DATA PROTECTION POLICY STATUTORY

Similar documents
DATA PROTECTION AND FREEDOM OF INFORMATION POLICY

European College of Business and Management Data Protection Policy

Data Protection Act 1998 Policy

Staff Data Protection Policy

A closed circuit television system is used at the Memorial Hall by the Parish Council.

DATA PROTECTION (JERSEY) LAW 2005 CODE OF PRACTICE & GUIDANCE ON THE USE OF CCTV GD6

Data Protection Policy

The installation of CCTV can provide information on activities at the Water,

Access to Personal Information Procedure

CCTV Code of Practice

CCTV CODE OF PRACTICE

Data Protection Policy

How we use Personal Information

DATA SHARING AND PROCESSING

CCTV POLICY. Document Type Corporate Policy. Unique Identifier HS-103

The London Borough of Barnet. The Metropolitan Police Barnet Borough Division

GENERAL PROTOCOL FOR SHARING INFORMATION BETWEEN AGENCIES IN KINGSTON UPON HULL AND THE EAST RIDING OF YORKSHIRE

Data Protection. Policy & Procedure. Greater Manchester Police

PROCEDURE (Essex) / Linked SOP (Kent) Data Protection. Number: W 1011 Date Published: 24 November 2016

How we use Personal Information

BJB Motor Company Limited (BJB) - Data Protection Act 1998 Policy & Procedures

SUBSIDIARY LEGISLATION DATA PROTECTION (PROCESSING OF PERSONAL DATA IN THE POLICE SECTOR) REGULATIONS

Purpose specific Information Sharing Agreement. Community Safety Accreditation Scheme Part 2

Charities & Not-for-Profits Overview of Data Protection Law

Mannofield Parish Church. Registered Scottish Charity No: SC (the Congregation ) Data Protection Policy

Data Protection. Guidance for Schools

Security Video Surveillance Policy

Data Protection Policy

Port Glasgow St Andrew s Data Protection Policy

PRIVACY MANAGEMENT PLAN

POLICY MANUAL. Policy department: Legal References: Policy Number: Cross References: Policy Title: Adoption Date: Review Date: Revision Date:

Data Protection Act 1998

St. Paul s C of E Primary School

Data Protection Policy

ARTICLE 29 Data Protection Working Party

Criminal Records Checks

Data Protection Policy

CODE OF PRACTICE FOR COMMUNITY- BASED CCTV SYSTEMS

AIA Australia Limited

BACKGROUND INFORMATION

Privacy. Purpose. Scope. Policy. Appendix A

Closed Circuit Television Code of Practice

Policies and Procedures

Law Enforcement processing (Part 3 of the DPA 2018)

General Rules on the Processing of Personal Data SCHEDULE 1 DATA TRANSFER AGREEMENT (Data Controller to Data Controller transfers)...

Great Leighs Primary School. Data Protection and Freedom of Information Policy. Adopted: April Review Date: April 2018.

DATA PROCESSING AGREEMENT. between [Customer] (the "Controller") and LINK Mobility (the "Processor")

Data Protection Policy. Revisions and Editions Log

Data Protection Policy

Data Protection Policy and Procedure

Privacy Policy. This Privacy Policy sets out the Law Society's policies in relation to the management of Personal Information.

Data Protection Policy

Statutory Frameworks. Safeguarding and Prevent. 1. Safeguarding

ORMISTON HORIZON ACADEMY. Disclosure and Barring Checks Policy

PROTECTION OF PERSONAL INFORMATION ACT NO. 4 OF 2013

DISCLOSURE AND BARRING SERVICE (DBS) POLICY

Consolidated text PROJET DE LOI ENTITLED. The Data Protection (Bailiwick of Guernsey) Law, 2001 [CONSOLIDATED TEXT] NOTE

- and - OPINION. Reasons

PRIVACY POLICY. 1. OVERVIEW MEGT is committed to protecting privacy and will manage personal information in an open and transparent way.

PRIVACY ACT 1993 SECTION ONE INTRODUCTION...3

Analysis of the Workplace Surveillance Bill 2005

Beaufort Primary School and Beaufort Nursery

Data Protection REFERENCE NUMBER. IMPLEMENTATION DATE June 2014 NEXT REVIEW DATE: September 2020 RISK RATING

APPENDIX. 1. The Equipment Interference Regime which is relevant to the activities of GCHQ principally derives from the following statutes:

INVESTIGATION OF ELECTRONIC DATA PROTECTED BY ENCRYPTION ETC DRAFT CODE OF PRACTICE

Federal Act on Data Protection (FADP) Section 1: Aim, Scope and Definitions

INFORMATION SHARING AGREEMENT (ISA) BETWEEN

Schools Subject Access Request Procedures

Statutory Policy No 7 DATA PROTECTION POLICY

THE PIGGOTT SCHOOL FREEDOM OF INFORMATION POLICY AND GUIDANCE

FREEDOM OF INFORMATION POLICY

Whistleblowing & Serious Misconduct Policy

Code of Practice Issued Under Section 377A of the Proceeds of Crime Act 2002

Disciplinary Policy and Procedure

Disclosure and Barring Scheme Policy and Procedure

DBS CHECKS AND EMPLOYING EX- OFFENDERS: GUIDE TO POLICY AND PROCEDURE

Subject Access Request Procedure

SCHEDULE 1 DATA TRANSFER AGREEMENT (Data Controller to Data Controller transfers)... 16

closer look at Rights & remedies

Annex 1: Standard Contractual Clauses (processors)

16 March Purpose & Introduction

PRACTICE DIRECTION [ ] DISCLOSURE PILOT FOR THE BUSINESS AND PROPERTY COURTS

Education Central Multi Academy Trust Disclosure and Barring Service (DBS) Policy

Merrydale Infant School Freedom of Information Act

Guidelines on the Safe use of the Internet and Social Media by Police Officers and Police Staff

SCHOOL POLICY Safeguarding, Disclosure and Barring Policy

North Yorkshire County Council. Subject Access Request Guidance and Procedure. Data Protection Act 1998

Recruitment, selection and disclosure policy and procedure

Park View Primary School

Freedom of Information Policy, Procedures and Requests

Health Information Privacy Code 1994

DIRECTIVE 95/46/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL. of 24 October 1995

Coordinated text from 10 August 2011 Version applicable from 1 September 2011

COBIS Policy on Disclosure & Barring Service Checks for Member Schools COBIS Policy on the Recruitment of Ex-Offenders... 3

Workplace Surveillance Act 2005

to the Government Gazette of Mauritius No. 14 of 14 February 2009

DATA PROTECTION (JERSEY) LAW 2005

Searching, screening and confiscation. Advice for headteachers, school staff and governing bodies

DISCLOSURE & BARRING CHECKS POLICY

OTrack Data Processing Terms

Transcription:

DATA PROTECTION POLICY MAIDEN ERLEGH TRUST STATUTORY INITIAL APPROVAL July 2017 REVIEW FREQUENCY At least every two years REVIEWED

CONTENTS PART ONE: POLICY STATEMENT & OBJECTIVES PART TWO: STATUS OF THE POLICY PART THREE: DEFINITION OF TERMS PART FOUR: DATA PROTECTION PRINCIPLES PART FIVE: FAIR AND LAWFUL PROCESSING PART SIX: PROCESSING FOR LIMITED PURPOSES PART SEVEN: ADEQUATE, RELEVANT AND NON-EXCESSIVE PROCESSING PART EIGHT: ACCURATE DATA PART NINE: TIMELY PROCESSING PART TEN: PROCESSING IN LINE WITH DATA SUBJECT'S RIGHTS PART ELEVEN: DATA SECURITY PART TWELVE: DEALING WITH SUBJECT ACCESS REQUESTS PART THIRTEEN: PROVIDING INFORMATION OVER THE TELEPHONE PART FOURTEEN: AUTHORISED DISCLOSURES PART FIFTEEN: CCTV PART SIXTEEN: POLICY REVIEW PART SEVENTEEN: ENQUIRIES APPENDIX 1: APPENDIX 2: CCTV CODE OF PRACTICE CCTV DISCLOSURE FORM

1. Policy statement and Objectives 1.1 The objectives of this Data Protection Policy are to ensure that Maiden Erlegh Trust (the Trust ) and its directors, governors and employees are informed about, and comply with, their obligations under the Data Protection Act 1998 ( the Act ). 1.2 Everyone has rights with regard to how their personal information is handled. During the course of our activities we will collect, store and process personal information about a number of different groups of people and we recognise the need to treat it in an appropriate and lawful manner. 1.3 The types of information that we may be required to handle include details of current, past and prospective employees and students, parents, directors, Local Advisory Board (LAB) members, suppliers and other individuals that we communicate with. The information, which may be held on paper or on a computer or other media, is subject to certain legal safeguards specified in the Act and other regulations. The Act imposes restrictions on how we may use that information. 1.4 This policy does not form part of any employee's contract of employment and it may be amended at any time. Any breach of this policy will be taken seriously and may result in disciplinary action and serious breaches may result in dismissal. Breach of the Act may expose the Trust to enforcement action by the Information Commissioner or fines. Furthermore, certain breaches of the Act can give rise to personal criminal liability for the Trust s employees. At the very least, a breach of the Act could damage our reputation and have serious consequences for the Trust. 1.5 The Trust has notified the Information Commissioner that it processes personal information, and is on the register of data controllers, registration number Z2627856. It is the responsibility of the Director of Finance and Operations to confirm or amend the entry when the entry becomes inaccurate, incomplete or requires renewal each year. 2. Status of the policy 2.1 This policy has been approved by the Directors of the Trust. It sets out our rules on data protection and the legal conditions that must be satisfied in relation to the obtaining, handling, processing, storage, transportation and destruction of personal information. 2.2 The Data Protection Compliance Manager is responsible for ensuring compliance with the Act and with this policy. That post is held by Mr Jonathon Peck, Director of Finance and Operations. Any questions or concerns about the operation of this policy should be referred in the first instance to the Data Protection Compliance Manager. 2.3 If you consider that the policy has not been followed in respect of personal data about yourself or others you should raise the matter with the Data Protection Compliance Manager. 3. Definition of terms Data is information which is stored electronically, on a computer, or in certain paper-based filing systems. Data subjects for the purpose of this policy include all living individuals about whom we hold personal data. A data subject need not be a UK national or resident. All data subjects have legal rights in relation to their personal data. 1

Personal data means data relating to a living individual who can be identified from that data (or from that data and other information in our possession). Personal data can be factual (such as a name, address or date of birth) or it can be an opinion (such as a school report) and can include telephone numbers, photographs and CCTV images. Data controllers are the people who or organisations which determine the purposes for which, and the manner in which, any personal data is processed. They have a responsibility to establish practices and policies in line with the Act. We are the data controller of all personal data used in our business. Data users include employees whose work involves using personal data. Data users have a duty to protect the information they handle by following our data protection and security policies at all times. Data processors include any person who processes personal data on behalf of a data controller. Employees of data controllers are excluded from this definition, but it could include suppliers which handle personal data on our behalf. Parent has the meaning given in the Education Act 1996 and includes any person having parental responsibility or care of a child. Processing is any activity that involves use of the data. It includes obtaining, recording or holding the data, or carrying out any operation or set of operations on the data including organising, amending, retrieving, using, disclosing, erasing or destroying it. Processing also includes transferring personal data to third parties. Sensitive personal data includes information about a person's racial or ethnic origin, political opinions, religious or similar beliefs, trade union membership, physical or mental health or condition or sexual life, or about the commission of, or proceedings for, any offence committed or alleged to have been committed by that person, the disposal of such proceedings or the sentence of any court in such proceedings. Sensitive personal data can only be processed under strict conditions, and will usually require the express consent of the person concerned. 4. Data protection principles 4.1 Anyone processing personal data must comply with the eight enforceable principles of good practice. These provide that personal data must be: - Processed fairly and lawfully. - Processed for limited purposes and in an appropriate way. - Adequate, relevant and not excessive for the purpose. - Accurate. - Not kept longer than necessary for the purpose. - Processed in line with data subjects' rights. - Secure. 4.2 Not transferred to people or organisations situated in countries without adequate protection. 5. Fair and lawful processing 5.1 The Act is intended not to prevent the processing of personal data, but to ensure that it is done fairly and without adversely affecting the rights of the data subject. The data subject must be told who the data controller is (in this case the Trust), who the data controller's 2

representative is (in this case the Data Protection Compliance Manager), the purpose for which the data is to be processed by us, and the identities of anyone to whom the data may be disclosed or transferred. 5.2 For personal data to be processed lawfully, certain conditions have to be met. These may include, among other things, requirements that the data subject has consented to the processing, or that the processing is necessary for the legitimate interest of the data controller or the party to whom the data is disclosed. When sensitive personal data is being processed, more than one condition must be met. In most cases the data subject's explicit consent to the processing of such data will be required. 6. Processing for limited purposes 6.1 Personal data may only be processed for the specific purposes notified to the data subject when the data was first collected, or for any other purposes specifically permitted by the Act. This means that personal data must not be collected for one purpose and then used for another. If it becomes necessary to change the purpose for which the data is processed, the data subject must be informed of the new purpose before any processing occurs. 7. Adequate, relevant and non-excessive processing 7.1 Personal data should only be collected to the extent that it is required for the specific purpose notified to the data subject. Any data which is not necessary for that purpose should not be collected in the first place. 7.2 In order to ensure compliance with this principle, the Trust will check records regularly for missing, irrelevant or seemingly excessive information and may contact data subjects to verify certain items of data. Decisions on data to be deleted must come from the Data Protection Compliance Manager, after taking appropriate guidance. 8. Accurate data 8.1 Personal data must be accurate and kept up to date. Information which is incorrect or misleading is not accurate and steps should therefore be taken to check the accuracy of any personal data at the point of collection and at regular intervals afterwards. Inaccurate or out-of-date data should be destroyed. 8.2 If a data subject informs the Trust of a change of circumstances their computer record will be updated as soon as is practicable. A printout of their data record will be provided to data subjects periodically so they can check its accuracy and make any amendments. 8.3 Where a data subject challenges the accuracy of their data, the Trust will immediately mark the record as potentially inaccurate, or 'challenged'. In the case of any dispute, we shall try to resolve the issue informally, but if this proves impossible, disputes will be referred to the board of trustees for their judgement. If the problem cannot be resolved at this stage, the data subject should refer their complaint to the Information Commissioner s Office. Until resolved the 'challenged' marker will remain and all disclosures of the affected information will contain both versions of the information. 8.4 Notwithstanding paragraph 8.3, a data subject continues to have rights under the Act and may refer a complaint to the Information Commissioner s Office regardless of whether the procedure set out in paragraph 8.3 has been followed. 3

9. Timely processing 9.1 Personal data should not be kept longer than is necessary for the purpose for which it is held. This means that data should be destroyed or erased from our systems when it is no longer required. 9.2 It is the duty of the Data Protection Compliance Manager, after taking appropriate guidance for legal considerations, to ensure that obsolete data are properly erased. The Trust has a retention schedule for all data. 10. Processing in line with data subject's rights 10.1 Data must be processed in line with data subjects' rights. Data subjects have a right to: - Request access to any data held about them by a data controller; - Prevent the processing of their data for direct-marketing purposes; - Ask to have inaccurate data amended; and - Prevent processing that is likely to cause damage or distress to themselves or anyone else. 11. Data security 1 11.1 The Trust has taken steps to ensure that appropriate security measures are taken against unlawful or unauthorised processing of personal data, and against the accidental loss of, or damage to, personal data. Data subjects may apply to the courts for compensation if they have suffered damage from such a loss. 11.2 The Act requires us to put in place procedures and technologies to maintain the security of all personal data from the point of collection to the point of destruction. Personal data may only be transferred to a third-party data processor if they agree to comply with those procedures and policies, or if they put in place adequate measures themselves. Consideration should be given as to whether contracts with third party data-processors contain suitable contractual obligations on the third party to comply with the Act and to indemnify the Trust for if they breach the Act. 11.3 Maintaining data security means guaranteeing the confidentiality, integrity and availability of the personal data, defined as follows: - Confidentiality means that only people who are authorised to use the data can access it. - Integrity means that personal data should be accurate and suitable for the purpose for which it is processed. - Availability means that authorised users should be able to access the data if they need it for authorised purposes. Personal data should therefore be stored on our central computer system instead of individual PCs. 1 Some schools may have a separate data security policy in which case you may refer to it in paragraph 11 instead of the text set out above. If your school does not have a separate data security policy then you can include the wording set out in paragraphs 11.1 11.3 and amend the title of this document so that it refers to a Data Protection and Data Security Policy 4

11.4 Security procedures include: 2 - Physical Security: Appropriate building security measures are in place, such as alarms, window bars, deadlocks and computer hardware cable locks. Only authorised persons are allowed in the server room. Disks, tapes and printouts are locked away securely when not in use. Visitors to the School are required to sign in and out, to wear identification badges whilst in the School and are, where appropriate, accompanied. - Computer Security: Security software is installed on all computers containing personal data. Only authorised users are allowed access to the computer files and password changes are regularly undertaken. Computer files are backed up (i.e. security copies are taken) regularly. Data users should ensure that individual monitors do not show confidential information to passers-by and that they log off from their PC when it is left unattended. - Procedural Security: In order to be given authorised access to the computer, staff will have to undergo checks and will sign a confidentiality agreement. All staff are trained in their Data Protection obligations and their knowledge updated as necessary. Computer printouts as well as source documents are shredded before disposal. 11.5 Paper documents should be shredded and floppy disks and CD-ROMs should be given to the IT department to be physically destroyed when they are no longer required. 11.6 The Trust has a Bring Your Own Device policy for employees to sign where personal data held by the Trust is processed on their personal mobile phones, tablets, computers or other devices. 12. Dealing with subject access requests 12.1 The Act extends to all data subjects a right of access to their own personal data. A formal request from a data subject for information that we hold about them must be made in writing. A fee may be payable by the data subject for provision of this information. Any member of staff who receives a written request should forward it to their line manager or the Data Protection Compliance Manager IMMEDIATELY as there are statutory time limits for responding (currently 40 calendar days) 3. 12.2 In order to ensure that people receive only information about themselves it is essential that a formal system of requests is in place. Where a request for subject access is received from a pupil, the Trust s policy is that: Requests from pupils who are considered mature enough to understand their rights under the Act will be processed as a subject access request as outlined below and the data will be given directly to the pupil (subject to any exemptions that apply under the Act or other legislation). The Information Commissioner s guidance is that it may be reasonable to adopt a presumption that by the age of 12 a child has sufficient maturity to understand their rights and to make an access request themselves if they wish. In every case it will be for the Trust, as data controller, to assess whether the child is capable of understanding their rights 2 Paragraph 11.4 is an example of some of the security procedures that schools may put in place. However, it is very important that you tailor this section according to your Trust s own practices as it must reflect what you actually do to keep data secure. If there are no data security practices in place at your school then you must address this and consider whether training is necessary. 3 The timescale of 40 calendar days cannot be extended and will continue regardless of whether the school is closed for holidays (unlike the Freedom of Information Act 2000). It is therefore advisable that subject access requests are dealt with as soon as possible. 5

under the Act and the implications of their actions, and so decide whether the parent needs to make the request on the child s behalf. A parent would normally be expected to make a request on a child s behalf if the child is younger than 12 years of age. Requests from pupils who do not appear to understand the nature of the request will be referred to their parents or carers. Requests from parents in respect of their own child will be processed as requests made on behalf of the data subject (the child) and the data will be sent in a sealed envelope to the requesting parent (subject to any exemptions that apply under the Act or other legislation) unless the Trust considers the child to be mature enough to understand their rights under the Act, in which case the Trust shall ask the child for their consent to disclosure of the personal data (subject to any enactment or guidance which permits the Trust to disclose the personal data to a parent without the child s consent). Subject to paragraph 14, if consent is not given to disclosure, the Trust shall not disclose the personal data if to do so would breach any of the eight data protection principles. 12.3 It should be noted that the Education (Pupil Information) (England) Regulations 2005 do not apply to academies so the rights available to parents in those Regulations to access their child s educational records are not applicable to schools in the Trust. Instead, requests from parents for personal data about their child must be dealt with under the Act (as outlined above). This is without prejudice to the obligation on the Trust in the Education (Independent School Standards) (England) Regulations 2014 to provide an annual report of each registered pupil's progress and attainment in the main subject areas taught to every parent (unless they agree otherwise in writing). 12.4 Following receipt of a subject access request, and provided that there is sufficient information to process the request, an entry will be made in the Trust s Subject Access log book, showing the date of receipt, the data subject s name, the name and address of requester (if different), the type of data required (e.g. Student Record, Personnel Record), and the planned date for supplying the information (not more than 40 days from the request date). Should more information be required to establish either the identity of the data subject (or agent) or the type of data requested, the date of entry in the log will be date on which sufficient information has been provided. 13. Providing information over the telephone 13.1 Any member of staff dealing with telephone enquiries should be careful about disclosing any personal information held by us whilst also applying common sense to the particular circumstances. In particular they should: - Check the caller's identity to make sure that information is only given to a person who is entitled to it. - Suggest that the caller put their request in writing if they are not sure about the caller's identity and where their identity cannot be checked. - Refer to their line manager or the Data Protection Compliance Manager for assistance in difficult situations. No-one should be bullied into disclosing personal information. 14. Authorised disclosures 14.1 The School will, in general, only disclose data about individuals with their consent or unless the law requires or allows us to. There are circumstances under which the Trust may need to disclose data without explicit consent for that occasion including (but not limited to) the following: 6

- Pupil data disclosed to authorised recipients related to education and administration necessary for the Trust to perform its statutory duties and obligations. - Pupil data disclosed to authorised recipients in respect of their child s health, safety and welfare. - Pupil data disclosed to parents in respect of their child s progress, achievements, attendance, attitude or general demeanour within or in the vicinity of the Trust. - Staff data disclosed to relevant authorities e.g. in respect of payroll and administrative matters. - Unavoidable disclosures, for example to an engineer during maintenance of the computer system. In such circumstances the engineer would be required to sign a form promising not to disclose the data outside the Trust. - Disclosures required as a result of a court order or pursuant to an act of Parliament. - Disclosures to the Police where the Trust is satisfied that the information is needed to prevent or detect a crime or to catch and prosecute a suspect. 14.2 Only authorised and trained staff are allowed to make external disclosures of personal data in accordance with the Act. Data used within the Trust by administrative staff, teachers and welfare officers will only be made available where the person requesting the information is a professional legitimately working within the School who needs to know the information in order to do their work. 15. CCTV 15.1 CCTV cameras are located in those areas where the school has identified a need. The school s CCTV system is used solely for purposes(s) identified below and is not used to routinely monitor staff conduct. - protect the academy buildings and their assets; - increase personal safety and reduce the fear of crime; - support the Police in a bid to deter and detect crime; - assist in identifying, apprehending and prosecuting offenders; - protect members of the public and private property; and - assist in managing the academy - More information on the Trusts use of CCTV can be found in Appendix 1. 16. Policy Review 16.1 It is the responsibility of the Directors to facilitate the review of this policy every two years. Recommendations for any amendments should be reported to the Data Protection Compliance Manager. We will continue to review the effectiveness of this policy to ensure it is achieving its stated objectives. 17. Enquiries 17.1 Further information about the School s Data Protection Policy is available from the Data Protection Compliance Manager. General information about the Act can be obtained from the Information Commissioner s Office: www.ico.gov.uk. 7

Useful References The Information Commissioner s Office https://ico.org.uk/ 8

APPENDIX 1: Under the Protection of Freedoms Act 2012 the processing of personal data captured by CCTV systems (including images identifying individuals) is governed by the Data Protection Act and the Information Commissioner s Office (ICO) has issued a code of practice on compliance with legal obligations under that Act. The Data Controller is Maiden Erlegh Trust and has notified the Information Commissioner s Office (ICO) of this and the purposes for use of CCTV. Each school within the Trust uses CCTV equipment to: Assist in the prevention, investigation and detection of crime Facilitate the identification, apprehension and prosecution of offenders in relation to crime and public order and as an aid to public safety Assist with the provision of a safer public environment Assist with the promotion of the principles of customer care No school within the Trust will use the CCTV system for covert monitoring. CCTV is operated 24 hours a day 7 days a week. CCTV cameras record visual images only and do not record sound. Location Cameras are located in those areas where the school has identified a need. The school s CCTV system is used solely for purposes(s) identified above and is not used to routinely monitor staff conduct. Cameras will only be used in exceptional circumstances in areas where the subject has a heightened expectation of privacy e.g. changing rooms or toilets. In these areas, the school will use increased signage in order that those under surveillance are fully aware of its use. Maintenance Each CCTV system in school will be maintained by a specialist CCTV contractor and this may include periodic inspections of footage. Identification Each school will ensure that there are prominent signs placed around the site which are clearly visible and readable and contain details of the purpose for using CCTV and who to contact about the scheme. Administration All operatives and employees with access to images are aware of the procedures that need to be followed when accessing or disclosing the recorded images. Operators are trained in their responsibilities under the CCTV Code of Practice. Access to recorded images is restricted to staff that need to have access in order to achieve the purpose of using the equipment. School staff can view CCTV footage in order to make a decision as to whether to search a student for an item as described in the DfE document Searching, screening and confiscation If the recorded footage reveals that misconduct has been committed by a member of staff, this evidence may be used in a disciplinary case. 9

Image storage, viewing and retention Recorded images will be stored in a way that ensures the integrity of the image and in a way that allows specific times and dates to be identified. Live images can be seen on a monitor in the office/reception area of each school. These images are not visible by members of the public or students. Recorded images can only be viewed in a restricted area by approved staff. The Headteacher of each school decides who is an approved member of staff to view and operate the CCTV system. The recorded images are viewed only when there is suspected criminal activity or activity which contravenes the school code of conduct for staff, students and visitors. Each school reserves the right to use images captured on CCTV where there is activity that the school cannot be expected to ignore such as criminal activity, potential gross misconduct, or behaviour which puts others at risk. Where images are extracted from the CCTV system, the reason for its retention is recorded, where it is kept, any use made of the images. Disclosure Maiden Erlegh Trust (the Data Controller) has delegated authority to disclose recorded images to or view live data by third parties, including the Police, to members of the Senior Leadership team in each school. Disclosure/viewing will only be granted: - If its release/viewing is fair to the individuals concerned. - If there is an overriding legal obligation (e.g. information access rights). - If it is consistent with the purpose for which the system was established. All requests for viewing by and disclosure to third parties are recorded using the form in Appendix 2. Subject access requests Individuals whose images are recorded have a right to view images of themselves and, unless they agree otherwise, to be provided with a copy of the images. If a school receives a request under the Data Protection Act it will comply with requests within 40 calendar days of receiving the request. The school may charge a fee for the provision of a copy of the images. If the school receives a request under the Freedom of Information Act it will comply with requests within 20 working days of receiving the request. As a general rule, if the viewer can identify any person other than, or in addition to, the person requesting access, it will be deemed personal data and its disclosure is unlikely as a Freedom of Information request. Those requesting access must provide enough detail to allow the operator to identify that they are the subject of the images, and for the operator to locate the images on the system. Requests for access should be addressed to the data controller. Refusal to disclose images may be appropriate where its release is: - Likely to cause substantial and unwarranted damage to that individual. 10

- To prevent automated decisions from being taken in relation to that individual. Monitoring and review The efficacy of this code of practice will be kept under review. If the Trust decides to change the way in which it uses CCTV, it will inform the Information Commissioner within 28 days. 11

APPENDIX 2: Maiden Erlegh Trust DATA PROTECTION ACT 1998 Disclosure of data to 3 rd party, including Police ReferenceNumber. Section A Description of Data required to be disclosed (To be completed by a School Representative) (Please tick as required) View Take possession of original Copy Given verbally Description of document(s) Disclosure of Data contained within computerised records (including CCTV images) (Please tick as required) View Take possession of disc copy Printout Given verbally State what data is required and where data stored (i.e. address of named person from SIMS). School representative making copy Name.. Signature Date. School representative making disclosure/handing over copy this must be agreed by a member of SLG prior to handing over copy. Name Signature... 12

Date SLG signature.. Section B overleaf to be completed Section B Reason Data required a) To be completed by Police Officer or b) to be completed by other agency a) I can confirm that the data detailed on page 1 is required by me for any of the following reasons contained within sections 28(1), 29(1)(a) and (b) and 35(2)(a) of the Act. For the purpose of safeguarding national security The prevention or detection of crime For the purpose of, or in connection with, any legal proceedings (including prospective legal proceedings) Is otherwise necessary for the purposes of establishing, exercising or defending legal rights (Please tick as required) Name.Collar Number. Police Force Station.... Signature Date... Crime/Incident No b) I can confirm that the above data is required by me for any of the following reasons contained within sections 28(1), 29(1)(a) and (b) and 35(2)(a) of the Act. For the purpose of safeguarding national security The prevention or detection of crime For the purpose of, or in connection with, any legal proceedings (including prospective legal proceedings) Is otherwise necessary for the purposes of establishing, exercising or defending legal rights (Please tick as required) Name. 13

Position (if applicable). Business/Agency (if applicable)... Business/Agency/Home address (whichever is applicable) Signature Date Reference No. Completed forms must be returned to the Director of Finance and Operations. Office use: Date receipt Date Added to disclosure log 14