Select your data babysitter carefully..

Select your data babysitter carefully..

For any organisation as we continue to grow we have 2 fundamental objectives:- 

  • To make more money 
  • Reduce our costs. 

There is obviously nothing wrong with this philosophy, we do all want successful businesses that will make more money. 

Importantly however when it comes to following a successful GDPR/Cyber Compliance journey there are strict rules that need to be followed to maintain our integrity and to be able to avoid possible costly consequences from non-compliance/data breaches. 

Guardian of your Galaxy 

No matter the size or type of our organisation it is very important to consider that with GDPR we need to understand 2 very important points:- 

  • We are wholly responsible for the data that we have within our organisation, from the inception of the data (birth) to its deletion (death) this responsibility is without exception. 
  • If we outsource certain services in our organisation like IT, Credit Control, Accountancy, HR etc, allowing these external companies to be able to manipulate our data or just have the ability to access our data, the responsibility for the integrity, security & protection of the data is ours. 

This means that we must ensure that our customers data is compliant no matter who has access to or where they may be able to gain access to the customer data, access which will have been allowed at our request when appointing any outsourced service within our organisation. 

Appropriate Measures  

With GDPR we are required to implement Appropriate Technical & Organisational Measures these measures must follow the travel of the data and will make everyone responsible/accountable who either:- 

  • Hold the data. 
  • Access the data. 
  • Manipulate the data. 
  • Share the data . 
  • Backup the data. 
  • Store the data. 
  • Destroy the data. 

Why? 

Our customers have placed trust in us that their data/details will be safeguarded, they do not need to make any special request that if we use any outsourced services their data will still be protected. 

The reason for this! 

Quite simply because our customers did not know (unless we made it very clear with our T&C and/or Privacy Policies) that we will share their information, so when we appoint our outsourced provider to assist with our day to day operations, they do not need to know about the company unless that same provider facilitates a data breach. 

However It is our responsibility that we have a formal contract with our outsourced provider, this contract must exist before they supply any services to us that clearly makes them accountable and will enforce the same “Appropriate Technical & Organisational Measures” on them that we have implemented within our own organisation. 

Important Note  

If you do not follow these simple rules and:-  

  • Appoint an outsourced provider. 
  • Do not create a formal contract. 
  • Appropriate measures are not followed. 
  • Allow the outsourced provider to access or manipulate your data in any form.  

Then there will be serious consequences for both parties for non-compliance, also should a Data Breach occur appropriate breach notification procedures/policies will be need be enacted.  

Our Advice... 

Follow this simple advice otherwise your organisation may be unenviably Non-Compliant. 

For further information Click Here or Call: 02890 022344


要查看或添加评论,请登录

Justin Bentley的更多文章

  • Did your business make £5,245.930 in 2020

    Did your business make £5,245.930 in 2020

    Please indulge me a little while I tell you a little story about Cyber Crime… For many #covid19 has been their first…

    3 条评论
  • So it's 2020...

    So it's 2020...

    So it’s 2020, doesn’t time fly when you are having fun! I for one will not miss 2019, there were some very trying times…

    3 条评论
  • As another day begins…

    As another day begins…

    Its been a night of thoughts & turmoil, as the day breaks its time to put the mask on to meet the world and all who you…

  • Always Hop to avoid the Bounce…!

    Always Hop to avoid the Bounce…!

    Our Data World… Our world revolves around data, whether its work, social or a mixture of both our data is everywhere in…

  • Our Mental Health Is Serious...

    Our Mental Health Is Serious...

    Recently we seem to have had a massive influx of companies/individuals talking about mental health, which is a…

  • Your Cyber Footprint needs protecting

    Your Cyber Footprint needs protecting

    What is a Cyber Footprint? We may not know it however we all have a Cyber Footprint. A cyber footprint is Information…

  • Why Public WIFI isn't safe!

    Why Public WIFI isn't safe!

    What is public Wi-Fi? Public Wi-Fi can now be found everywhere airports, coffee shops, shopping malls, restaurants, and…

    1 条评论
  • Cyber Wolf and the 3 Businesses...Part 1 - A Modern Fairytale

    Cyber Wolf and the 3 Businesses...Part 1 - A Modern Fairytale

    CyberBot has always loved telling his son CyberBabybot bedtime stories, he does however enjoy making them educational…

  • If Music were Cyber Crime, let's play safe!

    If Music were Cyber Crime, let's play safe!

    It’s Friday afternoon and you are “UNDER PRESSURE”, waiting for the “HAMMER TO FALL” thinking “I WANT TO BREAK FREE” on…

    1 条评论
  • Not Gone...However Sadly Forgotten...

    Not Gone...However Sadly Forgotten...

    At a recent visit to at a coffee shop I was approached a representative from a premium citizen charity and asked for a…

    2 条评论

社区洞察

其他会员也浏览了