Information Security Blog

UK Data Protection Act: The Evolution of Information Security?

UK Data Protection Act: The Evolution of Information Security?

Increasingly our international clients that process a lot of “personal data” are being asked about their compliance with the UK’s Data Protection Act (DPA).  Initially, I assumed that the guidance would be analogous to the 47+ US State Personally Identifiable Information (PII) laws and regulations. But on reviewing the DPA, I was very surprised about its approach and its implications. It radically changes the definition of “personal and sensitive data” and it extends notably beyond the realm of confidentiality where US PII laws focus. Under the DPA notably more personal data (e.g., sexual orientation, religion) needs to be protected. Equally significant is that not only do we need to keep that information confidential, but now we need to ensure its integrity, its availability, its accuracy, its retention, and its use. If we take a quick look at high-level definitions and principles the magnitude of this shift becomes more obvious. In particular:

  • Personal Data is effectively any data that can be used to identify an individual and/or any decision or opinion made by the data processor.
  • Sensitive Data includes information such as political opinions, sexual orientation, religious beliefs, union membership, and any information about legal proceedings.

UK Data Protection Act: The Evolution of Information Security?

DPA includes the following eight “Data Protection Principles” that specify that personal data must be:

  • Processed fairly and lawfully
  • Obtained for specified and lawful purposes
  • Adequate, relevant and not excessive
  • Accurate and up-to-date
  • Not kept any longer than necessary
  • Processed in accordance with the “data subject’s” (the individual’s) rights
  • Securely kept
  • Not transferred to any other country without adequate protection in situ

So the difference between complying with US PII laws (let’s throw PCI and HIPAA in) and the UK’s DPA is the difference between ensuring the confidentiality of medical or highly identifiable information (social security number, driver’s license, checking account number, credit card data) versus protecting the accuracy, timeliness, confidentiality, integrity, and full life-cycle of virtually any information you have about an individual. Wow!

Needless to say, developing a comprehensive Information Security Management System such as ISO 27001 is going to simplify addressing DPA. However, full compliance is likely going to require implementing elements of a Service Delivery Management System (e.g., ISO 20000, ITIL), an Information Technology Controls Framework (e.g., COBIT), and perhaps even a Business Continuity Management System (e.g., ISO 22301).

Never a dull moment…

Photo Creative Commons License epSos .de


Best Practices for Firing A Network Security Administrator

Firing A Network Security AdministratorWant to know how to fire a Network Admin? Need to know what precautions to take? Firing any employee can be a stressful event. Firing one who has significant knowledge of and privileged access to your Information Technology/Security infrastructure is even more stressful, as the risks are so notable.

Free Whitepaper: Five Best Practices for SIEM


The promise of SIEM is the consolidation of all relevant Security Event Logs from disparate sources into a single unified and normalized data store.

Free Download: ISO 27001 Vendor Selection Toolkit

“ISOOur ISO 27001 Toolkit will help you to select an ISO 27001 consulting firm.
  • Review the Issues Critical to Your Environment
  • "Vet" Vendor Qualifications
  • Compare the Top 3 Vendors
  • Sample RFP Included

Free Download: ISO 27001 Implementation Roadmap

ISO 27001 RoadmapHave no fear – our “roadmap” will guide you, step by step, through the entire ISO 27001 process.

Getting to ISO 27001 certification is a process made up of things you already know – and things you may already be doing!

Is ISO 27001 Right for (Y)our Organization?


Thinking about ISO 27001 Certification? View our free On-Demand ISO 27001 Webinar

  • How to deal with increasing threats
  • How to manage multiple regulatory requirements
  • How to handle client requests for attestation
  • To validate that significant changes did not have unanticipated results

Download: Information Security Attestation Guide

Information Security GuideA Best-Practices Guide to Information Security Attestation

Download our proven Information Security Guide to simplify the process of protecting your data, proving you’re secure and growing your business.

Free Whitepaper: Stop Wasting Money on Penetration Testing


Penetration Testing is most frequently performed to:

  • Substantiate the net effectiveness of a mature control environment
  • Prove to a third party that an environment is secure/trustworthy
  • Quickly assess the security of a less mature control environment (in a sense a technical risk assessment)
  • To validate that significant changes did not have unanticipated results

Free Download: A Best Practices Guide to Database Security

database security roadmap

Because data is only as secure as the systems & processes it relies on – a holistic approach to data security is essential. This roadmap is not meant to be exhaustive but rather to stimulate the necessary thought process to put you on the path to good data security.

About the Author:

John Verry (CISA, 27001 Certified Lead Auditor, CCSE, CRISC) is Pivot Point's resident "Security Sherpa". He is lucky enough to spend most of his day helping clients develop a road map to address security, compliance, and attestation requirements.

Add a Comment

Share This