Skip to content

Regulatory Expectations in Data Governance

About this webinar

Thank you for confirming your details.

You can watch the recording and download the slides below. 

Reduce business risk with our data protection training package

Data Protection

Data protection relates to how all organisations collect, use, and store personal and sensitive data.

Data Protection

Data protection relates to how personal and sensitive data is collected, used and stored by all organisations.

Privacy and Electronic Communications Regulations (PECR)

PECR are new regulations that, along with the GDPR and Data Protection Act 2018 (in the UK), give consumers specific rights in respect of electronic communications.

Understanding the GDPR

The General Data Protection Regulation (GDPR) sets out key principles for handling personal data and protecting individuals' rights.

Personal Data Breaches

Personal data breaches can occur through hacking, human error or unauthorised access, leading to serious legal and reputational consequences.

Data Protection Impact Assessments

Data Protection Impact Assessments (DPIAs) are used to evaluate our data processing activities and mitigate risks to individuals.

General Data Protection Regulation (GDPR)

Data protection relates to how all organisations collect, use, and store personal and sensitive data.

Controllers and Processors

The differences between data controllers and data processors are crucial to understanding data protection obligations.

Special Category Data

In many workplaces, sensitive data, including special category data, is collected and requires extra care.

GDPR Principle 1

The first principle of the GDPR requires that personal data must be processed lawfully, fairly and transparently.

GDPR Principle 2

The second principle of the GDPR, purpose limitation, requires that personal data be collected for specified, explicit and legitimate purposes.

GDPR Principle 3

The third principle of the GDPR, data minimisation, requires that personal data collected must be adequate, relevant and limited to what is necessary.

GDPR Principle 4

The fourth principle of the GDPR, accuracy, requires that personal data must be correct, up to date and not misleading.

GDPR Principle 5

The fifth principle of the GDPR, storage limitation, requires that personal data be retained only for as long as necessary for its intended purpose.

GDPR Principle 6

The sixth principle of the GDPR, integrity and confidentiality, requires that personal data be protected against unauthorised access, loss or damage.

GDPR Principle 7

The seventh principle of the GDPR, accountability, requires organisations to take responsibility for compliance and demonstrate good governance in data protection.

GDPR and Consent

Consent is one of the six lawful bases for processing personal data under the GDPR, requiring individuals to give clear, informed and voluntary agreement.

GDPR Lawful Bases for Processing

The General Data Protection Regulation (GDPR) requires organisations to have a lawful basis for processing personal data, chosen from six legal grounds.

GDPR Legitimate Interests

Legitimate interests is a flexible lawful basis for processing personal data, but it requires balancing business needs with individuals' rights.

GDPR International Transfers

The international transfer of personal data is restricted to ensure individuals' privacy rights are protected when data is sent abroad.

GDPR Individual Rights

The General Data Protection Regulation (GDPR) grants individuals eight specific rights over their personal data, ensuring transparency and control.

GDPR Subject Access Requests

Individuals have the right to access their personal data and organisations must respond to subject access requests (SARs) within legal timeframes.

Legitimate Interest Assessments

When relying on legitimate interests as a legal basis for processing personal data, you are taking on additional responsibility for protecting people's rights and interests.

PCI Data Security Standard

PCI Data Security Standard (PCI-DSS) is the information security standard for organisations that process credit card payments.

Learn with the Skillcast blog

Best practices, expert opinions, and emerging industry trends — all in one place.

what-is-the-data-use-&-access-act and-why-is-it-important?-|-skillcast
Information Security GDPR

What is the Data Use & Access Act and Why is it Important?...

6 minute read

The Data Use and Access Act (DUAA) became law in June 2025, with full implementation next year. We unpack what the Act entails and why it's important.

Read the article
biggest-gdpr-fines-of-2025-|-skillcast
Information Security GDPR

Biggest GDPR Fines of 2025 | Skillcast

12 minute read

We sase some huge fines issued last year, often to the same company. We review the largest penalties dished out so far in 2025 and the breaches behind them.

Read the article
how-to-select-effective-compliance-monitoring-systems-|-skillcast
Compliance Strategy

How to Select Effective Compliance Monitoring Systems |...

7 minute read

Learn how to choose a compliance monitoring system that tracks training, provides real-time reporting, and ensures audit-ready compliance.

Read the article