Best Practice Update

Navy background. White text with words cyber resilience. Data Protection Education logo. Navy key hole in shape of a shield on a light blue network

We have previously written about the Cyber Resilience Centres which are 9 regional centres in the UK which were part of a Home Office initiative to help strengthen the reach of cyber resilience across the community.
We recently met with Daniel Sykes, the Cyber Crime Protect and Prepare Office for the South East Cyber Resilience Centre, to ask
about how their services can help small businesses, schools and multi academy trusts.

A hand taking some documents off of a large printer. The data protection education logo in blue going down from top to bottom to the right of the printer

While visiting organisations during our data walks we will have a conversation with you about how printers are used in your organisation, we will discuss access controls and have a look around the print area and any recycling facilities.  Printing can be expensive as the cost of paper and toner has risen, but it can also be costly to your cyber resilience and your data breach security.

  1. Product Focus on Checklists : Data Breaches
  2. Product Focus on Checklists : Subject Access Requests
  3. Product Focus on Checklists : Bring your own device
  4. Product Focus on Checklists : Working out of school/offsite
  5. Cyber Attack on a School
  6. Product Focus on Checklists : Redaction
  7. Why Due Diligence is Important: Fake apps
  8. Product Focus on Checklists : CCTV
  9. Product Focus on Checklists : Clear desk
  10. Product Focus on Checklists : Commitment to compliance
  11. Product Focus on Checklists : Photos and video
  12. Product Focus on Checklists : Passwords
  13. Product Focus on Checklists : Information Classification
  14. Free cyber training for staff
  15. DfE Digital Standards Update
  16. The Mother of all Breaches
  17. International Data Transfers (part 1): Navigating Cross-Border Data Transfers: Understanding EU SCCs, UK Addendum, and UK IDTA
  18. ClassCharts Possible Data Breach
  19. Where is your data stored?
  20. IAPP looks at AI privacy risks
  21. If you suspect a financial scam .....
  22. School Focus: St Bernadette's Catholic Primary School | Brighton
  23. Guardians of Privacy: 16. Social Media Checklist
  24. Guardians of Privacy: 15. Navigating Social Media in Educational Settings Summary
  25. Guardians of Privacy: 14. Social Media and Cyber Bullying
  26. Guardians of Privacy: 13. Social Media, Copyright and Intellectual Property
  27. Guardians of Privacy: 12. Social Media and Going Viral
  28. Guardians of Privacy: 11. Staff Social Media Accounts
  29. Guardians of Privacy: 10. Social Media and Cookies
  30. Guardians of Privacy: 9. Social Media and Morality
  31. New Resources for Schools from the ICO
  32. Guardians of Privacy: 8. Social Media Policies
  33. Guardians of Privacy: 7. Social Media Data Retention
  34. Guardians of Privacy: 6. Posting Safely
  35. Guardians of Privacy: 5. Social Media and Consent
  36. Guardians of Privacy: 4. Social Media Access Control
  37. Guardians of Privacy: 3. Social Media Channels
  38. Guardians of Privacy: 2. Law and Regulations
  39. Guardians of Privacy: 1. Social media, privacy and children
  40. The ICO reprimands a Multi Academy Trust
  41. KCSIE: Filtering, Monitoring and Privacy
  42. Guidance for the use of school email and applying email retention in schools
  43. Data Protection Tips for Early Years Settings
  44. Children's Privacy around the world is a puzzle
  45. Trust Initial Plan Checklist Update
  46. Records Management Best Practice Update
  47. Governors and Data Best Practice Area Update
  48. What do I need to redact?
  49. Trust Initial Plan for Data Protection Compliance (for Multi Academy Trusts)
  50. Google for Education Resources: Helping IT Admins meet DfE digital and technology standards
  51. Lettings Best Practice and Guidance
  52. Considerations when migrating to a new MIS
  53. Public bodies and sensitive data
  54. Get a DPE Badge for your website!
  55. ICO: 10 Step guide to sharing information to safeguard children
  56. Help after a Cyber Attack/Incident
  57. Data Protection and Cyber Security (Inset Day) Training Ideas
  58. How KCSIE is linked to Cyber Strategy
  59. Handling Freedom of Information Requests the right way
  60. Where's Harry the Hacker?
  61. The ICO Reprimands a school
  62. Subject Access Requests (SARs)
  63. Redaction Guidelines Updated
  64. Using WhatsApp in Schools
  65. How to contact us for support, subject access requests, data breaches and FOI's
  66. FOI: Reinforced Autoclaved Aerated Concrete
  67. FOI: Henry Jackson Society
  68. FOI: Vaccination Justifications
  69. How the Record of Processing Can Help You
  70. What does a Data Protection Officer Do?
  71. Blog: Best Practice on the Retention of Child Protection Information
  72. Carrying out Supplier Due Diligence
  73. Email and retention periods
  74. How Long Should You Keep Personal Data For?
  75. Sharing this year’s Nativity play online
  76. A quick introduction to the Phishing Simulation tool
  77. B&H FoI: Racist/religious incidents/bullying
  78. Protocol for Setting Up and Delivery of Online Teaching and Learning
  79. Class Dojo International Data Sharing
  80. Model Publication Scheme: Amendments, Improvements and Updates
  81. Transparency
  82. Parents and students covertly recording conversations
  83. SAR? ER? FOI?
  84. Research projects and GDPR
  85. Secure file transfer of files using Royal Mail
  86. Emergency contacts and consent
  87. Key elements of a successful DPIA
  88. FOI Publication Schemes
  89. Best Practice for Managing Photos and Video
  90. New Drip Feeds: Recognise and Respond to Subject Access Request
  91. When to contact the Data Protection Officer?
  92. National child measurement programme
  93. Make sure DPE is your registered DPO with the ICO
  94. Headteacher fined for breach of data protection legislation

Search