Data Management Policy TEMPLATE V1
Data Management Policy TEMPLATE V1
Template
This is an example policy. Please ensure you update this policy template so that it’s
suitable for your organisation.
DATE: ……….
Introduction
<Organisation> needs to gather and use certain information about individuals. This can
include clients, contacts, employees and other people the organisation has a relationship
with or may need to contact.
This policy describes how this personal data must be collected, handled and stored to
meet the organisation's data protection standards and to comply with the law.
This data management policy ensures <Organisation>:
complies with data protection law and follows good practice
protects the rights of clients, staff and partners
is transparent about how it stores and processes individuals’ data
protects itself from the risks of a data breach
DATE: ……….
11. Ensuring that audience development, marketing, fundraising and all other initiatives
involving processing personal information and/or contacting individuals abide by the
UK GDPR principles.
Data Protection Officer (DPO), the person responsible for fulfilling the tasks of the DPO in
respect of <Organisation>, is <employee name, employee job title>.
Under UK GDPR organisations in certain circumstances are required to appoint a DPO.
However, regardless of whether the UK GDPR requires a DPO, you must ensure that your
organisation has sufficient staff and skills to carry out your requirements under the UK
GDPR.
Best practice dictates that, regardless of individual circumstances, organisations should
appoint a named individual as DPO to lead on ensuring that data protection requirements
are met. The minimum tasks of the DPO are to:
inform and advise the organisation and its employees about their obligations to
comply with UK GDPR and other data protection laws
monitor compliance with UK GDPR and other data protection laws – including
managing internal data protection activities, advising on data protection impact
assessments, training staff and conducting internal audits
be the first point of contact for supervisory authorities and for individuals whose
data is processed (employees, clients)
Consent
In cases where you rely on consent as the lawful condition for processing, you should be
able to demonstrate and describe how you have reviewed your processes and systems to
make sure that consent is freely and unambiguously given for specific purposes, and that
you can evidence an affirmative action on the part of the data subject to have indicated
consent, and such that data subjects can reasonably understand who is using their
personal information, what information, and for what purposes, and using which
communications channels. Do your practises and systems incorporate a suitable audit trail
which would enable you to demonstrate how and when consent was obtained, upon
request? Do your practices and systems communicate an individual’s right to withdraw
consent at any time, and do your processes and systems support the functionality to do
so?
Where ‘soft opt-in’ is used in as the lawful basis for processing for electronic
communications (email/SMS/automated-telephone) contact, you should record the
notification statement detailing the intended use of personal information given at the point
of collecting personal information during the course of sale or negotiation for sale which
gave the client the opportunity to opt out, and also how subsequently notify the client of
their right to unsubscribe with every following communication.
Where ‘legitimate interest’ is the lawful condition for processing, evidence should be given
of the process by which the rights and freedoms of the individual have been weighed
against the interests of the company, and how consideration/mitigation of the outcomes of
DATE: ……….
the process have been made. How has the individual been informed of this processing,
and what information have they been given to help them exercise their rights?
Data Sharing
In this section provide details of any/all third party organisations that you intend to share
personal information with.
Where consent is the basis for sharing, describe how <Organisation> has obtained and
recorded the necessary specific and clear permissions for sharing data with named third
parties, for specifically defined uses, and in specified communications channels.
Where other lawful conditions for processing are relied upon for data sharing, these should
also be described.
Details should be given as to when data sharing agreements, describing and ensuring the
arrangements concerning the collection of the necessary permissions, defining the scope
of the personal data to be shared – along with the meta-data that will enable the receiving
party to be able to create an audit trail, sufficient to enable them to respond to any
challenge as to why an individual’s data has been processed, or to facilitate a data subject
access request, and which details the security measures that will be put in place to protect
DATE: ……….
the data in transit, and which establishes the shared understanding of the receiving
organisations’ obligations as a data controller with responsibility for all aspects of the
regulation as data controllers of the new copy of the data which is being shared with them.
Security measures
Here, describe the measures that are in place to protect the personal information that you
store from breach.
Details should be documented here of the technical infrastructure considerations and
measures put in place to leverage technology to require or ensure compliance, such as
restricting and protecting access to the data to those people for whom it is necessary to
perform the processing - such as measures like security software and firewalls, encryption,
the use of secure Virtual Private Networks (VPN), log-in restricted access and two step
authentications, etc.
The procedural and organisational policy measures, such as protocols for safe transfer of
data in transit, and protocols for password management, and data back-up should also be
detailed.
Describe also the measures in place to enable your organisation to know if a data breach
has taken place and what measures are in place to ensure that reporting of any breaches
is reported to the ICO within the required timescales. You should also articulate the
measures you have in place to ensure that any data to be deleted, is deleted securely and
without further risk of breach.
Automated processing
Provide details of any automated processing or decision-making undertaken by your
organisation, including profiling.
You should describe:
the lawful condition for that processing
what the outcomes are
how you have weighed the outcomes of that processing against the rights and
freedoms of the individuals
This is in a case where such processing leads to a significant legal or other effect on the
individual.
The process of weighing the organisation’s interest against the rights of the individual
should always be transparently demonstrated. Privacy statements should include details of
any automated processing. This includes details of any third party profiling tools or
datasets that are used to add information that will build a profile of individuals. Privacy
statements should also detail the outcomes of this processing, together with details of how
individuals can exercise their right not to be subjected to such.
DATE: ……….
Subject access requests
All individuals who are the subject of data held by your organisation are entitled to:
ask what information the company holds about them and why
ask how to gain access to it
be informed how to keep it up to date
be informed how the company is meeting its data protection obligations
Details should be given here of the process that <Organisation> will use to fulfil subject
access requests and how individuals are notified of this process.
Privacy notices
<Organisation> aims to ensure that individuals are aware that their data is being
processed, and that they understand:
who is processing their data
what data is involved
the purpose for processing that data
the outcomes of data processing
how to exercise their rights
The company has a privacy statement, setting out how data relating to these individuals is
used by the company.
Detail here where and how the privacy statement can be viewed by individuals.
DATE: ……….
Exceptions
Exceptions to the guiding principles in this policy must be documented and formally
approved by the <role> and <organisation>.
DATE: ……….