This course provides an understanding of new and wide-reaching requirements from the General Data Protection Regulation and those rules relevant for businesses, as well as employees’ responsibilities for protecting personal information.

All businesses use personal data gathered from customers, suppliers and colleagues in some way or another. It is in our collective interest to protect this data and keep it confidential in line with existing regulations and common sense.

Data protection regulations manages how our business uses personal information, including how we may collect it, the situations in which we are permitted to use it, and for how long we may retain it.  Effective 25 May 2018, the General Data Protection Regulation (GDPR) replaces the national data protection laws in all EU member states. The GDPR enhances the rights of individuals by furthering the rights associated with individuals’ personal data held in certain locations. It also covers the portability of data sets from one firm to another. In addition, the GDPR encourages businesses to set up processes and products in a way that does not involve more personal data than needed. Penalties for non-compliance can be severe including significant fines and reputational damage.

This course addresses the rules and requirements of the GDPR, promulgated by the EU with effect from 2018. The GDPR covers the critical area of obtaining, using, storing, managing and deleting personal data, and represents a substantial regulatory expansion of personal data protection rules and requirements. The course is important to individuals and institutions both within the EU and those outside the EU that may deal with personal data relevant to persons in the EU. The GDPR imposes significant requirements and provides for substantial sanctions on all such individuals and institutions and represents a major advance in global personal data protection regulation.

The topics covered in the course include:

  • Key Definitions
  • Data Protection Rules and Principles
  • Rights of Individuals
  • Security Requirements
  • Sharing, Using, Transferring and Deleting Data