BREACH-TTX Data Protection Policy

Main points

To help protect people’s personal data, keep to these Dos and Don’ts:

  • Always treat people’s personal information with integrity and confidentiality

  • Know what the data protection principles are and apply them

  • Store hard copies securely and transfer them directly to recipients

  • Use your encrypted USB drives to store and transfer data where needed

  • You have an organizational email address and remote access. Use it rather than send data to your personal email.

  • Be alert to cyberattacks and report suspicious emails or calls

  • Report losses of data or devices as soon as possible

  • Before sending direct marketing, ask the DPO if this is appropriate

  • Take care to use the ‘bcc’ option for bulk emailing

  • Beware of autocomplete on email. Check you are sending to the right address

  • Ensure your personal device has appropriate security measures if using it for work-related activity

  • If you have a question about any data protection issue, ask the DPO

    1. Introduction
    The security and management of data is important to ensure that we can function effectively and successfully for the benefit of our members and for the community and voluntary sector. Any material changes to this document are managed by the DPO on a as required basis. Users will be notified in the event of any material changes by direct email. 

    In doing so, it is essential that people’s privacy is protected through the lawful and appropriate use and handling of their personal information. The use of all personal data by BREACH-TTX is governed by:

    • Canadian privacy legislation for private organizations (PIPEDA)

    • Ontario school/board privacy legislation (MFIPPA)

    • The General Data Protection Regulation (GDPR)

    • The UK Data Protection Act 2018 (DPA)

    • The Privacy and Electronic Communications Regulations (PECR) Every member of staff has a responsibility to adhere to the Data Protection Principles outlined in the GDPR, and to this Data Protection Policy.


  • If you have a question about this Data Protection Policy or an area of concern about data protection matters, please contact our Data Protection Officer (DPO). The DPO is Kyle Boyko.


    2. BREACH-TTX Data protection principles
    There are nine VRTA data protection principles. These require that all personal data be:

    • processed in a lawful, fair and transparent manner.

    • collected only for specific, explicit and limited purposes (‘purpose limitation’).

    • adequate, relevant and not excessive (‘data minimisation’).

    • accurate and kept up-to-date where necessary.

    • kept for no longer than necessary (‘retention’).

    • handled with appropriate security and confidentiality. We are committed to upholding the data protection principles. All personal data under our control must be processed in accordance with these principles.

    • The company does not sell or distribute user data to any third parties for a purpose other than providing the app service

    • No data or personal information is collected from users or used for any purpose other than providing the software service

    • The application does not track student behaviour outside of the application

    • The application does not use targeted advertising


      3. Lawful processing

    • All processing of personal data must meet one of the six lawful bases defined in Article 6(2) of the GDPR:

      • Where we have the consent of the data subject

      • Where it is in our legitimate interests, and this is not overridden by the rights and freedoms of the data subject.

      • Where necessary to meet a legal obligation.

      • Where necessary to fulfil a contract, or pre-contractual obligations.

      • Where we are protecting someone’s vital interests.

      • Where we are fulfilling a public task or acting under official authority.

    • Any special category data (sensitive types of personal data as defined in Article 9(1) of the GDPR) must further be processed only in the line with one of the conditions specified in Article 9(2).

    • The most appropriate lawful basis will be noted in the Data Processing Register. (see Section 5. Accountability)

    • Where processing is based on consent, the data subject has the option to easily withdraw their consent.

    • Where electronic direct marketing communications are being sent, the recipient should have the option to opt-out in each communication sent, and this choice should be recognised and adhered to by us.


      4. Data minimization and control

    • Data collection processes will be regularly reviewed by the Data Governance Group to ensure that personal data collected and processed is kept to a minimum.

    • We will keep the personal data that we collect, use and share to the minimum amount required to be adequate for its purpose.

    • Where we do not have a legal obligation to retain some personal data, we will consider whether there is a business need to hold it.

    • We will retain personal data only for as long as it is necessary to meet its purpose. Our approach to retaining and erasing data no longer required will be specified in the retention policy and schedule. This schedule will be reviewed annually by the company and the DPO.

    • In the case of sharing personal data with any third party, only the data that is necessary to fulfil the purpose of sharing will be disclosed.

    • Anonymisation and pseudonymisation of personal data stored or transferred should be considered where doing so is a possibility.


      5. Accountability

    • BREACH-TTX will maintain a Data Processing Register as required by Article 30 of the GDPR to document regular processing activities.

    • The ‘Data Protection Officer’ (DPO) has the specific responsibility of overseeing data protection and ensuring that we comply with the data protection principles and relevant legislation. (see Section 8. Role of the Data Protection Officer).

    • The DPO will ensure that the Data Processing Register is kept up to date and demonstrates how the data protection principles are adhered to by our activities. Individual members of staff have a duty to contribute to ensure that the measures outlined in the Register are accurately reflected in our practice.

    • The Data Governance Group monitors our compliance with relevant policies and regulatory requirements in respect of data protection as part of our Data Management Strategy.

    • All employees, volunteers, consultants, partners or other parties who will be handling personal data on behalf of BREACH-TTX will be appropriately trained and supervised where necessary.

    • The collection, storage, use and sharing of personal data will be regularly reviewed by the Data Protection Officer, the Governance Group, and any relevant business area.

    • We will adhere to relevant codes of conduct where they have been identified and discussed as appropriate.

    • Where there is likely to be a high risk to individuals rights and freedoms due to a processing activity, we will first undertake a Data Protection Impact Assessment (DPIA) and consult with the ICO prior to processing if necessary.


      6. Use of processors

    • BREACH-TTX must only appoint processors who can provide sufficient guarantees around compliance with the GDPR and that the rights of data subjects will be protected.

    • Where a processor can demonstrate that they adhere to approved codes of conduct or certification schemes, this should be taken into consideration for choice of supplier.

    • Where BREACH-TTX uses a processor, a written contract with compulsory terms as set out in Article 28 of the GDPR must be in place (plus any additional requirements that we determine). Processors can only act on the instruction of InspireTech.


      7. Organizational measures

    • All devices owned by BREACH-TTX will have hardware encryption set up by default where possible, including laptops, mobile devices and removable media & all user data is encrypted in transit and at rest.

    • All staff, contractors, temporary workers, consultants, partners or anyone else working on behalf of BREACH-TTX and handling personal data are bound by the data protection legislation and this Policy.

    • Where any contractor, temporary worker, consultant, or anyone else working on behalf of BREACH-TTX fails in their obligations under this Policy, they shall indemnify BREACH-TTX against any cost, liabilities, damages, loss, claims or proceedings that may arise from that failure.


      8. Role of the Data Protection Officer

    • The Data Protection Officer role is assigned to a member of staff on a voluntary basis i.e. we are not legally obliged to have a DPO. We have chosen to do so as part of demonstrating our accountability and ensuring our compliance with data protection requirements.

    • The DPO assists BREACH-TTX to:

      • monitor our internal compliance

      • inform and advise on our data protection obligations

      • provide advice regarding Data Protection Impact Assessments

      • act as a contact point for data subjects and the Information Commissioner’s Office.

    • The DPO advises the Data Governance Group and reports to Senior Management and to VRTA’s Executive Resources Committee on data protection matters.

    • The DPO is easily accessible as a point of contact for staff for data protection issues and is identified as the point of contact in our privacy notice and other external material.

    • The DPO identifies, organizes and delivers training for staff and meets with new staff during their induction to discuss data protection matters, including this policy.

    • The DPO is required to have appropriate knowledge of data protection law and best practice, and is provided with adequate resources to help them carry out their role. This might include appropriate training and accreditation where identified.

    • The DPO is nominally responsible for carrying out responses to requests made by data subjects, reporting breaches and drawing up policies and procedures.

    • This does not preclude another responsible member of staff for carrying out these duties.


      9. Procedures for staff

      All members of staff must comply with these procedures for processing or transmitting personal data. In addition, staff should be aware of and adhere to policies around the Acceptable usage of ICT systems, and any other guidance issued in relation to cyber security and the use of personal data.

    • Always treat people’s personal information with integrity and confidentiality. Don’t hand out personal details just because someone asks you to.

    • Where personal data exists as hard copy, it should be stored in a locked box, drawer or cabinet, and not left where anyone could access it.

    • The transfer of hard copies should be passed directly to the recipient.

    • Staff are issued with encrypted USB devices for the secure transfer of personal data or sensitive information. No other removable media devices should be used to transfer these types of information without permission from the Systems Administrator or Head of Information Management.

    • The loss or theft of any device should be reported as soon as possible to the DPO, Systems Administrator or Head of Information Management.

    • Take care when connecting to public wi-fi connections, as these can expose your connection to interception. If you’re not sure if a connection is secure, do not connect to it.

    • Use marketing lists in CRM where appropriate. These can be used for follow up emails from a training session, or to send reminders prior to an event. Should marketing emails be sent to the user/ operator; an option to opt out of receiving the direct marketing will be provided.

    • If you are thinking of sending marketing to individuals, consult with the DPO first, as there are certain laws that apply to electronic direct marketing. This could include anything that promotes the aims or purpose of BREACH-TTX, including promoting an event or seeking engagement.

    • Take care to email the intended recipient (especially where email address autocomplete is turned on). Use the ‘bcc’ field for emailing several people where using ‘to’ or ’cc’ is not needed.

    • These procedures and policies also apply to the use of remote access to BREACH-TTX. If you are using your own device to access personal data on Office365 (e.g. Outlook or Dynamics CRM), ensure that your device has a firewall and is password protected.

    • If you do have a question or are unsure about any of these procedures, contact the Data Protection Officer or a member of the Information Team.


      10. Rights of data subjects

    • Under data protection laws, data subjects have certain rights:

      • Right to be informed. The right to be told how their personal data is used in clear and transparent language.

      • Right of access. The right to know and have access to the personal data we hold about them.

      • Right to data portability. The right to receive their data in a common and machine-readable electronic format.

      • Right to be forgotten. The right to have their personal data erased.

      • Right to rectification. The right to have their personal data corrected where it is inaccurate or incomplete.

      • Right to object. The right to complain and to object to processing.

      • Right to purpose limitation. The right to limit the extent of the processing of their personal data.

      • Rights related to automated decision-making and profiling. The right not to be subject to decisions without human involvement.

    • We will uphold individuals’ rights under data protection laws and allow them to exercise their rights over the personal data we hold about them. Privacy information will acknowledge these rights and explain how individuals can exercise them. Most rights are not absolute, and the individual will be able to exercise them depending on the circumstances, and exemptions may apply in some cases.

    • Any request in respect of these rights should preferably be made in writing to kyle@vrtaonline.com, but we will also accept verbal requests.

    • There is no fee for facilitating a request, unless it is ‘manifestly unfounded or excessive’, in which case administrative costs can be recovered.

    • Requests that are ‘manifestly unfounded or excessive’ can be refused.

    • We will take reasonable measures to require individuals to prove their identity where it is not obvious that they are the data subject.

    • We will respond to the request within one month from the date of request or being able to identify the person, unless it is particularly complex (in which case we will respond in no longer than 90 days).

    • The DPO will ensure that required actions are taken and that the appropriate response is facilitated within the deadline.

    • The DPO will draw up procedures for responding to requests where necessary, for example, for facilitating Subject Access Requests.


      11. Reporting of breaches

    • A personal data breach means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data.

    • All members of staff should be vigilant and able to identify a suspected personal data breach. A breach could include:

      • loss or theft of devices or data, including information stored on USB drives or on paper

      • hacking or other forms of unauthorized access to a device, email account, or the network

      • disclosing personal data to the wrong person, through wrongly addressed emails, or bulk emails that inappropriately reveal all recipients email addresses

      • alteration or destruction of personal data without permission

    • Where a member of staff discovers or suspects a personal data breach, this should be reported to the DPO as soon as possible.

    • Where there is a likely risk to individuals’ rights and freedoms, the DPO will report the personal data breach to the ICO within 72 hours of the organization being aware of the breach.

    • Where there is also a likely high risk to individuals’ rights and freedoms, BREACH-TTX will inform those individuals without undue delay via direct email.

    • The DPO will keep a record of all personal data breaches reported and follow up with appropriate measures and improvements to reduce the risk of reoccurrence.