Author name: Mark Roebuck

Large-scale data processing

What is large-scale data processing?

‘Large-scale data processing’ is not explicitly defined despite it being used within regulation such as the General Data Protection Regulation (GDPR). The ICO themselves provide pointers but again no clear definition. This lack of definition becomes more apparent when a (Record of Processing Activities) RoPA is being completed. The RoPA module within the ProvePrivacy platform

What is large-scale data processing? Read More »

Processing Activities | ProvePrivacy | Article Image 27

Managing User Roles

ProvePrivacy is designed to ensure that users only have access to the information which is required for thier role. To achieve this there are a number of different roles established within the system which only a Company Administrator can assign. A user who has not been assigned any role is referred to as a Standard

Managing User Roles Read More »

Data protection project

First 100 days of a data protection project; planning for success what to cover

As a data protection professional I often get asked what the most important aspects of data protection are. There are many things in the regulation which resonate for me and help me shape my advice to clients but, it is difficult to list which are most important as the answer is reliant on the context.

First 100 days of a data protection project; planning for success what to cover Read More »

Understanding DPIA

Understanding DPIA: A Crucial Component for Data Protection

Now more than ever businesses are collecting, storing, and processing vast amounts of personal data. Ensuring the protection of this data is not just a legal obligation but also a critical trust factor for customers. This is where Data Protection Impact Assessments (DPIAs) come into play. In this blog, we’ll explore what a DPIA is,

Understanding DPIA: A Crucial Component for Data Protection Read More »

Data Protection by Design – the key principles

DSAR – The Importance of Subject Access Requests

In the realm of data protection, the concept of an “data subject access request” holds significant importance. As data privacy regulations become increasingly stringent worldwide, understanding what a request entails and how to handle it is crucial for individuals and organisations alike.  What is an Access Request? A subject access request, often referred to as

DSAR – The Importance of Subject Access Requests Read More »

Understanding Data Breaches

Understanding Data Breaches: Types, Reporting Requirements and Impacts

In today’s digital landscape, data breaches have become a pervasive threat. They can have devastating consequences for individuals, businesses, and even governments. This blog outlines the different types of breaches, explores the potential impacts, and details the information needed to report a data breach. Types of Data Breaches Data breaches come in various forms, each

Understanding Data Breaches: Types, Reporting Requirements and Impacts Read More »

Scroll to Top

Contact us

If you would like to ask more questions or to arrange training, complete the form below and we will respond shortly.

Prefer to schedule a 15 minute call? Schedule call today >>

See our Privacy Statement for more details.