Latest Public Sector News

23.02.18

Data protection by design

Nigel Houlden, head of technology policy at the Information Commissioner’s Office (ICO), looks at how organisations can win back public trust by fully understanding and acting on existing and upcoming cyber security regulations.

There are people who don’t trust you with their personal data.

That’s one finding from our 2017 annual ICO survey: just one-fifth of the UK public report having trust and confidence in companies and organisations storing their personal information.

And when so-called data gatekeepers like Equifax and Yahoo report enormous breaches, you can begin to understand why.

As the UK’s data protection regulator, it’s our job to protect the information rights of citizens and to ensure that privacy works hand in hand with innovation in today’s digital economy.

So I want to talk about some steps you can take to win back that trust.

I should start with the obvious: cyber security and data protection are inextricably linked.

Privacy depends on security. No obligation to provide privacy will be meaningful if the data to be protected are accessed or stolen by unauthorised third parties.

All modern data protection principles include an obligation to protect information, and security has been recognised in every significant codification of data protection, including the current Data Protection Act and the new EU General Data Protection Regulation (GDPR) that comes into effect on 25 May. So it’s important to understand your cyber security obligations.

The regulations

The government has pledged to make the UK the safest place to be online, deciding that the new data protection laws represent an opportunity for organisations to improve their cyber security resilience.

The GDPR comes into force in all EU member states in May 2018. And the UK Government has taken a step further with the new Data Protection Act. This will replace the 1998 legislation, complementing the GDPR and bringing all processing of personal data into one coherent regime, with the rights of the individual at its centre.

There is a lot to say about the data protection reforms – a good place to start is our website – but the changes can be summarised in three main areas:

  • The new law requires you to be transparent and tell people what you will do with their data;
  • You then have to control the data as you promised you would;
  • You must be prepared to account to your customers and the regulator for what you have done.

Organisations will have to show reporting structures and responsibilities, risk assessments and mitigation measures. These records need to be up-to-date, accurate and comprehensive – and we need to see them if an incident occurs.

In addition, breach reporting rules are changing. You will not have to report every single personal data breach to the ICO – but you will if it’s likely to result in a risk to people’s rights and freedoms. We are writing guidance about this, but you should already be developing a sense of what constitutes a serious incident in the context of your data and your own customers.

This all sounds challenging – but it needn’t be onerous if you adopt privacy by design and sound cyber security at the outset of a project, and don’t treat them as an afterthought.

Privacy by design

We have long championed this approach, but it’s never been a legal requirement – until now. “Data protection by design” will be an obligation under the GDPR, as will the use of data protection impact assessments.

We already have plenty of guidance on our website (and we are developing more), but in this context privacy by design means building data privacy and security into every part of your information processing, from the hardware and software to the procedures, guidelines, standards, and policies that your organisation has or should have.

Systems should be protected at every step: look at your data flows, understand how your data moves across and beyond your organisation, both in electronic and ‘real-world’ formats.

You should evaluate the impact of a data breach or data loss on your finances and your reputation. Data should be secured in rest as well as when in transit – even if lost or hacked, it should not be readable.

A well-designed system and approach will protect your network infrastructure: it should incorporate firewalls, access control lists and VLANs, as well as non-technological measures such as CCTV, fences and security personnel if needed.

Access to data should be under the system of least privilege: not knowing who has access to what or who is responsible for it can be a massive hole in your security.

And remember: security isn’t just an IT issue. For good security to work you need senior management buy-in and support, and you must enforce your policies and procedures.

Just because someone somewhere once wrote a security policy doesn’t mean you’re protected. Staff must read and understand the requirements of that policy and the consequences of failing to follow it – which you should be prepared to enforce.

Low-tech breaches are frustratingly common in our enforcement work, with many due to human error. Training and awareness are critical for your staff, as well as protecting your data with regular monitoring and testing and robust incident management.

The benefits

The new laws are an opportunity to focus on data protection and security. Ensure your board of directors understand their new obligations, and the need to invest in safeguards to build and retain consumer trust.

Innovation in the digital economy relies on this trust to generate the social license that you need to break new frontiers with data. Growth built on a healthy foundation of trust is sustainable. Growth built on mistrust is vulnerable to the reputational damage of a data breach.

The future

Our Information Rights Strategic Plan that sets out the ICO’s commitments until 2021 makes clear that staying relevant in the context of ever-changing technology must become a core component of our strategic goals if we are to continue to deliver the regulatory outcomes the public expect. 

Technological advance and privacy rights can work together to create true trust and data confidence.

It is for these reasons that the ICO will soon publish its first-ever Technology Strategy.

 

FOR MORE INFORMATION
W: www.ico.org.uk

Comments

There are no comments. Why not be the first?

Add your comment

related

public sector executive tv

more videos >

last word

Prevention: Investing for the future

Prevention: Investing for the future

Rob Whiteman, CEO at the Chartered Institute of Public Finance (CIPFA), discusses the benefits of long-term preventative investment. Rising demand, reducing resource – this has been the r more > more last word articles >

public sector focus

View all News

comment

Peter Kyle MP: It’s time to say thank you this Public Service Day

21/06/2019Peter Kyle MP: It’s time to say thank you this Public Service Day

Taking time to say thank you is one of the hidden pillars of a society. Bei... more >
How community-led initiatives can help save the housing shortage

19/06/2019How community-led initiatives can help save the housing shortage

Tom Chance, director at the National Community Land Trust Network, argues t... more >

interviews

Artificial intelligence: the devil is in the data

17/12/2018Artificial intelligence: the devil is in the data

It’s no secret that the public sector and its service providers need ... more >