GDPR Compliance » History » Revision 4
« Previous |
Revision 4/8
(diff)
| Next »
Joseph Lacey, 04/04/2018 05:54 PM
GDPR (General Data Protection Regulation) Compliance¶
- Table of contents
- GDPR (General Data Protection Regulation) Compliance
Data Collection¶
Transparency¶
"any organization which attracts people to its website and wants to collect data via a form must communicate clearly to that person what the data is going to be used for. The individual will need to give their consent to that use and the consent needs to be clear, in plain English and "informed, specific, unambiguous, and revocable". Data subjects also need to be told about their right to withdraw consent." and "to pre-tick the box on a form to send information...by email, as ‘opt-out consent’ will no longer be permitted under the GDPR." and "if [an organization] decides they want to use...data for a new purpose at any point during the relationship, they’ll need consent...to use the data for that new purpose." 1
"Direct marketing and fundraising communications for email and text require consent under the regulation, but mail and telephone communications can still be lawfully conducted on an opt-out basis provided a charity can justify it under a “legitimate interest.” That legitimate interest essentially allows entities to process individuals’ personal data without affirmative consent, direct marketing being one such interest." 2
Data Minimisation¶
"When an organization is collecting data from an individual in order to convert a website visitor into a lead, they must remember that, under the GDPR, they are only permitted to collect data that is adequate, relevant, and limited to what is necessary for the intended purpose of collection. Data collected by the organization which is deemed unnecessary or excessive will constitute a breach of the GDPR." 1
Data Storage and Processing¶
Security¶
"Once data is collected, the organization needs to ensure it is stored in a secure manner and in accordance with the Security provisions of the GDPR. This means they must use “appropriate technical and organizational security measures” to protect personal data against unauthorised processing and accidental loss, disclosure, access, destruction, or alteration. Depending on the type of data collected and the ways it is being used, companies may need to consider encrypting the data, using pseudonymization or anonymization methods to protect it or segregating the data from other data in their systems." and "Only employees who need to access that data for the intended purpose have access to it and contracts with any vendors touching that data contain the relevant security protections." and "They may need to appoint a data protection officer (DPO) and they’ll also need to ensure they implement a ‘Privacy by Design/Default’ policy, to ensure they’re systematically considering the potential impact that a project or initiative might have on the privacy of individuals. Controllers will have to ensure their vendor contracts are updated so that they include the necessary provisions to protect the data being processed by those vendors on their behalf." 1
End of the Relationship¶
Retention¶
"organizations may only hold on to personal data for as long as is necessary to fulfill the intended purpose of collection. So if the relationship is terminated for any reason, they need to ensure they have a data retention policy in place which outlines how long they will retain that individual’s data for and the business justification for holding on to the data for that specified period.
"In drafting their retention policies, organizations will need to consider whether there is any law or regulation which obliges them to hold on to some of that data for specified periods. For example, they may need to retain some financial data for auditing purposes by law. While this is permitted, it should be outlined clearly in their retention policy and made clear to Amy. Again, the principle of transparency is important, even at this stage in the relationship." 1
Deletion¶
"If the individual requests at any time that their data should be deleted, the data controller has to comply with that request and confirm the deletion, not only from their own systems but from any downward vendors’ systems who were processing that data on behalf of the organization." 1
Updated by Joseph Lacey over 6 years ago · 4 revisions