...

Turn Your Vision into Success, Let It Fly with Us

Ensure Your Business Is Secure, Compliant & IT-Ready

IT security Responsibilities under GDPR

Table of Contents

Executive Summary
Who this guide is for
GDPR & IT Security Explained

In the UK, personal data (such as names, email addresses, and health-related) is protected by UK GDPR (General Data Protection Regulation), which is the UK’s Data Protection Act 2018 amended from GDPR based on EU regulations after Brexit. Article 32 of the GDPR mandates that “IT Security” involves the use of reasonable measures to protect data from loss, unauthorised access, or damage. This may include implementing passwords, regularly backing-up data, training personnel, and regularly reviewing procedures for preventing data breaches.

Establishment of the UK GDPR and Data Protection Act provides organisations with an assurance that their employees will handle information in a secure manner so as not to harm individuals, and ultimately build confidence in the handling of personal data. While some small business owners may feel overwhelmed thinking that the UK GDPR requires them to have “perfect” measures to comply with the Law, there is a focus on practicality. Appropriate or commensurate measures to protect personal data should be based on risk (e.g., handling sensitive health-related information) as well as available technology and cost.

Personal data is defined as anything that identifies an individual, special category data includes sensitive or health-related information, and protection measures must include additional diligence.

Roles & Responsibilities Under GDPR

Controller vs Processor

1. Lawful Processing & Data Protection Principles (Security Focus)
Covers:

Examples:

Common mistakes:

2. “Appropriate Technical & Organisational Measures”
Covers:

Examples:

Common mistakes:

3. Access Control & User Management
Covers:

Examples:

Common mistakes:

4. Device & Endpoint Security
Covers:

Examples:

Common mistakes:

5. Encryption & Data Protection
Covers:

Examples:

Common mistakes:

6. Backups, Availability & Resilience
Covers:

Examples:

Common mistakes:

7. Training & Staff Awareness
Covers:

Examples:

Common mistakes:

Common GDPR Security Myths & Misunderstandings

FAQs

The GDPR does not stipulate that all data must be encrypted; however, encryption could be appropriate if your risks are significant (e.g., when handling sensitive data) and should be approached in a proportionate way.

No, you should include other controls alongside antivirus protection including access control measures and assess risks associated with your business.

Cyber Essentials is not mandatory with the GDPR; however, the ICO will view positively, as it is a measure of security adopted by an organisation when demonstrating compliance with data protection.

If your breach poses a risk to individuals, then you have 72 hours to notify the ICO. If your breach poses a high level of risk to individuals, then you must notify those individuals.

Maintain documents such as risk assessments, logs, policies and procedures—this is particularly easy for small businesses.

Ensure basic security controls (i.e., strong passwords) are proportionate to the data you hold and associated risk.

You are responsible for ensuring appropriate security controls are implemented and selecting secure data processors.

Your risk-based approach means assessing risks and costs related to the threat and avoiding unnecessary expense.

About This Guide

The Computer Support Centre has developed this guide to educate and assist UK based IT managed services organisations to help Small to Medium Size Businesses (SMEs) protect their customers’ personal information in the real world.

This document has been produced with the focus of being able to provide a simple, non-technical, plain English explanation of how IT Security obligations are enforced as a result of the UK GDPR legislation and to eliminate confusion regarding the significance of these obligations and to provide SMEs with the best available advice and resources concerning access control, device protection, incident response, backup, and supply chain management.

Conclusion

The GDPR doesn’t expect perfection or high tech costs – just that organisations proactively protect personal data through sound, logical, risk-based practices.

For most UK organisations, establishing a compliance posture that meets expectations of the GDPR regarding IT security will include establishing a strong foundation by focusing on core basic steps such as; managing access, securing devices, having reliable backups, being prepared for incidents, and training staff to understand their responsibilities for protecting data.

Organisations that focus on delivering practical security and enforced accountability can mitigate real risk, respond effectively to incidents, and demonstrate the responsible protection of data while not becoming over engineered or creating confusion.