Understanding data protection legislation - GDPR, DPA and PCI

8 November 2024

UK Laws and regulatory compliance 

In your role, you’ll likely interact with users’ personal data. It’s essential to comprehend and adhere to data protection laws. The process involves obtaining consent, responsibly managing data, and ensuring its security. Consider the importance of safeguarding your own data – that’s the level of security and respect you should apply. Maintaining security, compliance, and identity is not just a requirement, but a responsibility. It’s a cornerstone of trust and professionalism in the IT field. What are the key regulatory requirements for businesses in the UK? 

GDPR – a beginner’s overview 

The General Data Protection Regulation (GDPR) is essential and legally required across all sectors in the UK that process personal data. Think of it like a user manual that every gadget comes with, the GDPR is the user manual for companies on how to handle personal data. It tells them what they can and can’t do.  

To understand GDPR from a non-technical perspective imagine you and a friend… 

Analogy Principle Explanation 
Borrowing a friend’s laptop requires asking for permission first, doesn’t it? Consent is key Companies must ask for your permission before using your personal data
If a friend lends you their laptop to check emails, you wouldn’t use it to play games, would you? Purpose matters Companies should only use your data for the purpose they stated when they asked for your consent
You wouldn’t ask your friend for their laptop if you just needed to check the time, when a watch is availableMinimum data Companies should only collect the data they absolutely need
If you’re saving a friend’s phone number, you’d make sure it’s correctAccuracy Companies must ensure that your data is correct and make corrections if necessary
You wouldn’t keep your friend’s laptop forever after borrowing it, would you? Storage limitation Companies should only keep your data for as long as necessary
You’d keep your friend’s laptop safe and not let anyone steal it Security Companies need to keep your data secure and protect it from unauthorized access or theft

DPA 2018 – a beginner’s overview 

The Data Protection Act (DPA) 2018 is all about respect for personal data. Think of it like a rule book, every game has a rule book, the DPA 2018 is the rule book for how companies should handle personal data in the UK. It tells them what they can and can’t do.  

To understand DPA 2018 from a non-technical perspective imagine you have a secret diary… 

Analogy Principle Explanation 
Personal data is like the entries in your secret diary where you write all your personal thingsPersonal data Information about you that you might not want everyone to know, like your name, where you live, or your favourite colour
You wouldn’t want someone to read your secret diary without asking you firstConsent Companies must ask for your permission before they can use your personal data
If you let your friend read your diary to know your favourite colour, you wouldn’t want them to read about your secret crushPurpose limitation Companies should only use your data for the reason they said they would
You wouldn’t write down everything you did in your secret diaryData minimisation Companies should only collect the data they really need
If you’re writing in your diary about your day, you’d make sure it’s correctAccuracy Companies should ensure your data is correct and make corrections if necessary
You wouldn’t keep your old diaries forever after you’ve stopped using themStorage limitation Companies should only keep your data for as long as necessary
You would keep your diary safe and not let anyone steal itSecurity Companies need to keep your data secure and protect it from unauthorised access or theft

PCI-DSS – a beginner’s overview 

The Payment Card Industry Data Security Standard (PCI-DSS) is all about keeping cardholder data safe. Think of it like a security guard; a security guard keeps a building safe; the PCI-DSS is there to keep credit and debit card details safe. It’s a set of rules that companies must follow if they handle card payments.  

To understand PCI-DSS from a non-technical perspective imagine you have a secret box… 

Analogy Principle Explanation 
A secret box is where you keep your most valuable thingsCardholder data The card number, cardholder name, expiry date, and security code on a payment card
You wouldn’t want someone to steal your secret boxProtecting data Companies must protect cardholder data by ensuring it is stored, processed, and transmitted securely
like how a castle has a wall to keep out invadersBuilding a secure network Companies need to build a secure network to protect cardholder data, using firewalls and changing default passwords
You might check your secret box regularly to make sure your valuables are still thereRegular testing Companies need to regularly test their networks and systems to ensure they are secure
You wouldn’t let just anyone look in your secret boxAccess control Companies need to control who has access to cardholder data, ensuring only necessary personnel can access it
You might keep a list of who you let look in your secret boxMonitoring and reporting Companies need to keep track of who accesses cardholder data and report to card companies to show compliance

Summary 

We have covered a beginner’s overview of the three fundamental regulatory requirements for businesses in the UK, and did you know Microsoft 365 can help? M365 encompasses a variety of applications and services, including Microsoft Defender, Entra ID (formerly known as Azure Active Directory) Suite, and Purview Portal. These tools are integral to implementing a zero-trust security model, which is increasingly becoming the standard for modern security practices. Zero-trust modernisation emphasises the principle of “never trust, always verify,” ensuring that every access request is authenticated, authorised, and encrypted before granting access. To find out more about how we can help you comply with regulatory requirements, contact us here

Share this post

Work with us

One of our dedicated IT experts will be in touch:

Let us call you back

DD slash MM slash YYYY
By clicking the submit button below, you consent to Primary Technology storing and processing the personal information submitted in this form to respond to your enquiry.
This field is for validation purposes and should be left unchanged.