GDPR Policy
FIRST KICKS FOOTBALL ACADEMY
138 Kennel Lane, Billericay, Essex, CM112SU
myfirstkicks@gmail.com
01277 654404/07990 976297
General Data Protection Regulations (GDPR)
DATA PROTECTION POLICY
A) INTRODUCTION
We may have to collect and use information about people with whom we
work. This personal information must be handled and dealt with
properly, however it is collected, recorded and used, and whether it be
on paper, in computer records or recorded by any other means.
We regard the lawful and correct treatment of personal information as
very important to our successful operation and to maintaining
confidence between us and those with whom we carry out business. We
will ensure that we treat personal information lawfully and correctly.
To this end we fully endorse and adhere to the principles of the
General Data Protection Regulation (GDPR).
This policy applies to the processing of personal data in manual and
electronic records kept by us in connection with our human resources
function as described below. It also covers our response to any data
breach and other rights under the GDPR.
This policy applies to the personal data of job applicants, existing
and former employees, apprentices, volunteers, placement students,
workers and self-employed contractors. These are referred to in this
policy as relevant individuals.
B) DEFINITIONS
“Personal data” is information that relates to an identifiable person
who can be directly or indirectly identified from that information, for
example, a person’s name, identification number, location, online
identifier. It can also include pseudonymised data.
“Special categories of personal data” is data which relates to an
individual’s health, sex life, sexual orientation, race, ethnic origin,
political opinion, religion, and trade union membership. It also
includes genetic and biometric data (where used for ID purposes).
“Criminal offence data” is data which relates to an individual’s
criminal convictions and offences.
“Data processing” is any operation or set of operations which is
performed on personal data or on sets of personal data, whether or not
by automated means, such as collection, recording, organisation,
structuring, storage, adaptation or alteration, retrieval,
consultation, use, disclosure by transmission, dissemination or
otherwise making available, alignment or combination, restriction,
erasure or destruction.
C) DATA PROTECTION PRINCIPLES
Under GDPR, all personal data obtained and held by us must be processed
according to a set of core principles.
In accordance with these principles, we will ensure that:
a) processing will be fair, lawful and transparent
b) data be collected for specific, explicit, and legitimate purposes
c) data collected will be adequate, relevant and limited to what is
necessary for the purposes of processing
d) data will be kept accurate and up to date. Data which is found to be
inaccurate will be rectified or erased without delay
e) data is not kept for longer than is necessary for its given purpose
f) data will be processed in a manner that ensures appropriate security
of personal data including protection against unauthorised or unlawful
processing, accidental loss, destruction or damage by using appropriate
technical or organisation measures
g) we will comply with the relevant GDPR procedures for international
transferring of personal data
D) TYPES OF DATA HELD
We keep several categories of personal data on our employees in order
to carry out effective and efficient processes. We keep this data in a
personnel file relating to each employee and we also hold the data
within our computer systems, for example, our holiday booking system.
Specifically, we hold the following types of data:
a) personal details such as name, address, phone numbers
b) information gathered via the recruitment process such as that
entered into a CV or included in a CV cover letter, references from
former employers, details on your education and employment history etc
c) details relating to pay administration such as National Insurance
numbers, bank account details and tax codes
d) medical or health information
e) information relating to your employment with us, including:
i) job title and job descriptions
ii) your salary
iii) your wider terms and conditions of employment
iv) details of formal and informal proceedings involving you such as
letters of concern, disciplinary and grievance proceedings, your annual
leave records, appraisal and performance information
v) internal and external training modules undertaken
All of the above information is required for our processing activities.
More information on those processing activities are included in our
privacy notice for employees, which is available from your manager.
E) EMPLOYEE RIGHTS
You have the following rights in relation to the personal data we hold
on you:
a) the right to be informed about the data we hold on you and what we
do with it;
b) the right of access to the data we hold on you. More information on
this can be found in the section headed “Access to Data” below and in
our separate policy on Subject Access Requests”;
c) the right for any inaccuracies in the data we hold on you, however
they come to light, to be corrected.
This is also known as ‘rectification’;
d) the right to have data deleted in certain circumstances. This is
also known as ‘erasure’;
e) the right to restrict the processing of the data;
f) the right to transfer the data we hold on you to another party. This
is also known as ‘portability’;
g) the right to object to the inclusion of any information;
h) the right to regulate any automated decision-making and profiling of
personal data.
More information can be found on each of these rights in our separate
policy on employee rights under GDPR.
F) RESPONSIBILITIES
In order to protect the personal data of relevant individuals, those
within our business who must process data as part of their role have
been made aware of our policies on data protection.
We have also appointed employees with responsibility for reviewing and
auditing our data protection systems.
G) LAWFUL BASES OF PROCESSING
We acknowledge that processing may be only be carried out where a
lawful basis for that processing exists and we have assigned a lawful
basis against each processing activity.
Where no other lawful basis applies, we may seek to rely on the
employee’s consent in order to process data.
However, we recognise the high standard attached to its use. We
understand that consent must be freely given, specific, informed and
unambiguous. Where consent is to be sought, we will do so on a specific
and individual basis where appropriate. Employees will be given clear
instructions on the desired processing activity, informed of the
consequences of their consent and of their clear right to withdraw
consent at any time.
H) ACCESS TO DATA
As stated above, employees have a right to access the personal data
that we hold on them. To exercise this right, employees should make a
Subject Access Request. We will comply with the request without delay,
and within one month unless, in accordance with legislation, we decide
that an extension is required. Those who make a request will be kept
fully informed of any decision to extend the time limit.
No charge will be made for complying with a request unless the request
is manifestly unfounded, excessive or repetitive, or unless a request
is made for duplicate copies to be provided to parties other than the
employee making the request. In these circumstances, a reasonable
charge will be applied.
Further information on making a subject access request is contained in
our Subject Access Request policy.
I) DATA DISCLOSURES
The Company may be required to disclose certain data/information to any
person. The circumstances leading to such disclosures include:
a) any employee benefits operated by third parties;
b) disabled individuals – whether any reasonable adjustments are
required to assist them at work;
c) individuals’ health data – to comply with health and safety or
occupational health obligations towards the employee;
d) for Statutory Sick Pay purposes;
e) HR management and administration – to consider how an individual’s
health affects his or her ability to do their job;
f) the smooth operation of any employee insurance policies or pension
plans;
g) to assist law enforcement or a relevant authority to prevent or
detect crime or prosecute offenders or to assess or collect any tax or
duty.
These kinds of disclosures will only be made when strictly necessary
for the purpose.
J) DATA SECURITY
All our employees are aware that hard copy personal information should
be kept in a locked filing cabinet, drawer, or safe.
Employees are aware of their roles and responsibilities when their role
involves the processing of data. All employees are instructed to store
files or written information of a confidential nature in a secure
manner so that are only accessed by people who have a need and a right
to access them and to ensure that screen locks are implemented on all
PCs, laptops etc when unattended. No files or written information of a
confidential nature are to be left where they can be read by
unauthorised people.
Where data is computerised, it should be coded, encrypted or password
protected both on a local hard drive and on a network drive that is
regularly backed up. If a copy is kept on removable storage media, that
media must itself be kept in a locked filing cabinet, drawer, or safe.
Employees must always use the passwords provided to access the computer
system and not abuse them by passing them on to people who should not
have them.
Personal data relating to employees should not be kept or transported
on laptops, USB sticks, or similar devices, unless prior authorisation
has been received. Where personal data is recorded on any such device
it should be protected by:
a) ensuring that data is recorded on such devices only where absolutely
necessary.
b) using an encrypted system — a folder should be created to store the
files that need extra protection and all files created or moved to this
folder should be automatically encrypted.
c) ensuring that laptops or USB drives are not left where they can be
stolen.
Failure to follow the Company’s rules on data security may be dealt
with via the Company’s disciplinary procedure. Appropriate sanctions
include dismissal with or without notice dependent on the severity of
the failure.
K) THIRD PARTY PROCESSING
Where we engage third parties to process data on our behalf, we will
ensure, via a data processing agreement with the third party, that the
third party takes such measures in order to maintain the Company’s
commitment to protecting data.
L) INTERNATIONAL DATA TRANSFERS
The Company does not transfer personal data to any recipients outside
of the EEA.
M) REQUIREMENT TO NOTIFY BREACHES
All data breaches will be recorded on our Data Breach Register. Where
legally required, we will report a breach to the Information
Commissioner within 72 hours of discovery. In addition, where legally
required, we will inform the individual whose data was subject to
breach.
More information on breach notification is available in our Breach
Notification policy.
N) TRAINING
New employees must read and understand the policies on data protection
as part of their induction.
All employees receive training covering basic information about
confidentiality, data protection and the actions to take upon
identifying a potential data breach.
The nominated data controller/auditors/protection officers for the
Company are trained appropriately in their roles under the GDPR.
All employees who need to use the computer system are trained to
protect individuals’ private data, to ensure data security, and to
understand the consequences to them as individuals and the Company of
any potential lapses and breaches of the Company’s policies and
procedures.
O) RECORDS
The Company keeps records of its processing activities including the
purpose for the processing and retention periods in its HR Data Record.
These records will be kept up to date so that they reflect current
processing activities.
P) DATA PROTECTION COMPLIANCE
Our appointed compliance officer in respect of our data protection
activities is:
Name: Lee Fisher
Tel: 07990 976297
A) INTRODUCTION
1) IT and Communication plays an essential role in the conduct of our
business. The IT infrastructure including e-mail and internet access
have therefore significantly improved business operations and
efficiencies.
2) How you communicate with people not only reflects on you as an
individual but also on us as a business. As a result of this the
company values your ability to communicate with colleagues,
clients/customers and business contacts but we must also ensure that
such systems and access are managed correctly, not abused in how they
are used or what they are used for.
3) This policy applies to all members of the Company who use our or our
clients’ communications facilities, whether Directors/Consultants, full
or part-time employees, contract staff or temporary staff. The
parameters and restrictions are outlined below and you are required to
read them carefully.
B) GENERAL PRINCIPLES
1) You must use our and our clients’ information technology and
communications facilities sensibly, professionally, lawfully,
consistently with your duties and in accordance with this policy and
other Company rules and procedures.
2) At all times employees must behave with honesty and integrity and
respect the rights and privacy of others in relation to electronic
communication and information. The company reserves the right to
maintain all electronic communication and files.
3) Every employee will be given access to the Intranet and/or Internet
as appropriate to their job needs. For those who do not have daily PC
access occasional access will be arranged, as necessary, by Management,
4) All PC/network access will be through passwords, and no individual
is permitted onto the system using another employee’s password.
Employees are not permitted to share their password with anyone inside
or outside the company. Individuals will be allowed to set their own
passwords, and must change them as frequently as requested by the
system set-up requirements.
5) All information relating to our clients/customers and our business
operations is confidential. You must treat our paper-based and
electronic information with utmost care.
6) Many aspects of communication are protected by intellectual property
rights which can be infringed in a number of ways. Downloading,
copying, possessing and distributing material from the internet may be
an infringement of copyright or of other intellectual property rights.
7) Particular care must be taken when using e-mail as a means of
communication because all expressions of fact, intention and opinion in
an e-mail may bind you and/or the Company and can be produced in court
in the same way as other kinds of written statements.
8) If you are speaking with someone face to face, via the telephone, in
writing via whatever medium you are a representative of the Company.
Whilst in this role you should not express any personal opinion that
you know or suspect might be contrary to the opinions of the Directors
or Company policy.
9) You must not use any of our or our clients’ media to do or say
anything which would be subject to disciplinary or legal action in any
other context such as sending any sexist, racist, defamatory or other
unlawful material. If you are in doubt about a course of action, take
advice from a member of management.
C) USE OF ELECTRONIC MAIL
1) Business use
Always use the “Bcc” box when mailing to groups whenever the members of
the group are unaware of the identity of all the others (as in the case
of marketing mailing lists), or where you judge that the membership of
the group of one or more individuals should perhaps not be disclosed to
the others (as in the case of members of a staff benefit scheme),
because if you use the “Cc” box each recipient is
informed of the identity (and in the case of external recipients, the
address) of all the others. Such a disclosure may breach any duty of
confidence owed to each recipient, breach the Company’s obligations
under the General Data Protection Regulation and Data Protection Act or
may inadvertently disclose confidential business information such as a
marketing list. This applies to both external and internal e-mail.
Expressly agree with the customer/client that the use of e-mail is an
acceptable form of communication bearing in mind that if the material
is confidential, privileged or commercially sensitive then un-encrypted
e-mail is not secure.
If you have sent an important document, always telephone to confirm
that the e-mail has been received and read.
In light of the security risks inherent in web-based e-mail accounts,
you must not e-mail business documents to your personal web-based
accounts. You may send documents to a customer’s/client’s web-based
account if you have the customer’s/client’s express written permission
to do so. However, under no circumstances should you send sensitive or
highly confidential documents to a customer’s/client’s personal
web-based e-mail account (e.g. Yahoo, or Hotmail), even if the
customer/client asks you to do so.
2) Personal use
a) Although our e-mail facilities are provided for the purposes of our
business, we accept that you may occasionally want to use them for your
own personal purposes. This is permitted on condition that all the
procedures and rules set out in this policy are complied with. Be
aware, however, that if you choose to make use of our facilities for
personal correspondence, the Company may need to monitor communications
for the reasons shown below.
b) Under no circumstances may the Company’s facilities be used in
connection with the operation or management of any business other than
that of the Company or a customer/client of the Company unless express
permission has been obtained from a member of management.
c) You must ensure that your personal e-mail use:
• does not interfere with the performance of your duties;
• does not take priority over your work responsibilities;
• does not cause unwarranted expense or liability to be incurred by the
Company or our clients;
• does not have a negative impact on our business in any way; and
• is lawful and complies with this policy.
d) The Company will not tolerate the use of the E-mail system for
unofficial or inappropriate purposes, including:
(i) any messages that could constitute bullying, harassment or other
detriment;
(ii) on-line gambling;
(iii) accessing or transmitting pornography;
(iv) transmitting copyright information and/or any software available
to the user; or
(v) posting confidential information about other employees, the Company
or its customers or suppliers.
D) USE OF INTERNET AND INTRANET
1) We trust you to use the internet sensibly. Although internet
facilities are provided for the purposes of our business, we accept
that you may occasionally want to use them for your own personal
purposes. This is permitted on condition that all the procedures and
rules set out in this policy are complied with and your use of the
internet does not interfere in any way with the performance of your
duties.
2) Whenever you access a web site, you should always comply with the
terms and conditions governing its use. Care must be taken in the use
of information accessed through the Internet. Most information is
unregulated, and as such there is no guarantee of accuracy.
3) The use of the Internet to access and/or distribute any kind of
offensive material, or material that is not work-related, leaves an
individual liable to disciplinary action which could lead to dismissal.
4) You must not:
a) use any images, text or material which are copyright-protected,
other than in accordance with the terms of the license under which you
were permitted to download them;
b) introduce packet-sniffing or password-detecting software;
c) seek to gain access to restricted areas of the Company’s network;
d) access or try to access data which you know or ought to know is
confidential;
e) introduce any form of computer virus; nor
f) carry out any hacking activities.
E) VIRUS PROTECTION PROCEDURES
In order to prevent the introduction of virus contamination into the
software system the following must be observed:-
a) unauthorised software including public domain software, magazine
cover disks/CDs or Internet/World Wide Web downloads must not be used;
and
b) all software must be virus checked using standard testing procedures
before being used.
F) USE OF COMPUTER EQUIPMENT
In order to control the use of the Company’s computer equipment and
reduce the risk of contamination the following will apply:
a) The introduction of new software must first of all be checked and
authorised by a member of management or a client’s nominated senior
member of management before general use will be permitted.
b) Only authorised staff should have access to the Company’s computer
equipment.
c) Only authorised software may be used on any of the Company’s
computer equipment.
d) Only software that is used for business applications may be used.
e) No software may be brought onto or taken from the Company’s premises
without prior authorisation.
f) Unauthorised access to the computer facility will result in
disciplinary action.
g) Unauthorised copying and/or removal of computer equipment/software
will result in disciplinary action, such actions could lead to
dismissal.
G) SYSTEM SECURITY
1) Security of our or our clients’ IT systems is of paramount
importance. We owe a duty to all of our customers/clients to ensure
that all of our business transactions are kept confidential. If at any
time we need to rely in court on any information which has been stored
or processed using our IT systems it is essential that we are able to
demonstrate the integrity of those systems. Every time you use the
system you take responsibility for the security implications of what
you are doing.
2) The Company’s system or equipment must not be used in any way which
may cause damage, or overloading or which may affect its performance or
that of the internal or external network.
3) Keep all confidential information secure, use it only for the
purposes intended and do not disclose it to any unauthorised third
party.
H) WORKING REMOTELY
1) This part of the policy and the procedures in it apply to your use
of our systems, to your use of our laptops, and also to your use of
your own computer equipment or other computer equipment (e.g. client’s
equipment) whenever you are working on Company business away from our
premises (working remotely).
2) When you are working remotely you must:
a) password protect any work which relates to our business so that no
other person can access your work;
b) position yourself so that your work cannot be overlooked by any
other person;
c) take reasonable precautions to safeguard the security of our laptop
computers and any computer equipment on which you do Company business,
and keep your passwords secret;
d) inform the police and the Company as soon as possible if either a
Company laptop in your possession or any computer equipment on which
you do our work has been stolen; and
e) ensure that any work which you do remotely is saved on the Company
system or is transferred to our system as soon as reasonably
practicable.
3) PDAs or similar hand-held devices are easily stolen and not very
secure so you must password-protect access to any such devices used by
you on which is stored any personal data of which the Company is a data
controller or any information relating our business, our clients or
their business.
I) PERSONAL TELEPHONE CALLS/ MOBILE PHONES
1) Telephones are essential for our business. Incoming/outgoing
personal telephone calls are allowed at the
Company’s head office but should be kept to a minimum. We reserve the
right to recharge for excessive personal use. When visiting or working
on client premises you should always seek permission before using our
clients’ telephone facilities.
2) Personal mobile phones should be switched off or ‘on silent’ during
working hours and only used during authorised breaks.
J) MONITORING OF COMMUNICATIONS BY THE COMPANY
1) The Company is ultimately responsible for all business
communications but subject to that will, so far as possible and
appropriate, respect your privacy and autonomy. The Company may monitor
your business communications for reasons which include:
a) providing evidence of business transactions;
b) ensuring that our business procedures, policies and contracts with
staff are adhered to;
c) complying with any legal obligations;
d) monitoring standards of service, staff performance, and for staff
training;
e) preventing or detecting unauthorised use of our communications
systems or criminal activities; and
f) maintaining the effective operation of Company communication
systems.
2) From time to time the Company may monitor telephone, e-mail and
internet traffic data (i.e. sender, receiver, subject; non-business
attachments to e-mail, numbers called and duration of calls; domain
names of web sites visited, duration of visits, and non-business files
downloaded from the internet) at a network level (but covering both
personal and business communications). This includes monitoring of any
additional accounts you may be requested to set up for the purposes of
performing your work tasks, which are subject to the same rules as your
work email account. Information acquired through such monitoring may be
used as evidence in disciplinary proceedings.
3) Sometimes it is necessary for us to access your business
communications during your absence, such as when you are away because
you are ill or while you are on holiday.
K) DATA PROTECTION
1) As an employee using our communications facilities, you will
inevitably be involved in processing personal data for the Company as
part of your job. Data protection is about the privacy of individuals,
and is governed by the General Data Protection Regulation and current
Data Protection Act.
2) Whenever and wherever you are processing personal data for the
Company you must keep this secret, confidential and secure, and you
must take particular care not to disclose such data to any other person
(whether inside or outside the Company) unless authorised to do so. Do
not use any such personal data except as authorised by us for the
purposes of your job. If in doubt ask a member of management.
3) The Act gives every individual the right to see all the information
which any data controller holds about them. Bear this in mind when
recording personal opinions about someone, whether in an e-mail or
otherwise. It is another reason why personal remarks and opinions made
should be given responsibly, must be relevant and appropriate as well
as accurate and justifiable.
4) For your information, the Act provides that it is a criminal offence
to obtain or disclose personal data without the consent of the data
controller. “Obtaining” here includes the gathering of personal data by
employees at work without the authorisation of the employer. You may be
committing this offence if without authority of the Company: you exceed
your authority in collecting personal data; you access personal data
held by us; or you pass them on to someone else (whether inside or
outside the Company).
L) USE OF SOCIAL NETWORKING SITES
Any work related issue or material that could identify an individual
who is a customer/client or work colleague, which could adversely
affect the company a customer/client or our relationship with any
customer/client must not be placed on a social networking site. This
means that work related matters must not be placed on any such site at
any time either during or outside of working hours and includes access
via any computer equipment, mobile phone or PDA.
M) CONFIDENTIALITY
Employees are not permitted to register with sites or electronic
services in the company’s name without the prior permission of their
manager. They are not permitted to reveal internal company information
to any sites, be it confidential or otherwise, or comment on company
matters, even if this is during after-hours or personal use. The
company confidentiality policy applies to all electronic communication
and data.
N) COMPLIANCE WITH THIS POLICY
1) Failure to comply with this policy may result in disciplinary action
being taken against you. If there is anything in this policy that you
do not understand, please discuss it with a member of management.
2) Please note that the procedures and policies outlined in this
policy, and in any related policy, may be reviewed or changed at any
time.
A) AIM
This policy outlines the rights that data subjects have, under the
General Data Protection Regulation (GDPR), in relation to the data
about them that we hold. Data subjects, for the purposes of this
policy, includes employees (current, prospective and former), workers
and contractors.
B) THE RIGHT TO BE INFORMED
In order to keep you informed about how we use your data, we have a
privacy notice for employees. You can obtain a copy of the privacy
notice from your manager.
The Company also has a separate privacy notice applicable to job
applicants, available from your manager.
You will not be charged for receiving our privacy notices.
Our privacy notices set out:
a) the types of data we hold and the reason for processing the data;
b) our legitimate interest for processing it;
c) details of who your data is disclosed to and why, including
transfers to other countries. Where data is transferred to other
counties, the safeguards used to keep your data secure are explained;
d) how long we keep your data for, or how we determine how long to keep
your data for;
e) where your data comes from;
f) your rights as a data subject;
g) your absolute right to withdraw consent for processing data where
consent has been provided and no other lawful reason for processing
your data applies;
h) your right to make a complaint to the Information Commissioner if
you think your rights have been breached;
i) whether we use automated decision making and if so, how the
decisions are made, what this means for you and what could happen as a
result of the process;
j) the name and contact details of our data protection officer.
C) THE RIGHT OF ACCESS
You have the right to access your personal data which is held by us.
You can find out more about how to request access to your data by
reading our Subject Access Request policy.
D) THE RIGHT TO ‘CORRECTION’
If you discover that the data we hold about you is incorrect or
incomplete, you have the right to have the data corrected. If you wish
to have your data corrected, you should complete the Data Correction
Form.
Usually, we will comply with a request to rectify data within one month
unless the request is particularly complex in which case we may write
to you to inform you we require an extension to the normal timescale.
The maximum extension period is two months.
You will be informed if we decide not to take any action as a result of
the request. In these circumstances, you are able to complain to the
Information Commissioner and have access to a judicial remedy.
Third parties to whom the data was disclosed will be informed of the
rectification.
E) THE RIGHT OF ‘ERASURE’
In certain circumstances, we are required to delete the data we hold on
you. Those circumstances are:
a) where it is no longer necessary for us to keep the data;
b) where we relied on your consent to process the data and you
subsequently withdraw that consent. Where this happens, we will
consider whether another legal basis applies to our continued use of
your data;
c) where you object to the processing (see below) and the Company has
no overriding legitimate interest to continue the processing;
d) where we have unlawfully processed your data;
e) where we are required by law to erase the data.
If you wish to make a request for data deletion, you should complete
the Data Erasure form.
We will consider each request individually, however, you must be aware
that processing may continue under one of the permissible reasons.
Where this happens, you will be informed of the continued use of your
data and the reason for this.
Third parties to whom the data was disclosed will be informed of the
erasure where possible unless to do so will cause a disproportionate
effect on us.
F) THE RIGHT OF ‘RESTRICTION’
You have the right to restrict the processing of your data in certain
circumstances.
We will be required to restrict the processing of your personal data in
the following circumstances:
a) where you tell us that the data we hold on you is not accurate.
Where this is the case, we will stop processing the data until we have
taken steps to ensure that the data is accurate;
b) where the data is processed for the performance of a public interest
task or because of our legitimate interests and you have objected to
the processing of data. In these circumstances, the processing may be
restricted whilst we consider whether our legitimate interests mean it
is appropriate to continue to process it;
c) when the data has been processed unlawfully;
d) where we no longer need to process the data but you need the data in
relation to a legal claim.
If you wish to make a request for data restriction, you should complete
the Data Restriction form.
Where data processing is restricted, we will continue to hold the data
but will not process it unless you consent to the processing or
processing is required in relation to a legal claim.
Where the data to be restricted has been shared with third parties, we
will inform those third parties of the restriction where possible
unless to do so will cause a disproportionate effect on us.
You will be informed before any restriction is lifted.
G) THE RIGHT TO DATA ‘PORTABILITY’
You have the right to obtain the data that we process on you and
transfer it to another party. Where our technology permits, we will
transfer the data directly to the other party.
Data which may be transferred is data which:
a) you have provided to us; and
b) is processed because you have provided your consent or because it is
needed to perform the employment contract between us; and
c) is processed by automated means.
If you wish to exercise this right, please speak to your manager.
We will respond to a portability request without undue delay, and
within one month at the latest unless the request is complex or we
receive a number of requests in which case we may write to you to
inform you that we require an extension and reasons for this. The
maximum extension period is two months.
We will not charge you for access to your data for this purpose.
You will be informed if we decide not to take any action as a result of
the request, for example, because the data you wish to transfer does
not meet the above criteria. In these circumstances, you are able to
complain to the Information Commissioner and have access to a judicial
remedy.
The right to data portability relates only to data defined as above.
You should be aware that this differs from the data which is accessible
via a Subject Access Request.
H) THE RIGHT TO ‘OBJECT’
You have a right to require us to stop processing your data; this is
known as data objection.
You may object to processing where it is carried out:
a) in relation to the Company’s legitimate interests;
b) for the performance of a task in the public interest;
c) in the exercise of official authority; or
d) for profiling purposes.
If you wish to object, you should do so by completing the Data
Objection Form.
In some circumstances we will continue to process the data you have
objected to. This may occur when:
a) we can demonstrate compelling legitimate reasons for the processing
which are believed to be more important than your rights; or
b) the processing is required in relation to legal claims made by, or
against, us.
If the response to your request is that we will take no action, you
will be informed of the reasons.
I) RIGHT NOT TO HAVE AUTOMATED DECISIONS MADE ABOUT YOU
You have the right not to have decisions made about you solely on the
basis of automated decision making processes where there is no human
intervention, where such decisions will have a significant effect on
you.
However, the Company does not make any decisions based on such
processes.
A) AIM
You have a right, under the General Data Protection Regulation, to
access the personal data we hold on you. To do so, you should made a
subject access request, and this policy sets out how you should make a
request, and our actions upon receiving the request.
B) DEFINITIONS
“Personal data” is any information relating to an identifiable person
who can be directly or indirectly identified in particular by reference
to an identifier, including your name.
“Special categories of personal data” includes information relating to:
a) race
b) ethnic origin
c) politics
d) religion
e) trade union membership
f) genetics
g) biometrics (where used for ID purposes)
h) health
i) sex life or
j) sexual orientation.
C) MAKING A REQUEST
Although subject access requests may be made verbally, we would advise
that a request may be dealt with more efficiently and effectively if it
is made in writing. If you wish to make a request, please use the
Subject Access Request form.
Requests that are made directly by you should be accompanied by
evidence of your identity. If this is not provided, we may contact you
to ask that such evidence be forwarded before we comply with the
request.
Requests made in relation to your data from a third party should be
accompanied by evidence that the third party is able to act on your
behalf. If this is not provided, we may contact the third party to ask
that such evidence be forwarded before we comply with the request.
D) TIMESCALES
Usually, we will comply with your request without delay and at the
latest within one month. Where requests are complex or numerous, we may
contact you to inform you that an extension of time is required. The
maximum extension period is two months.
E) FEE
We will normally comply with your request at no cost. However, if the
request is manifestly unfounded or excessive, or if it is repetitive,
we may contact you requesting a fee. This fee must be paid in order for
us to comply with the request. The fee will be determined at the
relevant time and will be set at a level which is reasonable in the
circumstances.
In addition, we may also charge a reasonable fee if you request further
copies of the same information.
F) INFORMATION YOU WILL RECEIVE
When you make a subject access request, you will be informed of:
a) whether or not your data is processed and the reasons for the
processing of your data;
b) the categories of personal data concerning you;
c) where your data has been collected from if it was not collected from
you;
d) anyone who your personal data has been disclosed to or will be
disclosed to, including anyone outside of the EEA and the safeguards
utilised to ensure data security;
e) how long your data is kept for (or how that period is decided);
f) your rights in relation to data rectification, erasure, restriction
of and objection to processing;
g) your right to complain to the Information Commissioner if you are of
the opinion that your rights have been infringed;
h) the reasoning behind any automated decisions taken about you.
G) CIRCUMSTANCES IN WHICH YOUR REQUEST MAY BE REFUSED
We may refuse to deal with your subject access request if it is
manifestly unfounded or excessive, or if it is repetitive. Where it is
our decision to refuse your request, we will contact you without undue
delay, and at the latest within one month of receipt, to inform you of
this and to provide an explanation. You will be informed of your right
to complain to the Information Commissioner and to a judicial remedy.
We may also refuse to deal with your request, or part of it, because of
the types of information requested. For example, information which is
subject to legal privilege or relates to management planning is not
required to be disclosed. Where this is the case, we will inform you
that your request cannot be complied with and an explanation of the
reason will be provided.
A) AIM
We are aware of the obligations placed on us by the General Data
Protection Regulation (GDPR) in relation to processing data lawfully
and to ensure it is kept securely.
One such obligation is to report a breach of personal data in certain
circumstances and this policy sets out our position on reporting data
breaches.
B) PERSONAL DATA BREACH
A personal data breach is a breach of security leading to the
accidental or unlawful destruction, loss, alteration, unauthorised
disclosure of, or access to, personal data transmitted, stored or
processed.
The following are examples of data breaches:
a) access by an unauthorised third party;
b) deliberate or accidental action (or inaction) by a data controller
or data processor;
c) sending personal data to an incorrect recipient;
d) computing devices containing personal data being lost or stolen;
e) alteration of personal data without permission;
f) loss of availability of personal data.
C) BREACH DETECTION MEASURES
We have implemented the following measures to assist us in detecting a
personal data breach:
• Employees notifying us of a data breach
• Clients notifying us of a data breach
• All computer systems and files are password protected
D) INVESTIGATION INTO SUSPECTED BREACH
In the event that we become aware of a breach, or a potential breach,
an investigation will be carried out. This investigation will be
carried out by Nicky Fitch (Company Director) who will make a decision
over whether the breach is required to be notified to the Information
Commissioner. A decision will also be made over whether the breach is
such that the individual(s) must also be notified.
E) WHEN A BREACH WILL BE NOTIFIED TO THE INFORMATION COMMISSIONER
In accordance with the GDPR, we will undertake to notify the
Information Commissioner of a breach which is likely to pose a risk to
people’s rights and freedoms. A risk to people’s freedoms can include
physical, material or non-material damage such as discrimination,
identity theft or fraud, financial loss and damage to reputation.
Notification to the Information Commissioner will be done without undue
delay and at the latest within 72 hours of discovery. If we are unable
to report in full within this timescale, we will make an initial report
to the Information Commissioner, and then provide a full report in more
than one instalment if so required.
The following information will be provided when a breach is notified:
a) a description of the nature of the personal data breach including,
where possible:
i) the categories and approximate number of individuals concerned; and
ii) the categories and approximate number of personal data records
concerned
b) the name and contact details of the appointed compliance officer,
where more information can be obtained;
c) a description of the likely consequences of the personal data
breach; and
d) a description of the measures taken, or proposed to be taken, to
deal with the personal data breach, including, where appropriate, the
measures taken to mitigate any possible adverse effects.
F) WHEN A BREACH WILL BE NOTIFIED TO THE INDIVIDUAL
In accordance with the GDPR, we will undertake to notify the individual
whose data is the subject of a breach if there is a high risk to
people’s rights and freedoms. A high risk may be, for example, where there
is an immediate threat of identity theft, or if special categories of data
are disclosed online.
This notification will be made without undue delay and may, dependent on
the circumstances, be made before the supervisory authority is notified.
The following information will be provided when a breach is notified to the
affected individuals:
a) a description of the nature of the breach
b) the name and contact details of the appointed compliance officer, where
more information can be obtained
c) a description of the likely consequences of the personal data breach and
d) a description of the measures taken, or proposed to be taken, to deal
with the personal data breach, including, where appropriate, the measures
taken to mitigate any possible adverse effects.
G) RECORD OF BREACHES
The Company records all personal data breaches regardless of whether they
are notifiable or not as part of its general accountability requirement
under GDPR. It records the facts relating to the breach, its effects and
the remedial action taken.