The data protection act explained
Posted on 10 Feb 2011 at 14:37
Rik Ferguson, the senior security advisor at Trend Micro, knows a thing or two about the Data Protection Act, so we asked for a plain English explanation:
“The Data Protection Act is designed to protect people (oddly called data subjects rather than data owners) from having their data collected, processed or transmitted without their informed consent. It places an obligation on the data controller (whoever is doing the data collection) to ensure that data isn’t collected without a purpose, that it isn’t shared without permission, that it’s protected in storage. and that it isn’t retained for longer than is necessary. The DPA gives every data subject the right to see what data is held about them in electronic format, and in some cases on paper.
“Normally a maximum fee of £10 is permissible under law, but if the request is to a credit reference agency the fee is £2. The fee may exceed £10, particularly with reference to health or educational data. Any obstacles that may be put in the way beyond these fees are illegal and could be reported to the Information Commissioner.”
In order to request disclosure of the data held about you, a formal request is required – something along the following lines:
“This is a subject access request for disclosure of information under section 7 of the Data Protection Act 1998. Please send me the information which I am entitled to under section 7(1).
"In accordance with that section, please provide a statement confirming whether any personal data is being processed; describing the personal data processed; specifying the purposes for which data is processed for each category of data, and the recipients of any data disclosed; detailing any transfers of data outside the UK in whatever form or by whatever means.
"As required by the Data Protection Act 1998 section 8(2), please provide an explanation of the purpose, meaning, and context of the information. This includes geographical information for any location data that is retained.”
The DPA applies specifically to “data controllers” within the UK. That said, the DPA is actually an implementation, which is why, as such, all countries of the EU have broadly similar legislation.
This means your data is protected pretty much across Europe in a similar fashion.
Outside of Europe protective legislation varies wildly, so if you choose to surrender your details to a non-European-based organisation, you should be aware that you may have little or no protection in law.
Head back to the Reclaim your data main page here.
Author: Davey Winder
This is misleading in a couple of respects.
The DPA is not
"designed to protect people from having their data collected, processed or transmitted without their informed consent". That is a common misconception. Consent is one of the conditions for processing personal data; however, data controllers can rely instead on the processing being necessary for their legitimate interests and not unduly prejudicial to the data subject. Consent is required under the DPA only if the data is sensitive personal data (although again there are alternative, albeit more restrictive, conditions).
Secondly, I doubt many people involved in data protection in practice would agree that all EU countries have broadly similar data protection legislation. The national laws of all EU member states stem from the same Directive, but the ways in which member states have chosen to implement and enforce the Directive vary very significantly. The UK is at the more relaxed end of the scale; countries such as Austria and Slovakia have much more onerous regimes.
By Joel_H on 11 Feb 2011
For more details about purchasing this feature and/or images for editorial usage, please contact Jasmine Samra on email@example.com
- Europol warns: public Wi-Fi isn't safe
- IDC: iPad intertia opens door for Windows tablets
- Rivals put on notice as Spotify snaps up The Echo Nest
- Windows 8.1 Update 1 leaks via Microsoft's website
- Mozilla questions why Dell charges £16 to install Firefox
- Hundreds of NHS sites vulnerable to hackers
- Samsung Chromebook 2 gets faux-leather look - and bloatware
- Windows 8.1 Update 1 hits RTM
- Hackers take Meetup.com offline over $300 ransom
- Office 365 goes social with "Oslo" news feed
- Move over Delia: IBM Watson is cooking tonight
- Eric Schmidt on the double-edged smartphone: friend and foe
- Getty joins the race to the bottom
- Hour of Code: five steps to learn how to code
- Sony Xperia Z2 Tablet review: first look
- Sony Xperia Z2 review: first look
- Samsung Galaxy Gear 2 review: first look
- Nokia XL review: first look
- Samsung Galaxy S5 review: first look
- Nokia X review: first look
- Windows Server 2012 R2: how the Datacenter edition could change SMBs
- Invoices and VAT: how to set up your documents correctly
- Nexus 5 vs Samsung Galaxy S4 Active: the best phone for avoiding screen burn
- How much is a social user worth?
- The key to choosing a secure password
- Thunderbolt Bridge: a fast Mac migration tool
- Should you advertise on Twitter?
- How to track a lost smartphone
- Self-publishing success: the best way to sell your book
- 1.6TB SSD: why would you need one?