Best Practice Update

A hand taking some documents off of a large printer. The data protection education logo in blue going down from top to bottom to the right of the printer

The Perils of Paper: The Printing Vulnerability

While visiting organisations during our data walks we will have a conversation with you about how printers are used in your organisation, we will discuss access controls and have a look around the print area and any recycling facilities.  Printing can be expensive as the cost of paper and toner has risen, but it can also be costly to your cyber resilience and your data breach security.

Read more …

A mobile phone with lots of apps held in a hand.  The word fake in navy on an orange background.  Data Protection Education logo

Why Due Diligence is Important: Fake apps

We recommend completing due diligence on any third party suppliers that you share personal data with.  We recommend that you do this BEFORE purchasing, installing and using the product to share information.  Our Knowledge Bank platform has a Supplier Due Diligence Best Practice area to help with this and lists many suppliers that we have done some generic risk assessments on.  Ensuring due diligence is part of your procurement process for apps means that someone is less likely to

Read more …

  1. Product Focus on Checklists : CCTV
  2. Product Focus on Checklists : Clear desk
  3. Product Focus on Checklists : Commitment to compliance
  4. Product Focus on Checklists : Photos and video
  5. Product Focus on Checklists : Passwords
  6. Product Focus on Checklists : Information Classification
  7. Free cyber training for staff
  8. DfE Digital Standards Update
  9. The Mother of all Breaches
  10. International Data Transfers (part 1): Navigating Cross-Border Data Transfers: Understanding EU SCCs, UK Addendum, and UK IDTA
  11. ClassCharts Possible Data Breach
  12. Where is your data stored?
  13. IAPP looks at AI privacy risks
  14. If you suspect a financial scam .....
  15. School Focus: St Bernadette's Catholic Primary School | Brighton
  16. Guardians of Privacy: 16. Social Media Checklist
  17. Guardians of Privacy: 15. Navigating Social Media in Educational Settings Summary
  18. Guardians of Privacy: 14. Social Media and Cyber Bullying
  19. Guardians of Privacy: 13. Social Media, Copyright and Intellectual Property
  20. Guardians of Privacy: 12. Social Media and Going Viral
  21. Guardians of Privacy: 11. Staff Social Media Accounts
  22. Guardians of Privacy: 10. Social Media and Cookies
  23. Guardians of Privacy: 9. Social Media and Morality
  24. New Resources for Schools from the ICO
  25. Guardians of Privacy: 8. Social Media Policies
  26. Guardians of Privacy: 7. Social Media Data Retention
  27. Guardians of Privacy: 6. Posting Safely
  28. Guardians of Privacy: 5. Social Media and Consent
  29. Guardians of Privacy: 4. Social Media Access Control
  30. Guardians of Privacy: 3. Social Media Channels
  31. Guardians of Privacy: 2. Law and Regulations
  32. Guardians of Privacy: 1. Social media, privacy and children
  33. The ICO reprimands a Multi Academy Trust
  34. KCSIE: Filtering, Monitoring and Privacy
  35. Guidance for the use of school email and applying email retention in schools
  36. Data Protection Tips for Early Years Settings
  37. Children's Privacy around the world is a puzzle
  38. Trust Initial Plan Checklist Update
  39. Records Management Best Practice Update
  40. Governors and Data Best Practice Area Update
  41. What do I need to redact?
  42. Trust Initial Plan for Data Protection Compliance (for Multi Academy Trusts)
  43. Google for Education Resources: Helping IT Admins meet DfE digital and technology standards
  44. Lettings Best Practice and Guidance
  45. Considerations when migrating to a new MIS
  46. Public bodies and sensitive data
  47. Get a DPE Badge for your website!
  48. ICO: 10 Step guide to sharing information to safeguard children
  49. Help after a Cyber Attack/Incident
  50. Data Protection and Cyber Security (Inset Day) Training Ideas
  51. How KCSIE is linked to Cyber Strategy
  52. Handling Freedom of Information Requests the right way
  53. Where's Harry the Hacker?
  54. The ICO Reprimands a school
  55. Redaction Guidelines Updated
  56. Using WhatsApp in Schools
  57. How to contact us for support, subject access requests, data breaches and FOI's
  58. FOI: Reinforced Autoclaved Aerated Concrete
  59. FOI: Henry Jackson Society
  60. FOI: Vaccination Justifications
  61. How the Record of Processing Can Help You
  62. What does a Data Protection Officer Do?
  63. Carrying out Supplier Due Diligence
  64. How Long Should You Keep Personal Data For?
  65. B&H FoI: Racist/religious incidents/bullying
  66. Protocol for Setting Up and Delivery of Online Teaching and Learning
  67. Class Dojo International Data Sharing
  68. Model Publication Scheme: Amendments, Improvements and Updates
  69. Transparency
  70. Parents and students covertly recording conversations
  71. SAR? ER? FOI?
  72. Research projects and GDPR
  73. Secure file transfer of files using Royal Mail
  74. Emergency contacts and consent
  75. Key elements of a successful DPIA
  76. FOI Publication Schemes
  77. Best Practice for Managing Photos and Video
  78. New Drip Feeds: Recognise and Respond to Subject Access Request
  79. When to contact the Data Protection Officer?
  80. National child measurement programme
  81. Make sure DPE is your registered DPO with the ICO
  82. Headteacher fined for breach of data protection legislation
  83. Acceptable Use Policy

Search