1 Introduction
The purpose of this policy is to set out the principles that must be observed by anyone who works for Concept Automotive Limited and has access to person or firm identifiable information.
2. Responsibility for confidentiality, data protection and security
The Directors shall be responsible for:
3 Duty of confidentiality
All employees working within Concept Automotive Limited owe a duty of confidentiality to protect all personal and firm information they come into contact with during the course of their work.
4. Data protection
4.1 Introduction
The Data Protection Act 1998 regulates data use. Unlike with the duty of confidentiality referred to above, the Data Protection Act is only concerned with how firms use personal data of individuals. This includes customers, non-customers and employees. It governs not only information held on computer but also information held in manual form (e.g. on file).
4.2 The Data protection Information Commissioner
The Data Protection Information Commissioner enforces and oversees the Data Protection Act 1998. The Commissioner has a range of duties including the promotion of good information handling and the encouragement of Codes of Practice for the data controllers, that is, anyone who decides how and why personal data are processed.
The Commissioner is a UK independent supervisory authority reporting directly to the UK Parliament.
The information provided within this procedural manual is drawn from the requirements laid down by the Office of the Information Commissioner.
Further information is available from visiting the Information Commissioner's website at https://ico.org.uk
4.3 Why data is Important
It is therefore essential that those that collect and use personal data to maintain the confidence of those who are asked to provide it by complying with the requirements of the Data Protection Act.
All Data Controllers must comply with the eight principles that are at the heart of the Act, including the requirement to obtain and process data fairly.
4.4 Individual rights
Under the Act any individual concerned has a right to see almost all personal information held about them, whether it is stored on computer or in manual form. Information held by Concept Vehicle Leasing must not be amended/deleted following a request to use it. In the event of receiving a so-called 'subject access request' please refer to 'Subject Access Procedures'.
4.5 Accuracy
The Act places an obligation to ensure the accuracy of an individual's personal data. Such information should not be misleading as to any matter of fact.
4.5.1 Personal obligations of all staff
4.6 The data protection principles
The 1998 Act sets out 8 principles, which define the obligations of the firm as a registered data user of personal data. These principles are as follows: -
Personal data covers both facts and opinions about the individual. It also includes information regarding the intentions of the Data Controller towards the individual.
4.7 Requirements of the principles
4.7.1 First principle
'Personal data shall be processed fairly and lawfully'
The firm must ensure that the processing is fair and lawful. Where the data is obtained from the data subject the firm must ensure that the data subject is provided with, or have made readily available to them at the time of obtaining the data: the identity of the firm the purpose for processing other necessary information as circumstances require to ensure that the processing is fair
The firm's application forms should take into account the following requirements:
Firms will only need to hold or process customer's personal data for business needs for example the need to carry out a credit search in respect of an application for a loan. The customer would have been requested to sign our standard declaration in order for their consent to be provided.
4.7.2 Second principle
'Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes'
This principle differs from the 1984 Act. It is no longer the case that personal data can be used for any purpose as long as it is for a purpose as described in the firm's register entry.
4.7.3 Third principle
'Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed'
Personal data held for specific purposes must be more than sufficient for the purpose or purposes.
It would therefore not be sufficient to hold information on the basis that one day it may be useful, without a firm idea of how it will be used.
4.7.4 Fourth principle
'Personal data shall be accurate and, where necessary, kept up to date'
All reasonable steps must be taken to ensure the accuracy of data at all times.
Firms must have controls in place to ensure that in the event of inaccurate personal data being identified procedures will exist to allow for information to be rectified, blocked or destroyed.
4.7.5 Fifth principle
'Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that or those purposes'
4.7.6 Sixth principle
'Personal data shall be processed in accordance with the rights of data subjects under this Act'
In addition principle 6 covers how individuals have a right to be made aware of how their personal information is used and by whom it is used.
Under Data Protection Legislation, the firm must be able to prevent processing of data where the individual objects in writing. For example a customer may request not to receive any direct marketing material from the company or wish to have personal details passed through to a third party.
The firm must have systems in place to suppress this type of information being sent out to their customers.
4.7.7 Seventh principle
'Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against loss or destruction of, or damage to, personal data'
4.7.8 Eighth principle
'Personal data shall not be transferred to a country of territory outside the European Economic Area without adequate protection.
When assessing 'adequacy of protection', all circumstances surrounding the data transfer should be considered (e.g. the nature of the data, the purposes and timescales of the processing etc.).
4.8 Processing personal data
Processing of personal data can be broadly defined when any operation is carried out on personal data. The Act requires that personal data be processed 'fairly and lawfully'. Personal data will not be considered to be processed fairly unless certain conditions have been met.
Processing may only be carried out where one of the following conditions has been met:
4.9 Collecting personal data
When collecting personal data it is essential that people know:
This information can often be provided on an application form or similar document.
Data Protection wording is included within the firm's application package, which when signed by the customer provides necessary comments for processing the customer's data.
When handling, collecting, processing or storing personal data staff must ensure that:
The Data Protection Act is considered when setting up new systems or when considering use of the data for a new purpose. Any changes could affect the company's existing registration with the Data Protection Registrar and an amendment to the registration sought.
It is equally important not to:
4.10 Rights of individuals 'Subject Access' and 'Subject Rights'
The Data Protection Act enables individuals who are the subject of personal data a general right of access to the personal data, which relates to them.
Personal data may take the form of computerised or, in some cases, paper records. These rights are known as 'subject access rights'.
4.10.1 Individuals, who the data relates to, have various rights:
What is a subject access request?
Often a customer will not have heard of the term 'Subject Access Request'. Staff should be able to distinguish between a casual enquiry and a 'Subject Access Request'.
A Subject Access Request is not, for example, where:-
A Subject Access Request is where:
Subject access requests
It is important that subject access requests are recognised and dealt with quickly.
A subject access request may be as simple as a letter from one the firm's customers asking what information we hold about them.
If a request is received the enquirer must be sent:
Before any request is auctioned the Data Controller should verify the identity of the person making the request.
Subject access requests must be dealt with within 40 days from the date of receipt. If further details are needed from the person making the request to assist with finding the data the 40 days will begin when the extra information is received.
A maximum fee of £10 can be imposed and the 40 days will not commence until the fee has been received.
All information sent in response to a subject access request should be easy to understand and therefore the sending of computer printouts may not be acceptable without a covering explanation on codes used.
4.10.2 Identifying the customer
Subject access requests
Firms are not obliged to comply with a subject access request until sufficient information to clearly identify the individual requesting the file has been given. Before releasing data staff should satisfy themselves as to the identity of the customer. This is important to firms, as releasing information to the wrong person is likely to amount to a breach of security.
Any of the documents listed below may be used to identify the customer(s):
All documents must be original, not photocopies, and dated within the last three months. It must show the customer's full name or first initial, surname and current address.
It is important that all documentation is returned to the customer once identity has been verified.
In the rare circumstances where the customer is unable to provide any of the above items, they must provide a letter confirming their identity. This must be an original, typed or headed paper, dated within the last three months and authenticated with an official stamp if applicable. This should be from an employer, solicitor or other professional body or person.
Telephone requests for information
It is important not to release any personal information to customers before you have established their identity. Requests should be treated with great care, particularly as the issues of proof of identity are difficult to manage.
The steps that need to be taken to verify the identity of the customer will depend upon the type of information, and possibly the customer.
Although wherever possible access to a data subject's personal information should be provided 'without excessive constraints or delay'. This needs to be balanced against the responsibilities of the data controller to safeguard personal information and to avoid giving personal data to another individual.
Therefore, depending on the circumstances, staff should be asking customers to confirm selective information to verify identity from the following:
If the customer requests a Subject Access report then the customer needs to be reminded that the request needs to be put in writing, and will be dealt with in accordance with the procedures as detailed in section 4.
4.11 Credit reference agencies
There are three major credit reference agencies in the UK at present. They are Experian, Equifax and Trans Union. Their main purpose is to supply factual information to providers of financial services in order to establish peoples credit histories.
Customers have a legal right to have access to the data held by credit reference agencies. Customers also have a right to request that the agency remove/amend incorrect data. Customers can write to the agency to obtain a copy of their credit file. Generally a small fee is payable.
4.12 Consent to obtain credit search
Credit searches on an individual must not be conducted without the consent of that individual. The firm's policy is to obtain this consent in writing, normally as part of the application process, however, verbal consent of the customer will be considered in certain circumstances. Staff should contact Compliance Department if they are unsure if adequate consents have been obtained.
4.13 Processing for direct marketing purposes
To comply with the requirements of the Data Protection Act all customers both new and existing have to be given the right to opt out from receiving advertising and marketing material from the firm.
Likewise customers have to be informed if the firm intends to pass information to a third party for marketing purposes.
Customer's personal data is collected on application forms and the election for customers not be receive marketing material is covered through the inclusion of an 'opt-out' box.
4.14 Preference services
There are a number of marketing preference services available to customers:
The MPS is funded by the direct mail industry to enable customers to have their names and home addresses in the UK removed from or added to lists used by the direct mail industry.
Firms must ensure that customers that have registered with the MPS do not receive any marketing material.
4.15 Third parties and data processors
4.15.1 General guidelines
In the event of a query reference should be made to senior management
4.16 Data protection act definitions
4.16.1 Data
Automated and manual data that is recorded as part of a relevant filing system
4.16.2 Data controller
The data controller is Compliance Officer/Nominated Officer
4.16.3 Data protection commissioner
This is the name for the Data Protection Registrar
4.16.4 Data subject
The individual who is the subject of the personal data
4.16.5 Manual data
Manual records are those which are structured by reference to individuals or criteria relating to individuals, and which allow easy access to the personal data they contain
4.16.6 Notification
Notification by the firm of certain basic information about the data held; the purposes for which it is held; the persons to whom it may be disclosed; a general description of the technical and organisational steps a Data Controller takes to protect data held from unauthorised access, disclosure or loss; and the identity of the Data Controller i.e. Compliance is responsible for ensuring that notification / registration is completed as necessary.
4.16.7 Personal data
This is data relating to an individual who can be identified from that data and/or other information which is the possession of or likely to come into possession of the firm
4.16.8 Processing of personal data
Obtaining or recording the information to be contained in the data or carrying out an operation, including disclosure by transmission / documentation, organisation, adaptation, alteration of the information or data, retrieval, blocking, erasure or destruction of the data.
4.16.9 Relevant filing systems / manual data
Any set of information relating to individuals which is structured either by reference to individuals i.e. by name/employee code etc., or by reference to criteria i.e. age job type, credit history etc. relating to individuals so that specific information relating to an individual is readily accessible.
4.16.10 Sensitive data
Means data pertaining to: racial or ethnic origin; religions or similar beliefs; trade union membership; physical or mental health or sexual life; political options; criminal offices. This data may only be held in strictly defined situations or where explicit consent has been obtained.
4.16.11 Subject access
The right of individuals to have access to the data about them and any other related information
4.16.12 Third party
Any person other than the firm or its staff, data subject, or data processor
5 Data security
5.1 Data security obligations
Firms have a responsibility under FCA Regulations to put in place systems and controls that keep the data of customers secure whilst also minimising the risks of data loss. The nature of the steps that firms will be expected to take will depend on the size, complexity and nature of the services that the firm provides. We recommend that firms seek expert advice about both assessing their data security risks and formulating appropriate policies, as these will be unique to individual firms.
Example of policies that firms could be expected to implement in order to comply with the above include but are not limited to requirements that:
5.2 Dealing with data security incidents
Where data loss has been encountered the Managing Director shall write to customers within 24 hours after the incident to advise them that data has been lost, and the manner in which it was lost. Concept Automotive Limited shall also ensure that following data loss it conducts a review of the systems that led to the loss.