Your beginner’s guide to data protection (2024)

Latest updates - last updated 7 August 2023

7 August 2023 - We've updated this guidance to reflect the ICO's must, should, could terminology and provide regulatory certainty. We've also changed the title in line with our new approach.

This handy guide to data protection covers some of the key points you need to know and think about when getting started. It directs you to the resources and assistance we provide to support you in using personal information confidently and securely to help your business thrive.

To help you understand what the law says and what we expect, this guidance tells you what organisations must, should, and could do to comply.

Where we say must, this means you’re required to do this by law.

Should doesn’t refer to a legal requirement. But it’s what we expect you to do, unless there’s a good reason not to. If you choose to take a different approach, you must be able to demonstrate this also complies with the law.

Could refers to an option or example you could consider to help you comply with the law effectively.


Any personal information your business holds needs to be used fairly and securely in line with data protection laws. This information could be names, addresses, emails, telephone numbers, and bank or credit card details. It can also include more sensitive information, such as people’s health data or their criminal records.

Keeping personal information secure, and using it responsibly, protects your reputation and helps prevent potential harm or distress to people. Good information management also helps maintain your customers’ trust, which makes good business sense.

There’s no one-size-fits-all when it comes to data protection. Your business is unique and you know it best. This guide will help you decide what to do with the personal information you hold.

Step one: Make a list

You’ll probably have personal informationsaved on your phone, tablet or computer to enable you to do your job – such as the names and contact details of customers, members or clients.

Start off by making a list of what personal information you have, or plan to collect, even if you don’t have much at first. For this list, you should be generalising types of information such as ‘phone numbers of customers’, rather than listing actual phone numbers.

Data protection laws don’t apply when you’re using personal information for purely personal or household activities, so you can ignore things like your family photo album and personal holiday planning calendar.

Step two: Ask yourself ‘why do I need this information?’

Think carefully about your reasons for having personal information. You must only collect what you actually need, and shouldn’t ask for or keep anything ‘just in case’.

If you’re holding or using people’s information, it must always be fair as well as lawful. This means you should only use their data in ways they’d reasonably expect. For example, if you have a customer's telephone number to arrange a delivery, it wouldn't be fair to use that number to call them for personal reasons - they wouldn't expect you to do that.

You also need a valid reason, known as a ‘lawful basis’. There are six types of lawful basis you can use. Use ourlawful basis checkerto find out which you can rely on, and keep a record of your decision.

Step three: Think security

People care about their information and you must take steps to protect it. Check yoursecurity measuresline up with the sensitivity of the personal information you hold. You must put stronger measures in place if the information is sensitive or poses ahigher risk for the person it relates to. For example, financial information that could be used for fraudulent purposes.

It’s up to you to decide which measures are appropriate for your business, but this could include things like locking filing cabinets and putting strong passwords on your devices.

Step four: Be transparent

You must tell people why you need their data, who you’ll share it with and how long you’ll keep it for.

For example, as an estate agent, you may share the seller’s information with the purchaser’s solicitor so necessary documents can be completed. You must tell people you’re going to do this.

Having a privacy notice is a great way to be transparent. Use our privacy notice generator to create a bespoke privacy notice for your organisation in under 15 minutes. You must review your privacy information regularly and keep it up to date.

Step five: Respond to people’s data protection rights

People have rights in relation to their information. For example, they can ask you to delete it, challenge the accuracy of it and object to what you’re doing with it. People can also ask you to provide a copy of their personal information – known as a subject access request (SAR).

Putting a process in place for handling individual rights requests can save you time in the long run. It’s worth doing this, even if you’ve never received a request before. Take a look at our step-by-step guide on how to deal with a request for information.

Step six: Know how to handle personal data breaches

If any personal information you’re responsible for is lost, accidentally destroyed, altered without proper permission, damaged or disclosed to someone it shouldn’t have been, this could be a personal data breach. This could be as a result of a cyber-attack, flood, fire or theft.

Where this happens, you’ll need to act quickly and you may need to report it to us within 72 hours.

It makes good business sense to put an action plan in place sooner rather than later. We’re here to help. We have guidance on how to respond to a personal data breach and understanding and assessing risk in personal data breaches to help you.

Step seven: Check if you need to register with us

Many small businesses must register with us and pay a data protection fee. For most businesses, the fee is £40 per year. You can check whether you need to register by using our self-assessment tool.

Step eight: Set some reminders

Data protection compliance is a journey, and we’re here to help as your business grows. We regularly update our website to help you improve your data protection compliance. Setting regular reminders to check our news and guidance pages will help keep you on track.

Also see:

  • How to write a privacy notice and what goes in it
Your beginner’s guide to data protection (2024)

FAQs

What are the 7 golden rules of data protection? ›

Necessary, proportionate, relevant, accurate, timely and secure. Check these key words. Is it the right information for the purpose?

What are the 7 principles of data protection? ›

At a glance
  • Lawfulness, fairness and transparency.
  • Purpose limitation.
  • Data minimisation.
  • Accuracy.
  • Storage limitation.
  • Integrity and confidentiality (security)
  • Accountability.
May 19, 2023

What are the 8 rules of data protection? ›

Lawfulness, fairness, and transparency; ▪ Purpose limitation; ▪ Data minimisation; ▪ Accuracy; ▪ Storage limitation; ▪ Integrity and confidentiality; and ▪ Accountability. These principles are found right at the outset of the GDPR, and inform and permeate all other provisions of that legislation.

What are the 4 key areas of data protection? ›

Accuracy. Storage limitation. Integrity and confidentiality (security) Accountability.

What are the 7 golden rules of data? ›

Necessary, proportionate, relevant, adequate, accurate, timely and secure: Ensure that information you share is necessary for the purpose for which you Page 2 are sharing it, is shared only with those individuals who need to have it, is accurate and up-to-date, is shared in a timely fashion, and is shared securely (see ...

What are the 3 main acts of data protection? ›

Lawfulness, fairness, and transparency: Any processing of personal data should be lawful and fair. It should be transparent to individuals that personal data concerning them are collected, used, consulted, or otherwise processed and to what extent the personal data are or will be processed.

What is the golden rule of data privacy? ›

The golden rule of data handling and privacy revolves around the fundamental principle: treat data as you would like your own information to be treated.

What is prohibited by data protection law? ›

In general, personal information should be lawfully obtained (usually through freely given consent) for a specific purpose, and not be used for unauthorized surveillance or profiling by governments or third parties or used for unconnected purposes without consent (unless otherwise required under the law).

What are the 5 rules of working with data? ›

The five data privacy rules
  • Consent. Before disclosing any data, check if the proper consent is in place to do so. ...
  • Purpose. Before collecting any data from an individual, make sure you need it. ...
  • Security and access. ...
  • Disclosure and accountability. ...
  • Destruction and disposal.
Aug 26, 2019

Who are the 3 main players in data protection? ›

In this article, we will therefore try to describe the different roles and responsibilities that this important regulation outlines:
  • Data Subject. ...
  • Controller. ...
  • Data Processors. ...
  • Data Protection Officer.
Feb 19, 2024

What are the three pillars of data protection? ›

One framework that serves as a foundation for information security is the CIA Triad, consisting of three pillars: confidentiality, integrity, and availability. Let's delve into each pillar to understand its significance and how they collectively contribute to maintaining a secure environment for data.

What is the most efficient data protection method? ›

Encryption

Encryption is a fundamental component for protecting personal data. It involves converting sensitive information into a coded form, making it unreadable to anyone without the proper decryption key. Only the authorized user, who possesses the decryption key, is able to decode and view the information.

What is the golden rule 7? ›

Golden rule 7: What you do online has repercussions

When online, treat others as you would in person. Ensure that the language and tone of all communications are appropriate.

What are the 3 basic golden rules? ›

1) Debit what comes in - credit what goes out. 2) Credit the giver and Debit the Receiver. 3) Credit all income and debit all expenses.

What are the 8 rights of data protection? ›

The GDPR has a chapter on the rights of data subjects (individuals) which includes the right of access, the right to rectification, the right to erasure, the right to restrict processing, the right to data portability, the right to object and the right not to be subject to a decision based solely on automated ...

Which are the golden rules of information security? ›

Protect your workspace and your data.

Lock your computer when you're away from your desk and keep all sensitive material (storage device) in a safe place. Be aware of your digital identity by taking care of your personal data online (Internet and social networks).

Top Articles
Dynamic Routing (FRR) — OPNsense documentation
Most funded Kickstarter projects 2024 | Statista
Creepshotorg
South Park Season 26 Kisscartoon
Get train & bus departures - Android
P2P4U Net Soccer
Tv Schedule Today No Cable
10 Great Things You Might Know Troy McClure From | Topless Robot
Craigslist Pets Southern Md
Flights To Frankfort Kentucky
Red Tomatoes Farmers Market Menu
Shreveport Active 911
Grasons Estate Sales Tucson
Samantha Lyne Wikipedia
Aucklanders brace for gales, hail, cold temperatures, possible blackouts; snow falls in Chch
Robert Deshawn Swonger Net Worth
Https Paperlesspay Talx Com Boydgaming
Conan Exiles Sorcery Guide – How To Learn, Cast & Unlock Spells
Purdue 247 Football
What Is The Lineup For Nascar Race Today
Surplus property Definition: 397 Samples | Law Insider
Piri Leaked
Suspiciouswetspot
Divina Rapsing
Free T33N Leaks
Warn Notice Va
Kristen Hanby Sister Name
Smayperu
Junee Warehouse | Imamother
Srg Senior Living Yardi Elearning Login
Laff Tv Passport
Daly City Building Division
Puretalkusa.com/Amac
18 terrible things that happened on Friday the 13th
SF bay area cars & trucks "chevrolet 50" - craigslist
Low Tide In Twilight Manga Chapter 53
Courses In Touch
Free Crossword Puzzles | BestCrosswords.com
What to Do at The 2024 Charlotte International Arts Festival | Queen City Nerve
Breaking down the Stafford trade
Sandra Sancc
Headlining Hip Hopper Crossword Clue
Identogo Manahawkin
6463896344
17 of the best things to do in Bozeman, Montana
Diamond Desires Nyc
Charlotte North Carolina Craigslist Pets
Noaa Duluth Mn
Texas Lottery Daily 4 Winning Numbers
Latest Posts
Article information

Author: Reed Wilderman

Last Updated:

Views: 6770

Rating: 4.1 / 5 (52 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Reed Wilderman

Birthday: 1992-06-14

Address: 998 Estell Village, Lake Oscarberg, SD 48713-6877

Phone: +21813267449721

Job: Technology Engineer

Hobby: Swimming, Do it yourself, Beekeeping, Lapidary, Cosplaying, Hiking, Graffiti

Introduction: My name is Reed Wilderman, I am a faithful, bright, lucky, adventurous, lively, rich, vast person who loves writing and wants to share my knowledge and understanding with you.