Skip to content

Regulatory Expectations in Data Governance

About this webinar

Thank you for confirming your details.

You can watch the recording and download the slides below. 

Reduce business risk with our data protection training package

Data Protection

Data protection relates to how all organisations collect, use, and store personal and sensitive data.

Data Protection

Data protection relates to how personal and sensitive data is collected, used and stored by all organisations.

Privacy and Electronic Communications Regulations (PECR)

PECR are new regulations that, along with the GDPR and Data Protection Act 2018 (in the UK), give consumers specific rights in respect of electronic communications.

Understanding the GDPR

The General Data Protection Regulation (GDPR) sets out key principles for handling personal data and protecting individuals' rights.

Personal Data Breaches

Personal data breaches can occur through hacking, human error or unauthorised access, leading to serious legal and reputational consequences.

Data Protection Impact Assessments

Data Protection Impact Assessments (DPIAs) are used to evaluate our data processing activities and mitigate risks to individuals.

General Data Protection Regulation (GDPR)

Data protection relates to how all organisations collect, use, and store personal and sensitive data.

Controllers and Processors

The differences between data controllers and data processors are crucial to understanding data protection obligations.

Special Category Data

In many workplaces, sensitive data, including special category data, is collected and requires extra care.

GDPR Principle 1

The first principle of the GDPR requires that personal data must be processed lawfully, fairly and transparently.

GDPR Principle 2

The second principle of the GDPR, purpose limitation, requires that personal data be collected for specified, explicit and legitimate purposes.

GDPR Principle 3

The third principle of the GDPR, data minimisation, requires that personal data collected must be adequate, relevant and limited to what is necessary.

GDPR Principle 4

The fourth principle of the GDPR, accuracy, requires that personal data must be correct, up to date and not misleading.

GDPR Principle 5

The fifth principle of the GDPR, storage limitation, requires that personal data be retained only for as long as necessary for its intended purpose.

GDPR Principle 6

The sixth principle of the GDPR, integrity and confidentiality, requires that personal data be protected against unauthorised access, loss or damage.

GDPR Principle 7

The seventh principle of the GDPR, accountability, requires organisations to take responsibility for compliance and demonstrate good governance in data protection.

GDPR and Consent

Consent is one of the six lawful bases for processing personal data under the GDPR, requiring individuals to give clear, informed and voluntary agreement.

GDPR Lawful Bases for Processing

The General Data Protection Regulation (GDPR) requires organisations to have a lawful basis for processing personal data, chosen from six legal grounds.

GDPR Legitimate Interests

Legitimate interests is a flexible lawful basis for processing personal data, but it requires balancing business needs with individuals' rights.

GDPR International Transfers

The international transfer of personal data is restricted to ensure individuals' privacy rights are protected when data is sent abroad.

GDPR Individual Rights

The General Data Protection Regulation (GDPR) grants individuals eight specific rights over their personal data, ensuring transparency and control.

GDPR Subject Access Requests

Individuals have the right to access their personal data and organisations must respond to subject access requests (SARs) within legal timeframes.

Legitimate Interest Assessments

When relying on legitimate interests as a legal basis for processing personal data, you are taking on additional responsibility for protecting people's rights and interests.

PCI Data Security Standard

PCI Data Security Standard (PCI-DSS) is the information security standard for organisations that process credit card payments.

Learn with the Skillcast blog

Best practices, expert opinions, and emerging industry trends — all in one place.

how-to-achieve-compliance-readiness-quickly-with-fasttrack-training-|-skillcast
Compliance Strategy

How to Achieve Compliance Readiness Quickly with FastTrack...

10 minute read

Find out how Skillcast’s FastTrack compliance training can boost the time to value and return on investment of your training programme.

Read the article
how-to-report-on-dei-training-effectively-|-skillcast
Equality and Diversity

How to Report on DEI Training Effectively | Skillcast

13 minute read

Learn how to report effectively on DEI training by setting clear goals, using meaningful metrics, and promoting transparency.

Read the article
the-cyber-culture-clash:-the-gap-between-policy-&-practice-|-skillcast
Information Security Compliance Strategy

The Cyber Culture Clash: The Gap Between Policy & Practice...

20 minute read

Skillcast's Cyber Culture Clash Index reveals which UK industries align cybersecurity policy with practice and which fall dangerously short.

Read the article