3_Data_Security_Policy
3_Data_Security_Policy
POLICY
1
How should I use my data security policy document?
Your data security policy is a crucial document that you should use to outline and guide your
company’s strategy for promoting GDPR compliant data security measures. Your data security
policy should be discussed, shared with, and made accessible for everyone in your company.
You should fill in your company’s particulars, as outlined in the below template.
Yes. Your data security policy is a crucial tool to maintain ongoing GDPR compliance. We
recommend you review this policy document every three months to ensure all security
protocols and processes are compliant. Any updates must be clearly communicated to all
company stakeholders and staff members.
2
Introduction
Here at [COMPANY NAME], we collect, process and store personal data for a range of business
purposes. Data subjects include customers, suppliers, partners, employees, clients and other
stakeholders and individuals.
Bearing in mind [COMPANY NAME]’s commitment to uphold the rights of the individual as
enshrined in law, our data security policy is designed to protect all past, current and future
employees, customers, or partners, from illegal or damaging activity conducted by others using
their personal data.
Our data security policy outlines how [COMPANY NAME] will endeavour to guard and protect
all personal data. It also sets out to raise the awareness of staff members in relation to the
ways in which GDPR impacts their use of individual’s personal data.
This policy applies to all data processing activities involving [COMPANY NAME], and includes
activities or systems related to both internal business operations, as well as external relations
and any third-party agreements.
Please note that [COMPANY NAME]’s data security policy applies to all employees, and this
policy may be subject to review and amendment on a regular basis. For more information
about this policy and its overall implementation, consult our Data Protection Officer.
3
Data security policy definitions
Personal data
Personal data encompasses any type of information that relates to an identifiable individual.
Various types of personal data {COMPANY NAME] may collect, store and process could include:
Contact details
Financial information
Educational background
Certifications
Skills
Nationality
Marital status
Job title
The above list is by no means exhaustive, and should be used merely as a point of reference
from which a working definition of personal data can be established and further developed.
Under GDPR, sensitive personal data is defined as encompassing any of the following:
It is paramount that all sensitive personal data is kept under stringent control as part of the
implementation of our data security policy.
[COMPANY NAME] uses personal data for a range of various purposes. These purposes may
include:
Financial
Administrative
Human resources
Regulatory compliance
Payroll
4
Business development
Please note the above list is by no means exhaustive, and should merely be used as a reference
point from which a working definition of purpose can be established.
Business purposes
[COMPANY NAME] must carry out a range of functions and processes as part of our operational
activity. Data kept in relation to these activities falls under the category of data for business
purposes, which includes information of the following nature:
Operational
Compliance
Policy adherence
Human resources and personnel
Marketing
The above list is by no means exhaustive, and should be used merely as a point of reference
from which a working definition of business purposes can be established and further
developed.
5
Fair processing
At [COMPANY NAME], there will be occasions when employees will need to process personal
data; however, processing activities must always be carried out in a fair and lawful manner that
is compatible with the rights of each corresponding individual. Consequently, we should avoid
processing the personal data of any individual who has not provided us with explicit consent.
Our company must strive to obtain explicit consent at all costs, and we must clearly identify to
the individual what data is being processed, why we need to use it and who will have access to
their data. These factors must be identified and clearly reiterated to the individual at the point
of request for consent.
It’s worth noting there may be exceptional circumstances in which we are asked to process
sensitive personal data without consent. An example of an exceptional circumstance could
include legal obligations we may need to carry out to comply with health and safety
regulations.
[COMPANY NAME] endeavours to take all actions necessary to ensure that all personal data we
obtain, process and store is accurate, relevant and adequate in relation to the reason in which
we asked for that information. We should not hold excessive or irrelevant data on any
individuals, and we will not process any personal data for a purpose unrelated to the purpose
in which the relevant individual has consented to the processing of their data.
6
Our roles and responsibilities
Data security is a critical component of our business. It falls on everyone at [COMPANY NAME]
to take responsibility for data security, and all employees must familiarise themselves with our
data security policy and do everything within their power to uphold that policy on a day-to-day
basis.
Please note that [COMPANY NAME] takes data protection incredibly seriously, and we expect
all staff members to adhere to this data security policy. Any failure and refusal to comply with
this policy could ultimately place our company at risk.
Bearing that in mind, personal non-compliance with this data security policy could lead to
disciplinary action as they relate to ordinary personnel procedures. Please contact your line
manager with any further questions concerning data protection at [COMPANY NAME].
As a staff member at [COMPANY NAME], you can expect to receive data protection training in
line with our data security policy. All incoming employees will be provided training as an aspect
of the wider staff induction process, and all staff members can anticipate the requirement to
undergo additional training as a result of subsequent regulatory updates to GDPR or other
relevant legislation as it relates to data security.
Data security will inevitably encompass a range of additional responsibilities for various roles
within the company. These roles and their responsibilities include (but are not limited to):
GDPR stipulates our company must appoint a Data Protection Officer. It is our Data Protection
Officer’s responsibility to:
Organise data security training for all employees not specifically referenced within this
data security policy.
Review and analyse all existing data security protocols and processes on a regular
basis.
Be a point of contact for all employees, clients and stakeholders to answer questions
about data protection and data security.
Respond to internal or external queries from individuals wanting to know what data
relating to them may have been obtained, processed or stored by our company.
Conduct due diligence and submit approval in relation to any contractual agreement
with a third party involving the processing or storage of data.
Maintain constant contact with company directors, board members and stakeholders
in relation to data security, company responsibilities and data risk management.
7
IT Manager
Information technology plays a crucial role in the way our company operates. Any processes
relating to IT and the processing and storage of data must be carefully monitored, assessed and
guided by an IT Manager.
Marketing Manager
A significant proportion of our marketing activities involve the collection, storage and
processing of data. Consequently, our Marketing Manager must oversee the following
responsibilities:
Accept all queries relating to data security and data protection from leads, media
outlets, clients or other individuals and oversee and deliver an adequate response.
Work alongside [COMPANY NAME]’s Data Protection Officer to make sure that all of
our marketing processes, campaigns and activities are compliant with all relevant data
security and data protection laws – as well as our own company data security policy.
Review, draft and approve any relevant data security statements that must accompany
emails, other messages or applicable marketing collateral.
8
Our data security policies
[COMPANY NAME] takes data security extremely seriously, and we place the rights of the
individual and regulatory adherence at the heart of everything we do as a company.
In light of our commitments, it is mandatory all staff members must observe and adhere to the
following data security policies:
9
regular public access must be obtained and recorded.
Employees must use access tools provided to them by a client or partner of [COMPANY
NAME] if access is granted to any third-party storage system or data storage facility.
It is forbidden to send, forward or submit any of the information or data referred to
within this data security policy to a third-party unless deemed essential to complete
approved processes.
If an employee needs to carry out an approved submission of data to any relevant
third-party, that data must be made secure in accordance with company policy and any
relevant third-party data protection protocols.
Please note that [COMPANY NAME] will carry out regular system audits to monitor and ensure
ongoing compliance with this data security policy and all regulatory requirements as outlined
under GDPR.
The necessary length of retention will often be decided on a case-for-case basis, bearing in
mind the rationale and original purpose surrounding data collection and retention. Decisions of
this nature must be made in a way that is compatible with our existing data retention
guidelines under GDPR.
10
International data transfer policy
Employees must observe a series of restrictions that apply towards the international transfer of
data or personal information. Employees are not permitted to transfer personal information or
data outside of the United Kingdom without having obtained explicit permission in the first
instance from the company’s Data Protection Officer.
We also use the anonymisation of personal data wherever deemed prudent to ensure the
rights of the individual are fully protected and observed.
In line with these principles, we are committed to the use both encryption and anonymisation
as a risk management tool alongside existing systems, to protect the company from accidental
loss, as well as from the damage or destruction of data or personal information.
11
Activities that are prohibited
Unless otherwise noted or informed, employees are strictly forbidden from using company
equipment, tools or systems for any purpose unrelated to their role responsibilities, excluding
any previously mentioned exceptions. This policy also relates to any relevant systems, tools or
equipment belonging to a company client or partner.
Bearing that in mind, the following activities should be deemed forbidden with no exceptions:
Please note that any violation of this policy can lead to disciplinary action, alongside legal
action where deemed prudent or necessary.
12
Reporting security issues
If you encounter any incidents or issues relating to the security or protection of information or
data, you must report this immediately to company management. Management will
subsequently take and record any action deemed necessary to prevent damage or loss in
relation to a security threat.
If necessary, it is the responsibility of company management to report relevant incidents
relating to a data breach or information security threat to regulators or the authorities. Under
GDPR, it also falls upon management to contact the individuals involved in any breach or
security threat.
13