Best Practice Update

Data breach in orange text on a computer screen with computer data behind it

The Mother of all Breaches

Security researchers and computing blogs are reporting 'the mother of all breaches' in reference to a data breach where billions of records have been breached.  The dataset doesn't come from one single breach but a compilation of multiple data breaches.  

Read more …

International Data Transfers (part 1):  Navigating Cross-Border Data Transfers: Understanding EU SCCs, UK Addendum, and UK IDTA

International Data Transfers (part 1): Navigating Cross-Border Data Transfers: Understanding EU SCCs, UK Addendum, and UK IDTA

The first in a seriers on International Data Transfers..
Navigating Cross-Border Data Transfers: Understanding EU SCCs, UK Addendum, and UK IDTA

In the ever-evolving landscape of global data protection, we are continually challenged to ensure the secure and lawful transfer of personal data across borders. The European Union (EU) has long been a frontrunner in establishing data protection standards, and its regulations have far-reaching implication

Read more …

Data breach in orange text in computing font on a computer screen with computer code in blue text

ClassCharts Possible Data Breach

A number of schools have reported a data breach by ClassCharts this week.  ClassCharts is school management software that allows teachers to create a customisable classroom seating chart.  It can also be used to track student behaviour, reading levels and other student data.

Read more …

Robot wearing an orange hoodie holding a piece of paper with the words Data Protection education is transparent text

IAPP looks at AI privacy risks

This week the IAPP published a set of AI privacy risks in the wake of concerns over how AI should be regulated.  There are moves to regulate AI, such as the EU AI Act, however  because AI remains quite an unknown quantity, there is a lot of unease and uncertainty around it's use, ethics, privacy and intellectual property.

Read more …

hand holding a mobile phone with social media icons on it. Litus Digital logo and Data Protection Education logo. Guardians of Privacy: Navigating social media in educational settings in blue text.  A series of articles about social media, privacy and schools in black text.  Coloured pencils at the bottom

Guardians of Privacy: 16. Social Media Checklist

This article is one of a series written by Data Protection Education in collaboration with Litus Digital, a social media management company.  The articles came about from questions asked by Data Protection Education's customers, our own experience of working in education,  as school governors, parents and data protection professionals.  The articles raise questions about how social media can be used as safely as possible in a school environment,  security consideratio

Read more …

hand holding a mobile phone with social media icons on it. Litus Digital logo and Data Protection Education logo. Guardians of Privacy: Navigating social media in educational settings in blue text.  A series of articles about social media, privacy and schools in black text.  Coloured pencils at the bottom

Guardians of Privacy: 15. Navigating Social Media in Educational Settings Summary

This article is one of a series written by Data Protection Education in collaboration with Litus Digital, a social media management company.  The articles came about from questions asked by Data Protection Education's customers, our own experience of working in education,  as school governors, parents and data protection professionals.  The articles raise questions about how social media can be used as safely as possible in a school environment,  security consideratio

Read more …

hand holding a mobile phone with social media icons on it. Litus Digital logo and Data Protection Education logo. Guardians of Privacy: Navigating social media in educational settings in blue text.  A series of articles about social media, privacy and schools in black text.  Coloured pencils at the bottom

Guardians of Privacy: 14. Social Media and Cyber Bullying

This article is one of a series written by Data Protection Education in collaboration with Litus Digital, a social media management company.  The articles came about from questions asked by Data Protection Education's customers, our own experience of working in education,  as school governors, parents and data protection professionals.  The articles raise questions about how social media can be used as safely as possible in a school environment,  security consideratio

Read more …

hand holding a mobile phone with social media icons on it. Litus Digital logo and Data Protection Education logo. Guardians of Privacy: Navigating social media in educational settings in blue text.  A series of articles about social media, privacy and schools in black text.  Coloured pencils at the bottom

Guardians of Privacy: 13. Social Media, Copyright and Intellectual Property

This article is one of a series written by Data Protection Education in collaboration with Litus Digital, a social media management company.  The articles came about from questions asked by Data Protection Education's customers, our own experience of working in education,  as school governors, parents and data protection professionals.  The articles raise questions about how social media can be used as safely as possible in a school environment,  security consideratio

Read more …

hand holding a mobile phone with social media icons on it. Litus Digital logo and Data Protection Education logo. Guardians of Privacy: Navigating social media in educational settings in blue text.  A series of articles about social media, privacy and schools in black text.  Coloured pencils at the bottom

Guardians of Privacy: 12. Social Media and Going Viral

This article is one of a series written by Data Protection Education in collaboration with Litus Digital, a social media management company.  The articles came about from questions asked by Data Protection Education's customers, our own experience of working in education,  as school governors, parents and data protection professionals.  The articles raise questions about how social media can be used as safely as possible in a school environment,  security consideratio

Read more …

  1. Guardians of Privacy: 11. Staff Social Media Accounts
  2. Guardians of Privacy: 10. Social Media and Cookies
  3. Guardians of Privacy: 9. Social Media and Morality
  4. New Resources for Schools from the ICO
  5. Guardians of Privacy: 8. Social Media Policies
  6. Guardians of Privacy: 7. Social Media Data Retention
  7. Guardians of Privacy: 6. Posting Safely
  8. Guardians of Privacy: 5. Social Media and Consent
  9. Guardians of Privacy: 4. Social Media Access Control
  10. Guardians of Privacy: 3. Social Media Channels
  11. Guardians of Privacy: 2. Law and Regulations
  12. Guardians of Privacy: 1. Social media, privacy and children
  13. The ICO reprimands a Multi Academy Trust
  14. KCSIE: Filtering, Monitoring and Privacy
  15. Guidance for the use of school email and applying email retention in schools
  16. Data Protection Tips for Early Years Settings
  17. Children's Privacy around the world is a puzzle
  18. Trust Initial Plan Checklist Update
  19. Records Management Best Practice Update
  20. Governors and Data Best Practice Area Update
  21. What do I need to redact?
  22. Trust Initial Plan for Data Protection Compliance (for Multi Academy Trusts)
  23. Google for Education Resources: Helping IT Admins meet DfE digital and technology standards
  24. Lettings Best Practice and Guidance
  25. Considerations when migrating to a new MIS
  26. Public bodies and sensitive data
  27. Get a DPE Badge for your website!
  28. ICO: 10 Step guide to sharing information to safeguard children
  29. Help after a Cyber Attack/Incident
  30. Data Protection and Cyber Security (Inset Day) Training Ideas
  31. How KCSIE is linked to Cyber Strategy
  32. Handling Freedom of Information Requests the right way
  33. Where's Harry the Hacker?
  34. The ICO Reprimands a school
  35. Redaction Guidelines Updated
  36. Using WhatsApp in Schools
  37. How to contact us for support, subject access requests, data breaches and FOI's
  38. FOI: Reinforced Autoclaved Aerated Concrete
  39. FOI: Henry Jackson Society
  40. FOI: Vaccination Justifications
  41. How the Record of Processing Can Help You
  42. What does a Data Protection Officer Do?
  43. Carrying out Supplier Due Diligence
  44. How Long Should You Keep Personal Data For?
  45. B&H FoI: Racist/religious incidents/bullying
  46. Protocol for Setting Up and Delivery of Online Teaching and Learning
  47. Class Dojo International Data Sharing
  48. Model Publication Scheme: Amendments, Improvements and Updates
  49. Transparency
  50. SAR? ER? FOI?
  51. Research projects and GDPR
  52. Secure file transfer of files using Royal Mail
  53. Emergency contacts and consent
  54. Key elements of a successful DPIA
  55. FOI Publication Schemes
  56. Best Practice for Managing Photos and Video
  57. New Drip Feeds: Recognise and Respond to Subject Access Request
  58. When to contact the Data Protection Officer?
  59. National child measurement programme
  60. Make sure DPE is your registered DPO with the ICO
  61. Headteacher fined for breach of data protection legislation
  62. Acceptable Use Policy

Search