Data Protection
Data protection relates to how personal and sensitive data is collected, used and stored by all organisations.
Our Data Protection Refresher will remind your staff what personal and sensitive data are, why it needs protecting and how to ensure compliance with the General Data Protection Regulation (GDPR).
-
15 Minutes
-
For all staff
-
Compliance Essentials Library
What you’ll learn in
this course
- Recognise the importance of data protection to all of us
- Know what is expected of you to comply with data protection laws
- Comply with the data protection principles and our Company's legal obligations to safeguard personal information
- Feel confident in reporting any data breaches promptly
Ready to try this course?
Start your free trial of this course and get instant access today.
Want to explore more courses?
Browse all courses and search by topic to find what matters most to you.
The importance of keeping your data governance on track
Privacy and Electronic Communications Regulations (PECR)
PECR are new regulations that, along with the GDPR and Data Protection Act 2018 (in the UK), give consumers specific rights in respect of electronic communications.
Understanding the GDPR
The General Data Protection Regulation (GDPR) sets out key principles for handling personal data and protecting individuals' rights.
Personal Data Breaches
Personal data breaches can occur through hacking, human error or unauthorised access, leading to serious legal and reputational consequences.
Data Protection Impact Assessments
Data Protection Impact Assessments (DPIAs) are used to evaluate our data processing activities and mitigate risks to individuals.
Controllers and Processors
The differences between data controllers and data processors are crucial to understanding data protection obligations.
Special Category Data
In many workplaces, sensitive data, including special category data, is collected and requires extra care.
GDPR Principle 1
The first principle of the GDPR requires that personal data must be processed lawfully, fairly and transparently.
GDPR Principle 2
The second principle of the GDPR, purpose limitation, requires that personal data be collected for specified, explicit and legitimate purposes.
GDPR Principle 3
The third principle of the GDPR, data minimisation, requires that personal data collected must be adequate, relevant and limited to what is necessary.
GDPR Principle 4
The fourth principle of the GDPR, accuracy, requires that personal data must be correct, up to date and not misleading.
GDPR Principle 5
The fifth principle of the GDPR, storage limitation, requires that personal data be retained only for as long as necessary for its intended purpose.
GDPR Principle 6
The sixth principle of the GDPR, integrity and confidentiality, requires that personal data be protected against unauthorised access, loss or damage.
GDPR Principle 7
The seventh principle of the GDPR, accountability, requires organisations to take responsibility for compliance and demonstrate good governance in data protection.
GDPR and Consent
Consent is one of the six lawful bases for processing personal data under the GDPR, requiring individuals to give clear, informed and voluntary agreement.
GDPR Lawful Bases for Processing
The General Data Protection Regulation (GDPR) requires organisations to have a lawful basis for processing personal data, chosen from six legal grounds.
GDPR Legitimate Interests
Legitimate interests is a flexible lawful basis for processing personal data, but it requires balancing business needs with individuals' rights.
GDPR International Transfers
The international transfer of personal data is restricted to ensure individuals' privacy rights are protected when data is sent abroad.
GDPR Individual Rights
The General Data Protection Regulation (GDPR) grants individuals eight specific rights over their personal data, ensuring transparency and control.
GDPR Subject Access Requests
Individuals have the right to access their personal data and organisations must respond to subject access requests (SARs) within legal timeframes.
Legitimate Interest Assessments
When relying on legitimate interests as a legal basis for processing personal data, you are taking on additional responsibility for protecting people's rights and interests.
PCI Data Security Standard
PCI Data Security Standard (PCI-DSS) is the information security standard for organisations that process credit card payments.
Our LMS or yours?
Award-winning LMS
Leverage the award-winning Skillcast Portal to deliver your compliance training, track performance with analytics, and access compliance tools to support and strengthen your compliance programme.
Skillcast Remote Services
If you prefer to use your own LMS, we offer flexible pricing plans and delivery options to suit your unique needs, from off-the-shelf course libraries to fully bespoke solutions.
Bring your courses to life with AI
Boost staff engagement by putting support and just-in-time learning front and centre. Aida delivers instant, reliable answers to compliance questions and recommends policies or training directly within your daily workflow, including MS Teams and soon Copilot. This reduces repetitive queries for your compliance team and helps identify knowledge gaps and risks.
Your questions, answered
Data Protection (GDPR)
Common FAQs
Where can I track incidents involving personal data?
How can I ensure that employees formally attest to our internal Data Protection Policy?
What makes a password secure?
What is a passphrase, and is it better than a password?
How can organisations help staff manage secure passwords?
What exactly must be included in a DSAR response under GDPR?
- Purposes of processing
- Types of personal data involved
- Recipients of data (including third countries)
- Retention period or criteria
- Data source (if not collected directly)
- Rights to rectification, erasure, restriction, or to object
- Right to lodge a complaint with a supervisory authority
- Automated decision-making logic and consequences
Can I ask for identification before fulfilling a DSAR?
How is the one-month response deadline calculated precisely?
When and how can the response deadline be extended?
A controller can extend the deadline by up to two months if the request is complex or the data subject has submitted multiple rights requests simultaneously (e.g., access, erasure, portability). However, the extension must be issued within the initial one-month period, providing reasons for the delay.
How is data privacy different from data security?
Who is responsible for data privacy in compliance training?
What is multi-factor authentication?
What is the difference between MFA and 2FA?
How to log in with MFA?
Are Skillcast courses SCORM-compliant?
What other tools are needed beyond training?
Is our training content still compliant with the latest legislation?
- You can check the latest course content updates in our library updates page: https://www.skillcast.com/compliance-course-library-updates
- For major legislative changes, we:
- Send you email alerts to ensure you are notified
- Offer you a free trial of newly created or updated content
- Host webinars with compliance experts to explain the changes and how our training supports your ongoing compliance
Can you translate our content into other languages?
What file types are supported by the Skillcast system?
Features |
Supported file types and details |
|
File Exchange |
File types: PDF, Excel spreadsheets, Word documents, SCORM and xAPI files, and compressed zip files. Max file size: Default is 1GB, can be increased to a max of 2GB |
|
SCORM files |
Versions: SCORM 1.2, SCORM 1.2 for Moodle, SCORM 2004 2nd, 3rd and 4th Edition. Max file size: 1024MB |
|
xAPI file |
Max file size: 2GB |
|
Videos |
File types: MP4 or MOV. Videos must be optimised, with a max file size of 100MB. If the file is bigger, our Design Team can help |
|
Images |
File types: jpg, png and gif. The file size should ideally be 100KB, but it can be up to 250KB |
|
CPD evidence |
File types: Word, PDF, Excel and CSV. File size: the limit should be whatever the portal config option is set to. Servers are set to max 2GB |
|
Policy documents |
PDF or Word File size: the limit should be whatever the portal config option is set to. Servers are set to max 2GB |
|
Offline activities evidence |
File types: PDF, DOC, DOCX, XLS, XLSX, CSV, PNG, GIF, JPEG, JPG, PPTX and MSG. File size: the limit should be whatever the portal config option is set to. Servers are set to max 2GB |
|
Client logo files |
File types provided by client: EPS, PDF, AI and SVG |
|
Registers |
PDF, DOC, DOCX, XLS, XLSX, CSV, PPT, PPTX, POT, PPA, PPS, JPG, JPEG, PJEPG, PNG, BMP, GIF, MP4, MOV, WMV, CPTX, CP, TXT, ZIP and MSG files |
|
Declarations |
JPG, JPEG, PNG, GIF, XLS and XLSX files |