SlideShare a Scribd company logo
DataAn introduction to data
protection 2013

protection

Thursday 308January 2014, DMA House
Friday February
#dmadata

Supported by
Agenda
9.00am

Registration and breakfast

9.30am

Why is data protection important?

9.40am

Understanding the law
The Data Protection Act 1998
Key terms
8 Principles

10.40am

Break

11.00am

Understanding the law
The Privacy and Electronic Communications Regulation 2003
Key rules
Key points

11.30am

Practical tips for marketers

12.00am

Summary and questions

12.30am

Close
Why is it important?
•
•
•
•

It helps us to protect information about ourselves and others
It helps us avoid damage to the reputation of our organisation
It makes good business sense – it can increase efficiency and
effectiveness
It helps us avoid enforcement action by the Information
Commissioner
– both employers and employees can be prosecuted
– companies can face a monetary penalty of up to £500,000 for
major breaches
Understanding the law 1
•

Data Protection Act 1998 (DPA)
– Came into force 1 March 2000
– Replaced 1984 Act
– Covers doing anything with data
– Applies electronic records and some manual records
Key Terms
•

•

Personal data
– any data that can be used to identify a living individual
– Examples of personal data can include:
• Name and address
• Email address (even business email addresses if they are non
generic)
• Name and telephone number
• Photographs
– Only personal data is protected by the DPA
Sensitive personal data
– any data relating to:
• Health
• Race or ethnic origin
• Political opinions
• Religious beliefs
• Trade union membership
• Sex life
• Criminal proceedings or convictions
Key terms
•

Processing
– obtaining, recording or holding information or carrying out any
operation on the information including
• Organising
• Adapting
• Retrieving
• Disclosing
• Blocking
• Destroying

•

Data subject
– a living identifiable individual to whom the personal data
relates
Key Terms
•

Data controller
- Determines how data will be used
- Usually owns or rents the data (may be done by 3 rd
party on their behalf)
- Required to notify (register) as a controller with the ICO
- May be fined by ICO if any data breaches arise

•

Data processor
- Processes data on behalf of controller or other
processor
- Processing can be anything from data storage to
advanced data manipulation and modelling
- Includes companies that manage / broker / collect data
on behalf of others
The 8 Principles
•
•
•
•
•
•
•

Fairly and lawfully collected
Processed for specified and limited purposes
Adequate, relevant and not excessive
Accurate and kept up to date
Not kept for longer than necessary
Processed in accordance with Individuals’ rights
Security – appropriate technical and organisational
measures
• Not transferred outside the European Economic Area (EEA)
unless adequate protections are in place
• (EEA: The 28 member states of the EU, plus Iceland,
Liechtenstein and Norway)
Principle 1: Fairly and lawfully
collected
•

Fair processing information provided

•

Organisation’s identity given

•

Purpose of collection made clear

•

Further information necessary

•

Correct permissions obtained
- Implied consent: opt-out mechanism provided
- Express consent: opt-in mechanism provided

•

Sensitive personal data only captured if strictly necessary
Principle 2: Processed for limited
purposes
• Only process data for the purpose(s) you told the individual
• Make the purpose(s) clear at the point of data collection
• Change of circumstances – what happens to the data then?
• Subsequent use of data for direct marketing purposes
• Data cleansing – regular and ad hoc
Principle 3: Adequate, relevant
and not excessive
•

Minimum amount of information required

•

Additional information for specific individuals

•

Collect data that you will use now

•

Collection of data that ‘may be useful’ in the future is not permitted
Principle 4: Accurate and kept up
to date
•

Take reasonable steps to ensure accuracy (but what is
‘reasonable’?)

•

Ensure data is not incorrect or misleading

•

Undertake regular data cleansing

•

Clean data against the relevant preference service files and other
appropriate cleansing files
Principle 5: Not kept for longer
than necessary
• Keep for as long as purpose collected for
• Suppression lists
Principle 6: Processed in
accordance with the rights of data
subjects
•

Subject access requests

•

‘Where did you get my data from?’

•

Right to prevent direct marketing

•

Customer service / legally required communications – no opt-out
provision required

•

Right to have inaccurate data corrected
Principle 7: Technological and
organisational security
•

Data security must be appropriate – take account of:
– Current state of technological development
– Cost of implementing security measures
– Potential harm that could result from a data breach
– Nature of data to be protected – non/sensitive?

•

Need for risk assessment and risk management techniques

•

Record your findings and assessments
Principle 7: Technological and
organisational security (continued)
•

Ensure adequate organisational data security measures

•

Prevent unauthorised as well as unlawful processing or disclosure
of data

•

Security measures by data controller and data processor

•

Data processing and transfer agreements in place

•

Staff training

•

Data access on a ‘need to know’ basis – individual log-ins only

•

Secure disposal of data – internally/externally - keep records
Principle 8: Processed within the
EEA unless adequate protection in
place
•

Data can be freely transferred within the EEA (providing data
transfer agreements are in place)

•

Do not transfer data unless the country (destination and countries
data is routed via) have an adequate level of data protection

•

Need to inform individuals before transferring their data outside
the EEA but do not need their consent
Understanding the law 2
•

Privacy and Electronic Communications Regulations 2003 (PECR)
– Came into force 11 December 2003
– Covers electronic communications – email, telephone, SMS
Key rules
•
•
•
•

Sender must not conceal their identity
Communication must have valid address where opt-outs can be
sent
Opt-in required for individuals (B2C)
Soft opt-in/existing customer exemption – available:
– When you are collecting the address/mobile number in the sale
or negotiations for the sale of a product or service;
– You only send communications about similar products and
services;
– You provided an opportunity at time of collection to opt-out.
Key points
•

Existing customer exemption: Not an excuse for unsolicited contact
where correct permissions were never obtained

•

B2B – Opt-out and marketing message needs to directly relate to
the work they do.

•

Subject headers in emails must be clear and accurate

•

Free and simple-to-use opt-out method must always be provided

•

Action unsubscribe requests promptly – add to internal suppression
file

•

Maintain different flags for different types of communication –
helps to avoid general opt-outs for all channels
Practical tips for marketers
•

Data capture forms

•

Marketing permissions

•

Sourcing data

•

Regaining lost permission
Data capture forms
•

Key information to include;
– Why the data is being requested
– What the data will be used for
– Provision of an opt-in/out for marketing
– Marketing channels to be used
– Link to privacy policy

•

Key information to include in privacy policy
– How the data subject can opt-out of marketing
– If the data will be processed outside the EEA
– How long the data will be kept for
– How to make a subject access request
– How to make a complaint regarding use of data
Marketing permissions
B2C

B2B

SMS

Own marketing 3rd party marketing Own marketing
opt-out (MPS
opt-out
screening)
opt-out
opt-out (TPS
opt-out
screening)
opt-out
opt-in (unless
corporate
opt-in/ soft optsubscriber
in
opt-in
exemption)
opt-in/ soft optin
opt-in
opt-in

Fax

opt-in

Mail
Telephone

Email

opt-in

opt-out

3rd party marketing
opt-out
opt-out (TPS/ CTPS
screening)
opt-in (unless
corporate subscriber
exemption)
opt-in
opt-out (FPS
screening)
Sourcing data/ Due diligence
•
•
•
•
•
•

Who compiled the list? When? Has it been amended or updated
since?
When was consent obtained?
Who obtained consent and what was the context?
Was it opt-in or opt-out?
Was information provided clearly and intelligibly? How was it
provided?
Did it list organisations by name, by description, or any third party?
Regaining lost permissions
•

•
•
•

Why was permission lost:
– Poor customer service?
– Poor communications timing?
– Inappropriate offers?
– In-house technical issues – permissions not recorded on CRM
system
Revalidation exercise – obtaining up-to-date data
Can very occasionally include request regarding marketing update
in a service message providing it is a minor part of the message
If you have only lost permission for certain channels, contact via
another channel to update permissions
Summary and questions?
Switchboard: (020)7291 3300
Legal helpdesk: legaladvice@dma.org.uk

More Related Content

PDF
An introduction to data protection - 26 March 2014
Rachel Aldighieri
 
PPTX
An Introduction to Data Protection (London) - June 2015
Rachel Aldighieri
 
PDF
Legal and data protection update
Rachel Aldighieri
 
PDF
An introduction to data protection - Edinburgh
Rachel Aldighieri
 
PPTX
Introduction to data protection - Edinburgh - 29/04/15
Rachel Aldighieri
 
PPTX
An introduction to data protection - Manchester - 24/06/15
Rachel Aldighieri
 
PDF
Introduction to data protection
Rachel Aldighieri
 
PPTX
An introduction to data protection - 2/09/2015
Rachel Aldighieri
 
An introduction to data protection - 26 March 2014
Rachel Aldighieri
 
An Introduction to Data Protection (London) - June 2015
Rachel Aldighieri
 
Legal and data protection update
Rachel Aldighieri
 
An introduction to data protection - Edinburgh
Rachel Aldighieri
 
Introduction to data protection - Edinburgh - 29/04/15
Rachel Aldighieri
 
An introduction to data protection - Manchester - 24/06/15
Rachel Aldighieri
 
Introduction to data protection
Rachel Aldighieri
 
An introduction to data protection - 2/09/2015
Rachel Aldighieri
 

What's hot (20)

PDF
Legal update - Leeds
Rachel Aldighieri
 
PPTX
3A – DATA PROTECTION: ADVICE
CFG
 
PPT
Data protection
Lewis Silkin
 
PPT
Data Protection Act
mrmwood
 
PPTX
GDPR Breakfast Briefing for Business Advisors
Harrison Clark Rickerbys
 
PDF
The principles of the Data Protection Act in detail - uk
- Mark - Fullbright
 
PDF
Legal update
Rachel Aldighieri
 
PPTX
What does GDPR mean for your business?
BrightPay Payroll and Auto Enrolment Software
 
PPTX
The Data Protection Act
SaimaRafiq
 
PPTX
GDPR – what does it mean for charities and what you need to consider - Iain P...
m-hance
 
PPTX
Domain management and brand protection in the era of the EU's GDPR
BartLieben
 
PDF
Using Social Business Software and being compliant with EU data protection la...
BCC - Solutions for IBM Collaboration Software
 
PPTX
Data Protection: Transitioning to the GDPR
ImogenRutherford
 
PDF
Data Protection Seminar 2_Marketing & GDPR_ISOLAS LLP_26-07-17
Michael Adamberry
 
PDF
Privacy and Data Security
WilmerHale
 
PDF
Engage 2018: GDPR Three Days To Go
panagenda
 
PPT
Data protection act
Iqbal Bocus
 
PDF
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Financial Poise
 
PDF
GDPR will be the new regulation on may 2018
Marjane Moghimi, ERP
 
PPTX
Data protection ppt
grahamwell
 
Legal update - Leeds
Rachel Aldighieri
 
3A – DATA PROTECTION: ADVICE
CFG
 
Data protection
Lewis Silkin
 
Data Protection Act
mrmwood
 
GDPR Breakfast Briefing for Business Advisors
Harrison Clark Rickerbys
 
The principles of the Data Protection Act in detail - uk
- Mark - Fullbright
 
Legal update
Rachel Aldighieri
 
What does GDPR mean for your business?
BrightPay Payroll and Auto Enrolment Software
 
The Data Protection Act
SaimaRafiq
 
GDPR – what does it mean for charities and what you need to consider - Iain P...
m-hance
 
Domain management and brand protection in the era of the EU's GDPR
BartLieben
 
Using Social Business Software and being compliant with EU data protection la...
BCC - Solutions for IBM Collaboration Software
 
Data Protection: Transitioning to the GDPR
ImogenRutherford
 
Data Protection Seminar 2_Marketing & GDPR_ISOLAS LLP_26-07-17
Michael Adamberry
 
Privacy and Data Security
WilmerHale
 
Engage 2018: GDPR Three Days To Go
panagenda
 
Data protection act
Iqbal Bocus
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Financial Poise
 
GDPR will be the new regulation on may 2018
Marjane Moghimi, ERP
 
Data protection ppt
grahamwell
 
Ad

Viewers also liked (20)

PPTX
Wodache mobile monday
momobeijing
 
PDF
Panel - SNS Game
momobeijing
 
PPT
Senscape for mo mo bj 530
momobeijing
 
PPTX
Edu 290
amble1rw
 
PPT
10 lbs apps from china worth attention
momobeijing
 
PPTX
汇聚创新的力量 丘总
momobeijing
 
PDF
DMA Cookies update
Rachel Aldighieri
 
PDF
Mobile africa 2011
momobeijing
 
PDF
设计驱动移动应用创新
momobeijing
 
PPTX
The Evolution of Inbound Marketing
Byron Fernandez
 
PDF
Neuro sky overview orange event
momobeijing
 
PPTX
Orange&innovation
momobeijing
 
PPT
Touch china en_mm
momobeijing
 
PPTX
Jiayuan overview & wireless orange labs
momobeijing
 
PPTX
Nadine heading of future lifestyle
momobeijing
 
PPT
Master ppt social
Rachel Aldighieri
 
PPTX
Almost Extinct
testtypography
 
PPT
Html5 在中国的机会、风险和矛盾 磊友黄何 english
momobeijing
 
PPTX
Motorola lifestyle with smart device
momobeijing
 
PPT
共享妈妈晒201205定稿
momobeijing
 
Wodache mobile monday
momobeijing
 
Panel - SNS Game
momobeijing
 
Senscape for mo mo bj 530
momobeijing
 
Edu 290
amble1rw
 
10 lbs apps from china worth attention
momobeijing
 
汇聚创新的力量 丘总
momobeijing
 
DMA Cookies update
Rachel Aldighieri
 
Mobile africa 2011
momobeijing
 
设计驱动移动应用创新
momobeijing
 
The Evolution of Inbound Marketing
Byron Fernandez
 
Neuro sky overview orange event
momobeijing
 
Orange&innovation
momobeijing
 
Touch china en_mm
momobeijing
 
Jiayuan overview & wireless orange labs
momobeijing
 
Nadine heading of future lifestyle
momobeijing
 
Master ppt social
Rachel Aldighieri
 
Almost Extinct
testtypography
 
Html5 在中国的机会、风险和矛盾 磊友黄何 english
momobeijing
 
Motorola lifestyle with smart device
momobeijing
 
共享妈妈晒201205定稿
momobeijing
 
Ad

Similar to An introduction to data protection - 30 Jan 2014 (20)

PDF
DMA - DPC Workshop - 23 October 2013
Rachel Aldighieri
 
PPT
Data protection janine paterson - direct marketing association
iof_events
 
PPSX
Data Protection Act presentation
Ian Clive Oultram
 
PPTX
Things to know about GDPR in 2018
Webkul Software Pvt. Ltd.
 
PDF
data-privacy-egypt-what-you-need-know-en.pdf
kiruthigajawahar6
 
PDF
GDPR - Sink or Swim
Guy Griffiths
 
PPTX
LW GDPR and Cyber Security.pptx
TimBee1
 
PPTX
GDPR and Cyber Security LW.pptx
TimBee1
 
PPTX
Ico sme-webinar-slides-090217
Tony Dowling
 
PPTX
EU GDPR Changes: What do you need to know? - CommuniGator Seminar
Spotler
 
PDF
GDPR for Things - ThingsCon Amsterdam 2017
Saskia Videler
 
PPTX
GDPR: Training Materials by Qualsys
Qualsys Ltd
 
PDF
Principles that affect Marketers
Datamatics Business Solutions Ltd.
 
PDF
Tangible Data Protection White Paper
Nick Banbury
 
PDF
Privacy and Big Data Overload!
SparkPost
 
PPT
Legal And Regulatory Dp Challenges For The Financial Services Sector
MSpadea
 
PPTX
skillcast-gdpr-training-presentation-q320.pptx
RahulGarg294918
 
PPTX
Changes in EU Data Protection Regulations and the Impact on your Email Marketing
Adestra
 
PPTX
GDPR_Skillcast Presentation Template.pptx
sketvnadakit
 
DMA - DPC Workshop - 23 October 2013
Rachel Aldighieri
 
Data protection janine paterson - direct marketing association
iof_events
 
Data Protection Act presentation
Ian Clive Oultram
 
Things to know about GDPR in 2018
Webkul Software Pvt. Ltd.
 
data-privacy-egypt-what-you-need-know-en.pdf
kiruthigajawahar6
 
GDPR - Sink or Swim
Guy Griffiths
 
LW GDPR and Cyber Security.pptx
TimBee1
 
GDPR and Cyber Security LW.pptx
TimBee1
 
Ico sme-webinar-slides-090217
Tony Dowling
 
EU GDPR Changes: What do you need to know? - CommuniGator Seminar
Spotler
 
GDPR for Things - ThingsCon Amsterdam 2017
Saskia Videler
 
GDPR: Training Materials by Qualsys
Qualsys Ltd
 
Principles that affect Marketers
Datamatics Business Solutions Ltd.
 
Tangible Data Protection White Paper
Nick Banbury
 
Privacy and Big Data Overload!
SparkPost
 
Legal And Regulatory Dp Challenges For The Financial Services Sector
MSpadea
 
skillcast-gdpr-training-presentation-q320.pptx
RahulGarg294918
 
Changes in EU Data Protection Regulations and the Impact on your Email Marketing
Adestra
 
GDPR_Skillcast Presentation Template.pptx
sketvnadakit
 

More from Rachel Aldighieri (20)

PPTX
Navigating B2B marketing
Rachel Aldighieri
 
PDF
Taking the lead: customer acquisition barometer 2015
Rachel Aldighieri
 
PPTX
The value of mail: what planners and marketers need to know
Rachel Aldighieri
 
PPTX
Sharpen your social media skills
Rachel Aldighieri
 
PDF
Stop selling and start serving: how to bring data, creativity and technology ...
Rachel Aldighieri
 
PDF
FEDMA - Legal Fact Pack Summary and Pre-order Form
Rachel Aldighieri
 
PDF
European Legal and Privacy Update with FEDMA
Rachel Aldighieri
 
PPT
DMA Awards unplugged: a practical workshop - Thursday 13 August
Rachel Aldighieri
 
PPT
DMA Awards unplugged - 30 July 2015
Rachel Aldighieri
 
PPTX
DMA Copywriting census reveal - Manchester
Rachel Aldighieri
 
PPTX
Data detailed: how to buy and sell information responsibly - 08.07.2015
Rachel Aldighieri
 
PDF
Legal update - 1 July
Rachel Aldighieri
 
PDF
Data privacy: what the consumer really thinks - 30.06.2015
Rachel Aldighieri
 
PDF
In search of the perfect customer journey - Manchester
Rachel Aldighieri
 
PDF
ZEDTalk 3: Creativity & ROI
Rachel Aldighieri
 
PDF
Simon Gill, Chief Creative Officer, DigitasLBi
Rachel Aldighieri
 
PDF
Mark Hancock, Planning Director, The Real Adventure Unlimited...
Rachel Aldighieri
 
PDF
Tim Lindsay, Chief Executive Officer, D&AD
Rachel Aldighieri
 
PDF
David Meikle, Founding Partner, Redsalt
Rachel Aldighieri
 
PDF
Thinking inside the box data permission strategies - Wednesday 18 November
Rachel Aldighieri
 
Navigating B2B marketing
Rachel Aldighieri
 
Taking the lead: customer acquisition barometer 2015
Rachel Aldighieri
 
The value of mail: what planners and marketers need to know
Rachel Aldighieri
 
Sharpen your social media skills
Rachel Aldighieri
 
Stop selling and start serving: how to bring data, creativity and technology ...
Rachel Aldighieri
 
FEDMA - Legal Fact Pack Summary and Pre-order Form
Rachel Aldighieri
 
European Legal and Privacy Update with FEDMA
Rachel Aldighieri
 
DMA Awards unplugged: a practical workshop - Thursday 13 August
Rachel Aldighieri
 
DMA Awards unplugged - 30 July 2015
Rachel Aldighieri
 
DMA Copywriting census reveal - Manchester
Rachel Aldighieri
 
Data detailed: how to buy and sell information responsibly - 08.07.2015
Rachel Aldighieri
 
Legal update - 1 July
Rachel Aldighieri
 
Data privacy: what the consumer really thinks - 30.06.2015
Rachel Aldighieri
 
In search of the perfect customer journey - Manchester
Rachel Aldighieri
 
ZEDTalk 3: Creativity & ROI
Rachel Aldighieri
 
Simon Gill, Chief Creative Officer, DigitasLBi
Rachel Aldighieri
 
Mark Hancock, Planning Director, The Real Adventure Unlimited...
Rachel Aldighieri
 
Tim Lindsay, Chief Executive Officer, D&AD
Rachel Aldighieri
 
David Meikle, Founding Partner, Redsalt
Rachel Aldighieri
 
Thinking inside the box data permission strategies - Wednesday 18 November
Rachel Aldighieri
 

Recently uploaded (20)

PDF
AI in Marketing - From Imagination to Execution - Aarshiya Khandelwal
aarshiyakhandelwal1
 
PPTX
What Branding looks like, by: Cayancela Sánchez Jairo
Jairo Cayancela Sánchez
 
PPTX
The Ultimate Social Media Guide for Marketers and Business Owners
hrithiksrivastava683
 
PPTX
Unlocking Smarter Growth A Performance Marketing Guide in 2025.pptx
Orage Technologies
 
PDF
Digital Marketing Trends to Watch in 2025
thedigitalfoot
 
PDF
Live SEO Audits: Bring Your Site (or Your Competitors) and Let's Uncover What...
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
PDF
Catalogo Ciabatta Mare da BestPromotion
BestPromotion
 
PDF
A Digital Marketing Dream Team: Web, SEO & Design in PH
Jomer Gregorio
 
PPTX
Agriculture marketing trade and price list
thegreatprettyvprobr
 
PPTX
Self_and_Personality class 12 psychology
dynamicplays04
 
PDF
How AI is Reshaping SEO: Trends, Predictions, and Opportunities for Marketers
Fractl - Content Marketing Agency
 
PDF
Hit Play, Then Pause: Reframing Entertainment for Resilience SXSW 2026 Propos...
morgan212401
 
PDF
Beginner to Pro Email Marketing in India Explained 2025.pdf
Getsvision Solutions
 
PPTX
Digital Marketing: Strategies for the Modern Age
digitalaayush695
 
PDF
Multi-Platform Search is the Future of SEO: How to Capture Demand Beyond Goog...
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
PPTX
Paid Search vs. Paid Social. Why You Should Combine
Higher Education Marketing
 
PDF
AI & Automation: The Future of Marketing or the End of Creativity - Brian Fle...
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
PDF
How Healthcare Advertising Agencies in Mumbai Use Digital To.pdf
matrix bricks infotech
 
PDF
Becoming a Better You: How to Discover a Better Version of Yourself - Jamie T...
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
PDF
The AI-Powered Paid Media Playbook | Amsive Webinar
Amsive
 
AI in Marketing - From Imagination to Execution - Aarshiya Khandelwal
aarshiyakhandelwal1
 
What Branding looks like, by: Cayancela Sánchez Jairo
Jairo Cayancela Sánchez
 
The Ultimate Social Media Guide for Marketers and Business Owners
hrithiksrivastava683
 
Unlocking Smarter Growth A Performance Marketing Guide in 2025.pptx
Orage Technologies
 
Digital Marketing Trends to Watch in 2025
thedigitalfoot
 
Live SEO Audits: Bring Your Site (or Your Competitors) and Let's Uncover What...
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
Catalogo Ciabatta Mare da BestPromotion
BestPromotion
 
A Digital Marketing Dream Team: Web, SEO & Design in PH
Jomer Gregorio
 
Agriculture marketing trade and price list
thegreatprettyvprobr
 
Self_and_Personality class 12 psychology
dynamicplays04
 
How AI is Reshaping SEO: Trends, Predictions, and Opportunities for Marketers
Fractl - Content Marketing Agency
 
Hit Play, Then Pause: Reframing Entertainment for Resilience SXSW 2026 Propos...
morgan212401
 
Beginner to Pro Email Marketing in India Explained 2025.pdf
Getsvision Solutions
 
Digital Marketing: Strategies for the Modern Age
digitalaayush695
 
Multi-Platform Search is the Future of SEO: How to Capture Demand Beyond Goog...
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
Paid Search vs. Paid Social. Why You Should Combine
Higher Education Marketing
 
AI & Automation: The Future of Marketing or the End of Creativity - Brian Fle...
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
How Healthcare Advertising Agencies in Mumbai Use Digital To.pdf
matrix bricks infotech
 
Becoming a Better You: How to Discover a Better Version of Yourself - Jamie T...
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
The AI-Powered Paid Media Playbook | Amsive Webinar
Amsive
 

An introduction to data protection - 30 Jan 2014

  • 1. DataAn introduction to data protection 2013 protection Thursday 308January 2014, DMA House Friday February #dmadata Supported by
  • 2. Agenda 9.00am Registration and breakfast 9.30am Why is data protection important? 9.40am Understanding the law The Data Protection Act 1998 Key terms 8 Principles 10.40am Break 11.00am Understanding the law The Privacy and Electronic Communications Regulation 2003 Key rules Key points 11.30am Practical tips for marketers 12.00am Summary and questions 12.30am Close
  • 3. Why is it important? • • • • It helps us to protect information about ourselves and others It helps us avoid damage to the reputation of our organisation It makes good business sense – it can increase efficiency and effectiveness It helps us avoid enforcement action by the Information Commissioner – both employers and employees can be prosecuted – companies can face a monetary penalty of up to £500,000 for major breaches
  • 4. Understanding the law 1 • Data Protection Act 1998 (DPA) – Came into force 1 March 2000 – Replaced 1984 Act – Covers doing anything with data – Applies electronic records and some manual records
  • 5. Key Terms • • Personal data – any data that can be used to identify a living individual – Examples of personal data can include: • Name and address • Email address (even business email addresses if they are non generic) • Name and telephone number • Photographs – Only personal data is protected by the DPA Sensitive personal data – any data relating to: • Health • Race or ethnic origin • Political opinions • Religious beliefs • Trade union membership • Sex life • Criminal proceedings or convictions
  • 6. Key terms • Processing – obtaining, recording or holding information or carrying out any operation on the information including • Organising • Adapting • Retrieving • Disclosing • Blocking • Destroying • Data subject – a living identifiable individual to whom the personal data relates
  • 7. Key Terms • Data controller - Determines how data will be used - Usually owns or rents the data (may be done by 3 rd party on their behalf) - Required to notify (register) as a controller with the ICO - May be fined by ICO if any data breaches arise • Data processor - Processes data on behalf of controller or other processor - Processing can be anything from data storage to advanced data manipulation and modelling - Includes companies that manage / broker / collect data on behalf of others
  • 8. The 8 Principles • • • • • • • Fairly and lawfully collected Processed for specified and limited purposes Adequate, relevant and not excessive Accurate and kept up to date Not kept for longer than necessary Processed in accordance with Individuals’ rights Security – appropriate technical and organisational measures • Not transferred outside the European Economic Area (EEA) unless adequate protections are in place • (EEA: The 28 member states of the EU, plus Iceland, Liechtenstein and Norway)
  • 9. Principle 1: Fairly and lawfully collected • Fair processing information provided • Organisation’s identity given • Purpose of collection made clear • Further information necessary • Correct permissions obtained - Implied consent: opt-out mechanism provided - Express consent: opt-in mechanism provided • Sensitive personal data only captured if strictly necessary
  • 10. Principle 2: Processed for limited purposes • Only process data for the purpose(s) you told the individual • Make the purpose(s) clear at the point of data collection • Change of circumstances – what happens to the data then? • Subsequent use of data for direct marketing purposes • Data cleansing – regular and ad hoc
  • 11. Principle 3: Adequate, relevant and not excessive • Minimum amount of information required • Additional information for specific individuals • Collect data that you will use now • Collection of data that ‘may be useful’ in the future is not permitted
  • 12. Principle 4: Accurate and kept up to date • Take reasonable steps to ensure accuracy (but what is ‘reasonable’?) • Ensure data is not incorrect or misleading • Undertake regular data cleansing • Clean data against the relevant preference service files and other appropriate cleansing files
  • 13. Principle 5: Not kept for longer than necessary • Keep for as long as purpose collected for • Suppression lists
  • 14. Principle 6: Processed in accordance with the rights of data subjects • Subject access requests • ‘Where did you get my data from?’ • Right to prevent direct marketing • Customer service / legally required communications – no opt-out provision required • Right to have inaccurate data corrected
  • 15. Principle 7: Technological and organisational security • Data security must be appropriate – take account of: – Current state of technological development – Cost of implementing security measures – Potential harm that could result from a data breach – Nature of data to be protected – non/sensitive? • Need for risk assessment and risk management techniques • Record your findings and assessments
  • 16. Principle 7: Technological and organisational security (continued) • Ensure adequate organisational data security measures • Prevent unauthorised as well as unlawful processing or disclosure of data • Security measures by data controller and data processor • Data processing and transfer agreements in place • Staff training • Data access on a ‘need to know’ basis – individual log-ins only • Secure disposal of data – internally/externally - keep records
  • 17. Principle 8: Processed within the EEA unless adequate protection in place • Data can be freely transferred within the EEA (providing data transfer agreements are in place) • Do not transfer data unless the country (destination and countries data is routed via) have an adequate level of data protection • Need to inform individuals before transferring their data outside the EEA but do not need their consent
  • 18. Understanding the law 2 • Privacy and Electronic Communications Regulations 2003 (PECR) – Came into force 11 December 2003 – Covers electronic communications – email, telephone, SMS
  • 19. Key rules • • • • Sender must not conceal their identity Communication must have valid address where opt-outs can be sent Opt-in required for individuals (B2C) Soft opt-in/existing customer exemption – available: – When you are collecting the address/mobile number in the sale or negotiations for the sale of a product or service; – You only send communications about similar products and services; – You provided an opportunity at time of collection to opt-out.
  • 20. Key points • Existing customer exemption: Not an excuse for unsolicited contact where correct permissions were never obtained • B2B – Opt-out and marketing message needs to directly relate to the work they do. • Subject headers in emails must be clear and accurate • Free and simple-to-use opt-out method must always be provided • Action unsubscribe requests promptly – add to internal suppression file • Maintain different flags for different types of communication – helps to avoid general opt-outs for all channels
  • 21. Practical tips for marketers • Data capture forms • Marketing permissions • Sourcing data • Regaining lost permission
  • 22. Data capture forms • Key information to include; – Why the data is being requested – What the data will be used for – Provision of an opt-in/out for marketing – Marketing channels to be used – Link to privacy policy • Key information to include in privacy policy – How the data subject can opt-out of marketing – If the data will be processed outside the EEA – How long the data will be kept for – How to make a subject access request – How to make a complaint regarding use of data
  • 23. Marketing permissions B2C B2B SMS Own marketing 3rd party marketing Own marketing opt-out (MPS opt-out screening) opt-out opt-out (TPS opt-out screening) opt-out opt-in (unless corporate opt-in/ soft optsubscriber in opt-in exemption) opt-in/ soft optin opt-in opt-in Fax opt-in Mail Telephone Email opt-in opt-out 3rd party marketing opt-out opt-out (TPS/ CTPS screening) opt-in (unless corporate subscriber exemption) opt-in opt-out (FPS screening)
  • 24. Sourcing data/ Due diligence • • • • • • Who compiled the list? When? Has it been amended or updated since? When was consent obtained? Who obtained consent and what was the context? Was it opt-in or opt-out? Was information provided clearly and intelligibly? How was it provided? Did it list organisations by name, by description, or any third party?
  • 25. Regaining lost permissions • • • • Why was permission lost: – Poor customer service? – Poor communications timing? – Inappropriate offers? – In-house technical issues – permissions not recorded on CRM system Revalidation exercise – obtaining up-to-date data Can very occasionally include request regarding marketing update in a service message providing it is a minor part of the message If you have only lost permission for certain channels, contact via another channel to update permissions
  • 26. Summary and questions? Switchboard: (020)7291 3300 Legal helpdesk: [email protected]