Employee Data Privacy

United Kingdom - Security Requirements

 Download as a PDF

What security obligations are imposed on data controllers and data processors? 

Security requirements may not always be included in the data protection law, but are key to guaranteeing lawful processing of personal data. The entity processing the data must take all useful precautions with respect to the nature of the data and the risk presented by the processing, to preserve the security of the data and prevent alteration, corruption or access by unauthorized third parties. Appropriate technical and organizational measures shall be implemented to ensure a level of security appropriate to the risk.


Employers in the UK should follow the general security standards listed in Article 32 of the General Data Protection Regulation (GDPR). The UK passed the Data Protection Act 2018 (“Act”) to implement the GDPR and to allow for continued application of the GDPR once the UK leaves the EU. The Act largely mirrors GDPR requirements.


When protecting employee and applicant data, consider the sensitivity of the information, the technology available, the expense of protecting the data and the risk to individuals if the data is compromised. Then take organizational and technological measures, including:

  • pseudonymization/encryption;
  • measures to ensure the confidentiality, integrity, availability and resilience of information processing systems
  • measures to restore the system and access in case of an incident (such as a power outage) 
  • processes to regularly test and assess the system to ensure continued security.

The UK’s Information Commissioner's Office (ICO) recommends that organizations should adopt best practice methodologies such as ISO 27001.

 

HR Best Practices: Ensure contracts with service providers detail the security and confidentiality measures to be implemented. Areas that should be considered include:

  • data access protection (with a clear access and password policy)
  • electronic data storage
  • data transfer (encryption)
  • data disposal (for example, the data processor can commit to take all necessary steps to ensure that all business-critical information is removed from any decommissioned computers or external drives)
  • employee awareness (through training programs and similar)

 


Ultimate Software's HR Compliance Assist team relies on a network of internal and external compliance experts and lawyers to provide clients with best practices and recommendations on topics such as HR document retention, employee data privacy, and HR electronic records. HR Compliance Assist also provides local compliance monitoring and alert services in select countries where Ultimate Software's customers have employees. HR Compliance Assist is a service exclusively available to Ultimate Software customers.

Share Your Feedback

Let's Talk