ICO (UK) - Parkside Community Primary School
ICO - Parkside Community Primary School | |
---|---|
Authority: | ICO (UK) |
Jurisdiction: | United Kingdom |
Relevant Law: | Article 5(1)(f) GDPR Article 24(1) GDPR Article 32 GDPR |
Type: | Investigation |
Outcome: | Violation Found |
Started: | |
Decided: | |
Published: | 23.05.2023 |
Fine: | n/a |
Parties: | Parkside Community Primary School |
National Case Number/Name: | Parkside Community Primary School |
European Case Law Identifier: | n/a |
Appeal: | Unknown |
Original Language(s): | English |
Original Source: | ICO (in EN) |
Initial Contributor: | n/a |
A reprimand has been issued to Parkside Community Primary School in relation to the infringements of Article 5 (1)(f), Article 24 (1) and Article 32 of UK GDPR.
English Summary
Facts
The investigation found that Parkside inappropriately disclosed personal data, including special category data, of a sensitive nature in a classroom environment. There were four data subjects affected, three of whom were children.
Holding
The investigation found that Parkside did not have adequate policies, procedures and guidance to ensure security and confidentiality when sharing personal data internally by email and also when it was appropriate to open emails which contained personal data. The ICO recommends that Parkside take further actions in respect of its technical and organisational measures, policies, procedures and training.
Comment
Share your comments here!
Further Resources
Share blogs or news articles here!
English Machine Translation of the Decision
The decision below is a machine translation of the English original. Please refer to the English original for more details.
DATA PROTECTION ACT 2018 AND UK GENERAL DATA PROTECTION REGULATION REPRIMAND The Information Commissioner (the Commissioner) issues a reprimand to Parkside Community Primary School (Parkside) in accordance with Article 58(2)(b) of the UK General Data Protection Regulation (UK GDPR) in respect of certain infringements of the UK GDPR. The reprimand The Commissioner has decided to issue a reprimand to Parkside in respect of the following infringements of the UK GDPR: Article 5 (1)(f) which states that personal data shall be processed in a manner that ensures appropriate security of the personal data, including protection against unauthorised or unlawful processing and against accidental loss, destruction or damage, using appropriate technical or organisational measures (‘integrity and confidentiality’). There are also infringements of Article 24 (1) (Responsibility of the controller) and Article 32 (Security of processing). The reasons for the Commissioner’s findings are set out below. The investigation found that Parkside inappropriately disclosed personal data, including special category data, of a sensitive nature in a classroom environment. There were four data subjects affected, three of whom were children. The Commissioner considers that in relation to the infringement of Article 5(1)(f) (and by extension Article 24 (1) and Article 32), that Parkside did not have adequate: Policies. The ICO is satisfied that the both of the employees concerned acted in contravention of Parkside’s data protection policies by failing to report the breach internally. However, shortcomings with Parkside’s policies were noted. Specifically, the data protection policies did not outline the course of action for employees to adopt to ensure security and confidentiality when sharing personal data internally by email and also when it was appropriate to open emails which contained personal data. This is particularly pertinent due to the classroom environment which Parkside employees operated in. 1 Also noted was a lack of policy relating to ( ). is a case management system specifically used for the management and monitoring of safeguarding, wellbeing and pastoral issues related to children. The personal data being processed by was likely to be sensitive and contain special category data, so the ICO would expect a controller to have adequate technical and organisational measures around the use of to prevent a security breach. Procedure and guidance. There was a lack of written guidance for employees in respect of using security and confidentiality classifications on emails. Specifically and in relation to this incident, it was noted that emails generated by did not have any security classification or labelling to indicate they contained personal data of a sensitive nature (including special category data). Further, there was no written procedure or guidance for employees in respect of when it was appropriate during the school day to open emails generated by . In addition to this, there was no written procedure or guidance available to employees in relation to the safe operation of the electronic whiteboards, particularly when screensharing from an employee’s electronic device. Mitigating factors In the course of our investigation we have noted that: Parkside had overarching data protection policies in place. In particular, Data Protection and Security Policy (dated July 2020) stipulated that employees should follow the security incident / data breach response plan if they know or suspect a personal data breach has occurred. The Data Breach Response Plan Parkside Community Primary School (undated) directed employees that if they become aware of a suspected or actual personal data breach, then the incident should be reported to the Headmaster without delay. Once the incident was discovered by Parkside, the children who witnessed the disclosure were reassured that what they read was unfortunate and that if they wanted to talk about the content that they were able to do with the Deputy Headteacher. It was stressed to the children that the content was not to be discussed with their peers. There is no evidence that the disclosed content has been shared or disseminated. 2 Parkside referred the incident immediately to the Local Authority Designated Officer (LADO) and followed the recommendations made by the LADO. Chair of Governors agreed with commissioning the Human Resources team at Herts for Learning to carry out an investigation and it was conducted under the school’s disciplinary policy. Formal disciplinary action was taken against one of the employees concerned. This employee made a statement of apology for breach and for their failure to report the incident. Remedial steps taken by Parkside The Commissioner has also considered and welcomes the remedial steps taken by Parkside in the light of this incident. In particular we have noted that: The governor responsible for the strategic management of UK GDPR reviewed the Parkside’s current practices in line with the Data Protection policy and made recommendations to the full governing body. All staff were issued with a formal notice and guidance about how incidents should be reported on the school’s internal . New guidance has been issued to staff around the recording and accessing of work emails / records in light of the breach. Staff have been instructed that all alerts sent via are only to be read at specific times of the day and never when children are present or in the vicinity of the classroom. All staff have been instructed to use “SENSITIVE/HIGHLY SENSITIVE” in the subject line of an email informing the recipient of the nature of the content before it is opened. Such emails should only be read before and after the school day. Governors are to be alerted to an incident as soon as it becomes known to the headteacher. Cases of a complex and sensitive nature can only be accessed on by the Headteacher, Deputy Headteacher and Parental and Pastoral Officer and shared with relevant members of staff on a need-to-know basis at scheduled meetings. 3 All staff and governors received UK GDPR refresher training (which included the caveat not to check emails during teaching time) as per the Herts for Learning training module. Part of the training instructed staff to use the internal secure data transfer system when sending information of a highly sensitive nature. All staff to be issued with the Parkside’s UK GDPR policy and to be familiar with its content. A record will be made on personnel files in this respect. Staff have been signposted on where to access the school’s Data Protection Policy as a point of reference should they require it. Parkside’s Data Protection Policy has been reviewed and an appendix added for review at the first full governing body meeting of the new academic year. The updated policy instructs staff how to report a breach, what constitutes a breach, who to report it to and what happens once this has been do. This is to help staff understand the complexities of reporting a breach. All staff to sign an electronic document to say they have read and understood the school’s Child Protection and Data Protection Policy in September 2022 alongside the latest and updated version of Keeping Children Safe in Education (Part 1). Decision to issue a reprimand Taking into account all the circumstances of this case, including the mitigating factors and remedial steps, the Commissioner has decided to issue a reprimand to Parkside in relation to the infringements of Article 5(1)(f), Article 24 (1) and Article 32 of the UK GDPR set out above. Further Action Recommended The Commissioner recommends that Parkside should take certain steps to ensure its compliance with UK GDPR. With particular reference to Article 5(1)(f), Article 24 (1) and Article 32 of the UK GDPR, the following steps are recommended: 1. Parkside should consider refresher training on the operation of electronic whiteboards for all relevant employees. This should be underpinned by written guidance for employees to follow and Parkside should satisfy itself that security is enshrined in the training and guidance. Emphasis should be given to the relevant steps for employees to take to avoid a personal data breach when operating an electronic whiteboard. 42. At the time of the breach, it was noted that there was no written guidance in place for employees for the use of . Whilst it is appreciated that Parkside have now issued some written guidance in relation to the operation of , Parkside should evaluate whether this is sufficient and adequate to reduce the risk of a recurrence of a similar incident. refresher training should also be considered for all relevant employees. 3. Consideration should be given to refresher data protection training to all members of staff, as it was noted that both members of staff involved in this incident failed to report the breach. Emphasis should be given on the requirement to report a suspected or actual personal data breach. Parkside should satisfy itself that all employees understand the consequences of failing to report a breach, particularly as it can mean a delay in mitigating action being deployed. This is especially important, as mitigating action can lessen the effects of a personal data breach and the potential impact on the data subject/s. 4. Parkside should satisfy itself that it has adequate technical and organisational measures in place to ensure the security and confidentiality of emails sent internally which include personal data, particularly when these contain sensitive or special category data. 5. Parkside’s policies and procedures should have prominent, sufficient and adequate practical guidance for employees in order to avoid a similar breach occurring again. This also needs to include regular reviews, and proactive work to increase staff awareness of these. 6. Parkside should take steps to test all of the new processes introduced as a result of this incident and ensure they are embedded within the organisation. 5