Muutke küpsiste eelistusi

E-raamat: Data Protection in the Financial Services Industry [Taylor & Francis e-raamat]

  • Formaat: 242 pages
  • Ilmumisaeg: 28-Jan-2006
  • Kirjastus: Gower Publishing Ltd
  • ISBN-13: 9781315258508
  • Taylor & Francis e-raamat
  • Hind: 161,57 €*
  • * hind, mis tagab piiramatu üheaegsete kasutajate arvuga ligipääsu piiramatuks ajaks
  • Tavahind: 230,81 €
  • Säästad 30%
  • Formaat: 242 pages
  • Ilmumisaeg: 28-Jan-2006
  • Kirjastus: Gower Publishing Ltd
  • ISBN-13: 9781315258508
Privacy and data protection are now important issues for companies across the financial services industry. Financial records are amongst the most sensitive for many consumers and the regulator is keen to promote good data handling practices in an industry that is looking towards increased customer profiling, for both risk management and opportunity spotting. Mandy Webster's Data Protection in the Financial Services Industry explains how to manage privacy and data protection issues throughout the customer cycle; from making contact to seeking additional business from current customers. She also looks at the precise role of the Financial Services Authority and its response to compliance or non-compliance. Each of the Eight Principles of the Data Protection Act are reviewed and explained.
Introduction
1(4)
Part 1 The Principles
5(102)
Definitions
7(14)
Personal Data
7(4)
Data subject
11(1)
Data controller
12(1)
Processing
13(1)
Data processor
13(1)
European Economic Area
14(1)
Relevant filing system
15(1)
Notification
16(1)
Safe harbor
17(1)
Sensitive data
17(1)
Third party
17(1)
Accessible record
18(1)
Table of definition sources in the Data Protection Act 1998
19(2)
The First Principle
21(24)
Interpretation
21(1)
The general duty to process fairly and lawfully
22(1)
The requirement to meet one or more of the conditions for fair processing
23(6)
Meeting one or more of the conditions for fair processing of sensitive data
29(9)
The requirement to provide subject information
38(7)
The Second Principle
45(6)
Interpretation
45(1)
Personal data must be obtained for specific purposes
45(2)
All purposes for which data is processed must be lawful
47(1)
All processing must relate to the original purpose or purposes for which data was obtained
47(1)
Risk management in relation to the second principle
48(2)
Limited exemption -- processing for research purposes
50(1)
The Third Principle
51(8)
Interpretation
51(1)
Personal data to be adequate for the purpose
51(2)
Personal data to be relevant to the purpose
53(1)
Personal data not to be excessive for the purpose
54(1)
Subjective judgment of what is adequate, relevant and not excessive
54(1)
Information not required for current or reasonably imminent purposes
55(1)
How adequacy, relevance and excess are assessed
56(1)
The effect of time on compliance with the third principle
56(1)
Published guidance -- some examples
57(2)
The Fourth Principle
59(4)
Accuracy
59(2)
Keeping personal data up to date
61(1)
Examples involving the fourth principle
61(2)
The Fifth Principle
63(6)
Determining how long data should be retained
63(2)
Permanent deletion of data held on computer
65(1)
Purging files and records
65(2)
Exemption for data held for research purposes
67(1)
Compliance strategies
68(1)
The Sixth Principle
69(14)
Subject access request
70(7)
Other data subject rights
77(3)
Rights not covered by the sixth principle
80(1)
Risk management strategies
81(2)
The Seventh Principle
83(14)
Basic requirement for security of personal data
83(5)
Employees and the security of personal data
88(1)
Data controllers and data processors
89(6)
Risk management strategies
95(1)
Conclusion
96(1)
The Eighth Principle
97(10)
What is a 'transfer'?
97(1)
A prohibition on transfers outside the EEA
98(1)
Exceptions to the prohibition
99(3)
Assessing adequacy
102(4)
Becoming aware of inadequate protection
106(1)
Summary
106(1)
Part II Key Implications Relating to the Stages of the Financial Services' Customer Life Cycle
107(88)
What Is Personal Data?
109(2)
Advertising and the Impact of the First and Second Principles
111(14)
Non-targeted promotions
111(2)
Subject information -- what is required?
113(5)
Special rules for websites
118(1)
The role of product provider
119(1)
The role of the intermediary
120(1)
Affinity marketing and its effect on traditional roles
121(2)
Conclusion
123(2)
Marketing and Privacy Issues
125(16)
Definition of direct marketing
125(1)
A general rule for direct marketing
126(1)
Special rules for direct mail
126(1)
Special rules for telephone calling
127(4)
Special rules for marketing by email and text messaging
131(3)
Renting or using lists
134(2)
Using personal information as marketing material
136(2)
Conclusion
138(3)
The Sales Process and the Third Principle
141(12)
The enquiry or application form
141(1)
Record-keeping requirements
141(1)
Creating and maintaining adequate records
142(2)
Checks and referrals
144(1)
Credit applications
144(3)
Money laundering prevention measures
147(3)
Medical reports
150(2)
Conclusion
152(1)
Using Sensitive Data
153(6)
Sensitive categories of information
153(1)
Sensitive data in the application process
154(1)
Sensitive data in insurance claims
155(1)
Sensitive data in other areas
156(1)
Conclusion
157(2)
Record-keeping and the Fourth and Fifth Principles
159(6)
Ensuring accuracy
159(1)
Keeping personal information up to date
160(1)
Other guidance
161(1)
Keeping personal information for no longer than is necessary
162(2)
Conclusion
164(1)
Security: The Practical Implications of the Seventh Principle
165(8)
Unauthorised and unlawful processing
165(2)
Security measures
167(3)
The security requirements of being an outsource service provider
170(2)
Conclusion
172(1)
The Exercise of Subject Rights and the Sixth Principle
173(10)
Subject access request
174(3)
The right to prevent processing for the purposes of direct marketing
177(1)
The right to object to decisions taken by automated means
178(1)
The right to prevent processing likely to cause damage or distress
179(1)
The right to compensation
180(1)
Rights in relation to inaccurate data
181(1)
Examples of breaches of subject rights
181(1)
Conclusion
182(1)
Outsourcing to India
183(12)
The effect of the seventh principle
183(6)
Data processors outside of UK jurisdiction
189(3)
Conclusion
192(3)
Part III The Regulatory Framework
195(30)
The Information Commissioner
197(6)
Structure of the Office of the Information Commissioner
197(1)
Responsibilities and functions
198(5)
Notification
203(4)
Activities subject to notification
203(1)
Exemptions
204(1)
Who can notify?
205(1)
Consequences of not being registered
205(1)
How to notify
205(1)
Risk management strategies
206(1)
Conclusion
206(1)
Criminal Offences
207(4)
Notification offences
207(1)
Unauthorised disclosure and obtaining
207(1)
Enforced subject access
208(1)
Frustrating a subject access request
208(1)
Liability for data protection offences
209(1)
Penalties
209(2)
The Financial Services Authority
211(10)
About the FSA
211(1)
The use of personal information by the FSA
212(2)
The FSA approach to data protection regulation of member firms
214(1)
Recruitment of approved persons
215(3)
Whistle blowing
218(3)
Conflict between Laws and Regulation
221(4)
Determining precedence -- provisions in the Data Protection Act 1998
221(3)
Provisions in other legislation
224(1)
Conflicts
224(1)
Conclusion
224(1)
Bibliography 225(2)
Index 227


Mandy Webster is a Chartered Secretary and a barrister. An in-house career as a company secretary and lawyer for 15 years gave her a wealth of experience of business issues and instilled the need for business-friendly solutions. She set up Data Protection Consulting in June 1999 offering audit, advice and training on data protection compliance. Data Protection Consulting is a member of the Institute of Chartered Secretaries and Administrators Public Practice Scheme. Her book, Data Protection for the HR Manager was published by Gower in 2003.