NOTE

Consolidated text PROJET DE LOI ENTITLED. The Data Protection (Bailiwick of Guernsey) Law, 2001 [CONSOLIDATED TEXT] NOTE PROJET DE LOI ENTITLED The Data Protection (Bailiwick of Guernsey) Law, 2001 [CONSOLIDATED TEXT] NOTE This consolidated version of the enactment incorporates all amendments listed in the footnote below.

More information

- and - OPINION. Reasons

- and - OPINION. Reasons IN THE MATTER OF THE DATA PROTECTION ACT 1998 AND IN THE MATTER OF A PROPOSED CONTRACT B E T W E E N: Cambridge Analytica Inc - and - Claimant United Kingdom Independence Party Defendant OPINION 1. We

More information

PRIVACY POLICY. 1. OVERVIEW MEGT is committed to protecting privacy and will manage personal information in an open and transparent way.

PRIVACY POLICY. 1. OVERVIEW MEGT is committed to protecting privacy and will manage personal information in an open and transparent way. Page 1 of 10 1. OVERVIEW MEGT is committed to protecting privacy and will manage personal information in an open and transparent way. MEGT will fulfil its obligations under the Privacy Amendment (Enhancing

More information

PRIVACY ACT 1993 SECTION ONE INTRODUCTION...3

PRIVACY ACT 1993 SECTION ONE INTRODUCTION...3 PRIVACY ACT 1993 SECTION ONE INTRODUCTION...3 1. THE PRIVACY ACT AND THESE GUIDELINES...3 2. KEY ASPECTS OF THE PRIVACY ACT...4 PART II Information privacy principles...4 PART IV Good reasons for refusing

More information

Analysis of the Workplace Surveillance Bill 2005

Analysis of the Workplace Surveillance Bill 2005 Analysis of the Workplace Surveillance Bill 2005 16 May 2005 Introduction This paper sets out the Australian Privacy Foundation s analysis of the Workplace Surveillance Bill 2005 (NSW). The Workplace Surveillance

More information

Beaufort Primary School and Beaufort Nursery

Beaufort Primary School and Beaufort Nursery Beaufort Primary School and Beaufort Nursery Subject Access Request Policy Governor committee responsible: Headteacher Review period: 2 years Date Adopted: May 2018 Next Review: May 2020 1. Introduction

More information

Data Protection REFERENCE NUMBER. IMPLEMENTATION DATE June 2014 NEXT REVIEW DATE: September 2020 RISK RATING

Data Protection REFERENCE NUMBER. IMPLEMENTATION DATE June 2014 NEXT REVIEW DATE: September 2020 RISK RATING POLICY Security Classification Disclosable under Freedom of Information Act 2000 Yes POLICY TITLE Data Protection REFERENCE NUMBER A031 Version 1.1 POLICY OWNERSHIP DIRECTORATE BUSINESS AREA CHIEF OFFICERS

More information

APPENDIX. 1. The Equipment Interference Regime which is relevant to the activities of GCHQ principally derives from the following statutes:

APPENDIX. 1. The Equipment Interference Regime which is relevant to the activities of GCHQ principally derives from the following statutes: APPENDIX THE EQUIPMENT INTERFERENCE REGIME 1. The Equipment Interference Regime which is relevant to the activities of GCHQ principally derives from the following statutes: (a) (b) (c) (d) the Intelligence

More information

INVESTIGATION OF ELECTRONIC DATA PROTECTED BY ENCRYPTION ETC DRAFT CODE OF PRACTICE

INVESTIGATION OF ELECTRONIC DATA PROTECTED BY ENCRYPTION ETC DRAFT CODE OF PRACTICE INVESTIGATION OF ELECTRONIC DATA PROTECTED BY ENCRYPTION ETC CODE OF PRACTICE Preliminary draft code: This document is circulated by the Home Office in advance of enactment of the RIP Bill as an indication

More information

Federal Act on Data Protection (FADP) Section 1: Aim, Scope and Definitions

Federal Act on Data Protection (FADP) Section 1: Aim, Scope and Definitions English is not an official language of the Swiss Confederation. This translation is provided for information purposes only and has no legal force. Federal Act on Data Protection (FADP) 235.1 of 19 June

More information

INFORMATION SHARING AGREEMENT (ISA) BETWEEN

INFORMATION SHARING AGREEMENT (ISA) BETWEEN P.698 (07/12) INFORMATION SHARING AGREEMENT (ISA) BETWEEN Lincolnshire County Council The National Probation Service The Humberside, Lincolnshire and North Yorkshire Community Rehabilitation Company (HLNY

More information

Schools Subject Access Request Procedures

Schools Subject Access Request Procedures Schools Subject Access Request Procedures Policy reviewed by Academy Transformation Trust on June 2018 This policy links to: Located: Data Protection Policy Freedom of Information Policy Review Date May

More information

Statutory Policy No 7 DATA PROTECTION POLICY

Statutory Policy No 7 DATA PROTECTION POLICY Statutory Policy No 7 DATA PROTECTION POLICY School Staff were consulted on this document and it was accepted by the Trust. Review Cycle November 2015 3 Years CHANGES November 2015 NONE This is a model

More information

THE PIGGOTT SCHOOL FREEDOM OF INFORMATION POLICY AND GUIDANCE

THE PIGGOTT SCHOOL FREEDOM OF INFORMATION POLICY AND GUIDANCE THE PIGGOTT SCHOOL...to be a school which inspires and encourages the highest achievement FREEDOM OF INFORMATION POLICY AND GUIDANCE Date last reviewed: Summer term 2017 Responsibility: Headteacher and

More information

FREEDOM OF INFORMATION POLICY

FREEDOM OF INFORMATION POLICY FREEDOM OF INFORMATION POLICY Approved: October 2014 Review due: October 2017 FREEDOM OF INFORMATION POLICY 1. Introduction The Southfield Grange Trust is committed to the Freedom of Information Act (FoI)

More information

Whistleblowing & Serious Misconduct Policy

Whistleblowing & Serious Misconduct Policy King s Norton Boys School Whistleblowing & Serious Misconduct Policy We recognise that children cannot be expected to raise concerns in an environment where staff fail to do so. All staff should be aware

More information

Code of Practice Issued Under Section 377A of the Proceeds of Crime Act 2002

Code of Practice Issued Under Section 377A of the Proceeds of Crime Act 2002 Code of Practice Issued Under Section 377A of the Proceeds of Crime Act 2002 Presented to Parliament under section 377A(4) of the Proceeds of Crime Act 2002 Code of Practice Issued Under Section 377A

More information

Disciplinary Policy and Procedure

Disciplinary Policy and Procedure Disciplinary Policy and Procedure November 2017 Signed (Chair of Trustees): Date: November 2017 Date of Review: November 2018 The Arbor Academy Trust reviews this policy annually. The Trustees may, however,

More information

Disclosure and Barring Scheme Policy and Procedure

Disclosure and Barring Scheme Policy and Procedure Disclosure and Barring Scheme Policy and Procedure Author HR Manager Date September 2013 (Policy Statement) Person Responsible HR Manager Approval/ review body (ies) SLT/ JNC/ Corporate Board Frequency

More information

DBS CHECKS AND EMPLOYING EX- OFFENDERS: GUIDE TO POLICY AND PROCEDURE

DBS CHECKS AND EMPLOYING EX- OFFENDERS: GUIDE TO POLICY AND PROCEDURE NEWPORT COMMUNITY SCHOOL PRIMARY ACADEMY Date Adopted: 16 th July 2015 Author/owner: Resources Committee Anticipated Review: July 2017 DBS CHECKS AND EMPLOYING EX- OFFENDERS: GUIDE TO POLICY AND PROCEDURE

More information

Subject Access Request Procedure

Subject Access Request Procedure Standard Operating Procedure 3 (SOP 3) Why we have a procedure? Subject Access Request Procedure Individuals have a legal right to see information that the Trust holds about them, subject to certain exemptions

More information

SCHEDULE 1 DATA TRANSFER AGREEMENT (Data Controller to Data Controller transfers)... 16

SCHEDULE 1 DATA TRANSFER AGREEMENT (Data Controller to Data Controller transfers)... 16 DATA PROTECTION REGULATIONS 2015 DATA PROTECTION REGULATIONS 2015 Part 1 General Rules on the Processing of Personal Data... 1 Part 2 Rights of Data Subjects... 7 Part 3 Notifications to the Registrar...

More information

closer look at Rights & remedies

closer look at Rights & remedies A closer look at Rights & remedies November 2017 V1 www.inforights.im Important This document is part of a series, produced purely for guidance, and does not constitute legal advice or legal analysis.

More information

Annex 1: Standard Contractual Clauses (processors)

Annex 1: Standard Contractual Clauses (processors) Annex 1: Standard Contractual Clauses (processors) For the purposes of Article 26(2) of Directive 95/46/EC for the transfer of personal data to processors established in third countries which do not ensure

More information

16 March Purpose & Introduction

16 March Purpose & Introduction Factsheet on the key issues relating to the relationship between the proposed eprivacy Regulation (epr) and the General Data Protection Regulation (GDPR) 1. Purpose & Introduction As the eprivacy Regulation

More information

PRACTICE DIRECTION [ ] DISCLOSURE PILOT FOR THE BUSINESS AND PROPERTY COURTS

PRACTICE DIRECTION [ ] DISCLOSURE PILOT FOR THE BUSINESS AND PROPERTY COURTS Draft at 2.11.17 PRACTICE DIRECTION [ ] DISCLOSURE PILOT FOR THE BUSINESS AND PROPERTY COURTS 1. General 1.1 This Practice Direction is made under Part 51 and provides a pilot scheme for disclosure in

More information

Education Central Multi Academy Trust Disclosure and Barring Service (DBS) Policy

Education Central Multi Academy Trust Disclosure and Barring Service (DBS) Policy Education Central Multi Academy Trust Disclosure and Barring Service (DBS) Policy Author Revision Number Date of Ratification at Finance & Resources Committee Review Date Shila Malhotra 01 12/09/2016 August

More information

Merrydale Infant School Freedom of Information Act

Merrydale Infant School Freedom of Information Act Merrydale Infant School Freedom of Information Act Chair s signature Head s signature Date Review date. 1 Explanatory Notes Governing bodies are responsible for ensuring that schools comply with the Freedom

More information

Guidelines on the Safe use of the Internet and Social Media by Police Officers and Police Staff

Guidelines on the Safe use of the Internet and Social Media by Police Officers and Police Staff RM Guidelines on the Safe use of the Internet and Social Media by Police Officers and Police Staff The Association of Chief Police Officers has agreed to these guidelines being circulated to, and adopted

More information

SCHOOL POLICY Safeguarding, Disclosure and Barring Policy

SCHOOL POLICY Safeguarding, Disclosure and Barring Policy SCHOOL POLICY Safeguarding, Disclosure and Barring Policy Reviewed by: Full Governing Body Signed (Governing Body): Date: Sept 2014 Next Review due: Sept 2016 Produced by Turton School CONTENTS Page No

More information

North Yorkshire County Council. Subject Access Request Guidance and Procedure. Data Protection Act 1998

North Yorkshire County Council. Subject Access Request Guidance and Procedure. Data Protection Act 1998 North Yorkshire County Council Subject Access Request Guidance and Procedure Data Protection Act 1998 The Data Protection Act 1998 (the Act), section 7 (1) gives individuals certain rights with regards

More information

Recruitment, selection and disclosure policy and procedure

Recruitment, selection and disclosure policy and procedure Recruitment, selection and disclosure policy and procedure 1 Introduction Eton College (the College) is committed to providing the best possible care and education to its pupils and to safeguarding and

More information

Park View Primary School

Park View Primary School Policy on the Freedom of Information Act Responsibility: Contents: It is the responsibility of the Governors to ensure procedures are in place to ensure that the school handles information requests covered

More information

Freedom of Information Policy, Procedures and Requests

Freedom of Information Policy, Procedures and Requests Freedom of Information Policy, Procedures and Requests Last reviewed: February 2017 This document applies to all academies and operations of the Vale Academy Trust. The following related document(s) can

More information

Health Information Privacy Code 1994

Health Information Privacy Code 1994 Health Information Privacy Code 1994 Incorporating amendments Privacy Commissioner Te Mana Matapono Matatapu New Zealand The Code of Practice comprises clauses 1-7 and rules 1-12. To assist with the use

More information

DIRECTIVE 95/46/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL. of 24 October 1995

DIRECTIVE 95/46/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL. of 24 October 1995 DIRECTIVE 95/46/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data

More information

Coordinated text from 10 August 2011 Version applicable from 1 September 2011

Coordinated text from 10 August 2011 Version applicable from 1 September 2011 Coordinated text of the Act of 30 May 2005 - laying down specific provisions for the protection of persons with regard to the processing of personal data in the electronic communications sector and - amending

More information

COBIS Policy on Disclosure & Barring Service Checks for Member Schools COBIS Policy on the Recruitment of Ex-Offenders... 3

COBIS Policy on Disclosure & Barring Service Checks for Member Schools COBIS Policy on the Recruitment of Ex-Offenders... 3 DBS Checks for COBIS Schools Contents COBIS Policy on Disclosure & Barring Service Checks for Member Schools... 2 COBIS Policy on the Recruitment of Ex-Offenders... 3 COBIS Policy on the Secure Storage,

More information

Workplace Surveillance Act 2005

Workplace Surveillance Act 2005 Workplace Surveillance Act 2005 As at 20 May 2014 Long Title An Act to regulate surveillance of employees at work; and for other purposes. Part 1 ñ Preliminary 1 Name of Act This Act is the Workplace Surveillance

More information

to the Government Gazette of Mauritius No. 14 of 14 February 2009

to the Government Gazette of Mauritius No. 14 of 14 February 2009 LEGAL Government SUPPLEMENT Notices 2009 45 45 to the Government Gazette of Mauritius No. 14 of 14 February 2009 Government Notice No. 22 of 2009 THE DATA PROTECTION ACT Regulations made by the Prime Minister

More information

DATA PROTECTION (JERSEY) LAW 2005

DATA PROTECTION (JERSEY) LAW 2005 DATA PROTECTION (JERSEY) LAW 2005 Revised Edition Showing the law as at 1 January 2017 This is a revised edition of the law Data Protection (Jersey) Law 2005 Arrangement DATA PROTECTION (JERSEY) LAW 2005

More information

Searching, screening and confiscation. Advice for headteachers, school staff and governing bodies

Searching, screening and confiscation. Advice for headteachers, school staff and governing bodies Searching, screening and confiscation Advice for headteachers, school staff and governing bodies February 2014 Contents Summary 3 About this departmental advice 3 Expiry or review date 3 Who is this advice

More information

DISCLOSURE & BARRING CHECKS POLICY

DISCLOSURE & BARRING CHECKS POLICY Westcountry Schools Trust (WeST) DISCLOSURE & BARRING CHECKS POLICY Mission Statement WeST holds a deep seated belief in education and lifelong learning. Effective collaboration, mutual support and professional

More information

OTrack Data Processing Terms

OTrack Data Processing Terms BACKGROUND These Personal Data Processing Terms (the Agreement ) are entered into between Optimum Records Limited ( Optimum ) and the school using the services provided by Optimum (the School ) whose details

More information