Data Protection Act
DPA is a national law that sits alongside the GDPR, and customises how GDPR applies in the UK. This is by providing exemptions, widening the scope to involve law enforcement, national security and defence.
DPA is a national law that sits alongside the GDPR, and customises how GDPR applies in the UK. This is by providing exemptions, widening the scope to involve law enforcement, national security and defence.
The DPA (Data Protection Act) 2018 achieved formal approval on 23.05.2018. DPA 2018 includes GDPR and additional scope where EU member states are allowed to make provisions for it's local applicability.
DPA 2018 and GDPR have some key differences such as wide scope, DPA 2018 adds IP addresses, DNA and internet cookies in the personal data definition, including criminal sanctions and fines for GDPR infringements. Another change from GDPR includes the exemption from personal data protection in case of data being used in the public interest publication.
ICO is the local authority for UK's DPA and GDPR provisions.
"The previous Data Protection Act, passed a generation ago, failed to account for today’s internet and digital technologies, social media and big data. The new Act updates data protection laws in the UK…[and]… provides tools and strengthens rights to allow people to take back control of their personal data.” ICO Commissioner
As per the original source ICO - The DPA 2018 sets out the data protection framework in the UK, alongside the GDPR. It contains four separate data protection regimes:
Apart from general GDPR that's already out there, applied GDPR refers to modified version of GDPR in reference to Part 2 Chapter 3 of DPA 2018. Basically the 'applied GDPR' is meant to catch any processing due to the gaps where EU laws aren't applicable.
The following service offerings are in line with DPA/GDPR technical readiness and compliance. For detailed read on each of the areas, please visit the assessment section here.
Supporting your staff to help them manage their data securely, including devices, technologies they use. Read more on our training service here.
You need to ensure the systems processing the personal data are monitored for user activity including anamolous user activity.
Technical assessments around secure configuration, encryption, software vulnerabilities, common application security vulnerabilities such as OWASP Top 10
Technical controls to prevent unathorised or unlawful processing of personal data through the unauthorised access or use of user devices/storage media, backups, interception of data.
Technical Risk Assessments include secure configuration reviews, vulnerability scans and penetration testing. A good penetration should assess GDPR related aspects such as identity & access controls as part of active directory environment, password policy reviews, patching, information in transit & storage mechanisms and measures in place.
Adhere to technical controls as laid out in appropriate frameworks such as Cyber Essentials. Defendza are a certifying body who can assess, validate and certify organisations based on the controls in scope for CE (Cyber Essentials) and CE Plus assessments
This is basically a quick exercise to help you identify and reduce the data protection risks of your processing activities.