union jack flag next to big ben with the data protection logo as a watermark

The Changes to Data Protection in the UK

On July 18, 2022, the U.K. government introduced the Data Protection and Digital Information Bill to Parliament. Previously known as the Data Reform Bill, it is the result of a consultation from 2021 and its aim is to update and simplify the U.K.’s data protection framework. According to the U.K. government, the new legal framework created by the DPDI Bill will reduce burdens on organizations while maintaining high data protection standards.

Read more …

Types of malware and how they are linked to data protection

Types of malware and how they are linked to data protection

Malware is malicious software designed to harm computer systems and is linked to data protection in several ways.

Malware can be used to steal or compromise sensitive data stored on a computer system or network. This data could include personal information, financial data, or confidential business information. In this sense, malware poses a significant threat to data protection, as it can lead to data breaches and other security incidents.

Malware can

Read more …

Striking Data Breach

Striking Data Breach

The headteacher of a grammar school has left her role after sending parents a list of the teachers going on strike.

The Headteacher at King Edward VI Five Ways Grammar school in Birmingham  had been headmistress for just 18 months when an email she sent to parents is alleged to have named some teachers who would be striking during the planned walkouts last month.

Read more …

Windows Server 2012 & 2012 R2 Retirement

Windows Server 2012 & 2012 R2 Retirement

This article is a reminder that Microsoft will stop support for both Windows Server 2012 and Windows Server 2012 R2 after October 10th 2023.  Keeping software up to date on devices is best practice to help prevent cyber attacks and data breaches.

Read more …

How to contact us for support, subject access requests, data breaches and FOI's

How to contact us for support, subject access requests, data breaches and FOI's

This article lists the ways that Data Protection Education can be contacted for general data protection queries, data breaches, subject access requests and freedom of information requests.

While all our customers have a dedicated consultant who can be contact directly, if there is an urgent issue we would always advise emailing This email address is being protected from spambots. You need JavaScript enabled to view it..

When you email This email address is being protected from

Read more …

How a school fought back after a cyberattack

How a school fought back after a cyberattack

The following article talks about how a school thwarted a cyber attack, more through luck than judgement.  Our advice is for the whole organisation to be cyber aware and review how your organisation might respond when attacked.    The article gives ideas on how to begin making a cyber ready plan.

In October 2020 Kellett School was subject to a ransomware denial-of-service (DoS) attack orchestrated by a Russian criminal hacker group.  After the attack, a post m

Read more …

Types of Cyber Attacks - Credential Stuffing

Types of Cyber Attacks - Credential Stuffing

This article is linked to a series of articles about different types of Cyber Attacks. They can be viewed in the Information/Cyber Security News section of the Data Protection Education website or as part of the Information & Cyber Security Best Practice Area. Each article discusses a different type of cyber attack, steps to try to minimise the risk and guidance

Read more …

End of Windows 8.1 Support

End of Windows 8.1 Support

Given the current financial pressure on schools it is very likely there are devices in schools running out of date software.  This article looks at the most recent version of Windows that support has ended for, what that means and why upgrades are a must. 

Read more …

Assigning courses to staff using to-dos

Assigning courses to staff using to-dos

To assign courses to your staff, we should use the to-do functionality via the Course Assignment and Progress Report.

When we assign a to-do via this report, and the user completes the course, the to-do will be automatically marked as complete in the to-do list. 

Read more …

How the Record of Processing Can Help You

How the Record of Processing Can Help You

The Record of Processing can often seem like a daunting process to undertake- but it’s important to view it as exactly that- a process. Documenting the processes your organisation carries out is an ongoing project that you continue to evolve and develop as those processes change. The value you can get out of spending some time and care by completing various ones shouldn’t be underestimated. We’ve spoken to some of the people who have used the RoP tool on the Knowledge Bank, and asked th

Read more …

Information Security Basics: What are VPN's?

Information Security Basics: What are VPN's?

VPN’s have become commonplace over the past couple of years, with every content creator out there having at some point been sponsored by Nord VPN (other VPN providers are available). VPN's are mostly used so that we can watch content on streaming platforms that would otherwise be blocked in the UK. However, as well as allowing you to watch Pulp Fiction on Canadian Netflix, VPN’s have excellent security benefits that can help prevent data breaches and cyber attacks. 

Read more …

Data Protection education logo, hands on a laptop on a desk with glasses

What does a Data Protection Officer Do?

Under UK GDPR, Public Authorities or Bodies, as well as businesses carrying out certain processes are required to appoint a Data Protection Officer (DPO). This article will explain why you need a DPO and what a DPO does for your organisation.

Read more …

the words data breach in navy, outline of computer, coffee cup and book, outline of books, harry the hacker looking in a filing cabinet, and hacking into a computer

Are you ready for a Data Breach?

Recently there has been an annual study published by Ponemon Institute (sponsored by Experian) entitled “Is Your Company Ready for a Big Data Breach?”. The study looks at the state of breach preparedness across organisations over a period of a year,

Read more …

c

Carrying out Supplier Due Diligence

At Data Protection Education, we are carrying out an ongoing project on assessing potential organisations that our schools are either currently contracted with to supply a product or service, or may in the future be in contract with.

Read more …

white envelope on a pink key on a white keyboard

Email and retention periods

Email is the classic data protection issue - it's not about the system where we store things, it's about the process and how that data is used. So ask yourself, what is the content of the email and what does it relate to?

Read more …

The words records management in blue text, harry the hacker looking in a filing cabinet and standing next to a shelf of folders

How Long Should You Keep Personal Data For?

For most organisations, a lot of thought and care goes into ensuring that when you’re collecting data, you are complying with the relevant data protection legislation- that it’s being collected with consent where required, that you have a lawful basis etc. However,

Read more …

Cyber attacks in navy text with Data Protection Education log, harry the hacker looking at computer screens and phishing (fishing) a laptop

How to Assess your Data Security

Cyber attacks are on the up, and with the education sector seeing the highest number of cyber attacks of any sector since the start of the pandemic, as well as the highest increase in attacks in that same period

Read more …

Nativity scene in glitter (child like) on a yellow back ground

Sharing this year’s Nativity play online

How to share this year’s Nativity play online safety

Schools will have good intentions in wanting to share this year’s Nativity play online. But how do you ensure you do this safely and adhere to the latest data protection regulations? Below is some guidance which will support you in this task.

Read more …

The Children's Code

The Children's Code

The Children’s Code

The first update from the ICO is that the transition year for the introduction of The Children’s Code (also known as The Age Appropriate Design Code) has passed, with the code having come into effect on September 2nd.

Read more …

Freedom of information in black text on a key on a white keyboard

B&H FoI: Racist/religious incidents/bullying

Schools in Brighton and Hove have received the following Freedom of Information request:

1. Please send me copies/scans/digital files that record individual racist/religious incidents/bullying incidents in terms of numbers of incidents and their

Read more …

Cyber attacks in navy, harry the hacker looking at computer screens and phishing (fishing) a laptop

Cyber Attacks

The National Cyber Security Centre has today upgraded it's advice to schools relating to the prevalence of cybers attacks in the sector:

Read more …

Search

Keep in the Know!

Get our latest news directly to your inbox

Privacy notice