Contents 

1.   Aims    

2.   Legislation and Guidance    

3.   Definitions    

4.   The Data Controller    

5.   Roles and Responsibilities    

6.   Data Protection Principles    

7.   Collecting Personal Data    

8.   Sharing Personal Data    

9.   Subject Access Requests and Other Rights of Individuals    

10.   Biometric Recognition Systems    

11.   CCTV    

12.   Photographs and Videos    

13.   Artificial intelligence (AI)    

14.  Data Protection by Design and Default    

15.   Data Security and Storage of Records    

16.   Disposal of Records    

17.   Personal Data Breaches    

18.  Training    

19.  Monitoring Arrangements    

Appendix 1: Personal Data Breach Procedure    

Policy Cover Note 

  

Title of the Policy 

ACE Data Protection Policy 

Summary/Reason for bringing to Bord for Approval 

Reviewed Annually 

Statutory Requirement 

Yes 

Decisions to be made / recommendation on options 

 

Name of the author 

ANNE CASEY

Date written 

September 2023 

Date for Review 

September 2024 

Policy/Procedure to be published on the trust website 

Yes 

Policy/procedure to be published on the Academy/Primary website 

Yes 

Amendments/Updates 

Artificial Intelligence and the risks to sensitive and personal data has been added 

 

 

      

ACE Trust Data Protection Policy 

 

1.      Aims 

 

ACE aims to ensure that all personal data collected about clients and other individuals is collected, stored, and processed in accordance with UK Data Protection Law. 

 

This policy applies to all personal data, regardless of whether it is in paper or electronic format. 

 

 

2.      Legislation and Guidance 

 

This policy meets the requirements of the:  

 

 

It is based on guidance published by the Information Commissioner’s Office (ICO) on the UK GDPR and guidance) on Generative artificial intelligence in education

It also reflects the ICO’s guidance for the use of surveillance cameras and personal information. 

 


 

3.      Definitions 

 

TERM 

DEFINITION 

Personal data 

Any information relating to an identified, or identifiable, living individual. 

This may include the individual’s:  

Name (including initials) 

Identification number 

Location data 

Online identifier, such as a username 

It may also include factors specific to the individual’s physical, physiological, genetic, mental, economic, cultural or social identity. 

Special categories of personal data 

Personal data which is more sensitive and so needs more protection, including information about an individual’s: 

Racial or ethnic origin 

Political opinions 

Religious or philosophical beliefs 

Trade union membership 

Genetics 

Biometrics (such as fingerprints, retina and iris patterns), where used for identification purposes 

Health – physical or mental 

Sex life or sexual orientation 

TERM 

DEFINITION 

Processing  

Anything done to personal data, such as collecting, recording, organising, structuring, storing, adapting, altering, retrieving, using, disseminating, erasing or destroying. 

Processing can be automated or manual. 

Data subject 

The identified or identifiable individual whose personal data is held or processed. 

Data controller 

A person or organisation that determines the purposes and the means of processing of personal data. 

Data processor  

A person or other body, other than an employee of the data controller, who processes personal data on behalf of the data controller. 

Personal data breach 

A breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data. 

 

4.      The Data Controller 

 

ACE Trust processes personal data relating to clients  and others, and therefore is a data controller. 

 

 

 

5.      Roles and Responsibilities 

 

This policy applies to all staff employed by EFA Trust, and to external organisations or individuals working on our behalf. Staff who do not comply with this policy may face disciplinary action. 

 

5.1  Board 

The Directors has overall responsibility for ensuring that the Trust comply with all relevant data protection obligations. 

 

5.2 Data Protection Officer 

The data protection officer (DPO) is responsible for overseeing the implementation of this policy, monitoring our compliance with data protection law, and developing related policies and guidelines where applicable. 

 

They will provide an annual report of their activities directly to the governing board and, where relevant, report to the board their advice and recommendations on school data protection issues.  

 

The DPO is also the first point of contact for individuals whose data the school processes, and for the ICO. 

 

Full details of the DPO’s responsibilities are set out in their job description. 

 

Our DPO is Mr Sam West and is contactable via email:  samwestengineering@gmail.com

 

5.3 Director

The Director acts as the representative of the data controller on a day-to-day basis. 

 

5.4 All Staff 

Staff are responsible for: 

  • Collecting, storing and processing any personal data in accordance with this policy 
  • Informing the Trust of any changes to their personal data, such as a change of address ➢ Contacting the DPO in the following circumstances:  
    • With any questions about the operation of this policy, data protection law, retaining personal data or keeping personal data secure 
    • If they have any concerns that this policy is not being followed 
    • If they are unsure whether or not they have a lawful basis to use personal data in a particular way 
    • If they need to rely on or capture consent, draft a privacy notice, deal with data protection rights invoked by an individual, or transfer personal data outside the UK 
    • If there has been a data breach 
    • Whenever they are engaging in a new activity that may affect the privacy rights of individuals 
    • If they need help with any contracts or sharing personal data with third parties 
    • If they suspect that an individual has exercised a data right under the GDPR 

 

 

6.      Data Protection Principles 

 

The UK GDPR is based on data protection principles that the Trust must comply with.  The principles say that personal data must be: 

 

  • Processed lawfully, fairly and in a transparent manner 
  • Collected for specified, explicit and legitimate purposes 
  • Adequate, relevant and limited to what is necessary to fulfil the purposes for which it is processed 
  • Accurate and, where necessary, kept up to date 
  • Kept for no longer than is necessary for the purposes for which it is processed 
  • Processed in a way that ensures it is appropriately secure 

 

This policy sets out how the Trust aims to comply with these principles. 

 

7.      Collecting Personal Data 

 

7.1 Lawfulness, Fairness and Transparency 

We will only process personal data where we have one of 6 ‘lawful bases’ (legal reasons) to do so under data protection law: 

 

  • The data needs to be processed so that the Trust can fulfil a contract with the individual, or the individual has asked the Trust to take specific steps before entering into a contract 
  • The data needs to be processed so that the Trust can comply with a legal obligation  
  • The data needs to be processed to ensure the vital interests of the individual or another person i.e. to protect someone’s life 
  • The data needs to be processed so that the Trust, as a public authority, can perform a task in the public interest or exercise its official authority 
  • The data needs to be processed for the legitimate interests of the Trust (where the processing is not for any tasks the Trust performs as a public authority) or a third party, provided the individual’s rights and freedoms are not overridden 
  • The individual (or their parent/carer when appropriate in the case of a student) has freely given clear consent  

 

For special categories of personal data, we will also meet one of the special category conditions for processing under data protection law: 

 

  • The individual has given explicit consent 
  • The data needs to be processed to perform or exercise obligations or rights in relation to employment, social security or social protection law 
  • The data needs to be processed to ensure the vital interests of the individual or another person, where the individual is physically or legally incapable of giving consent 
  • The data has already been made manifestly public by the individual 
  • The data needs to be processed for the establishment, exercise or defence of legal claims 
  • The data needs to be processed for reasons of substantial public interest as defined in legislation 
  • The data needs to be processed for health or social care purposes, and the processing is done by, or under the direction of, a health or social work professional or by any other person obliged to confidentiality under law 
  • The data needs to be processed for public health reasons, and the processing is done by, or under the direction of, a health professional or by any other person obliged to confidentiality under law 
  • The data needs to be processed for archiving purposes, scientific or historical research purposes, or statistical purposes, and the processing is in the public interest 

 

For criminal offence data, we will meet both a lawful basis and a condition set out under the data protection law. Conditions include: 

 

  • The individual (or their parent/carer when appropriate in the case of a student) has given consent 
  • The data needs to be processed to ensure the vital interests of the individual or another person, where the individual is physically or legally incapable of giving consent 
  • The data has already been made manifestly public by the individual 
  • The data needs to be processed for or in connection with legal proceedings, to obtain legal advice, or for the establishment, exercise or defence of legal rights 
  • The data needs to be processed for reasons of substantial public interest as defined in legislation 

 

Whenever we first collect personal data directly from individuals, we will provide them with the relevant information required by data protection law. 

 

We will always consider the fairness of our data processing. We will ensure we do not handle personal data in ways that individuals would not reasonably expect, or use personal data in ways which have unjustified adverse effects on them. 

 

7.2 Limitation, Minimisation and Accuracy 

We will only collect personal data for specified, explicit and legitimate reasons. We will explain these reasons to the individuals when we first collect their data. 

 

If we want to use personal data for reasons other than those given when we first obtained it, we will inform the individuals concerned before we do so, and seek consent where necessary. 

 

Staff must only process personal data where it is necessary in order to do their jobs. 

 

We will keep data accurate and, where necessary, up-to-date. Inaccurate data will be rectified or erased when appropriate. 

 

In addition, when staff no longer need the personal data they hold, they must ensure it is deleted or anonymised. This will be done in accordance with the Trust’s record retention schedule. 

 

8.      Sharing Personal Data 

 

We will not normally share personal data with anyone else without consent, but there are certain circumstances where we may be required to do so. These include, but are not limited to, situations where: 

  • There is an issue with a student or parent/carer that puts the safety of our staff at risk 
  • We need to liaise with other agencies – we will seek consent as necessary before doing this 
  • Our suppliers or contractors need data to enable us to provide services to our staff and students – for example, IT companies. When doing this, we will: 
    • Only appoint suppliers or contractors which can provide sufficient guarantees that they comply with UK data protection law 
    • Establish a contract with the supplier or contractor to ensure the fair and lawful processing of any personal data we share 
    • Only share data that the supplier or contractor needs to carry out their service 

 

We will also share personal data with law enforcement and government bodies where we are legally required to do so. 

 

We may also share personal data with emergency services and local authorities to help them to respond to an emergency situation that affects any of our students or staff. 

 

Where we transfer personal data internationally, we will do so in accordance with UK data protection law. 

 

9.      Subject Access Requests and Other Rights of Individuals 

 

9.1 Subject Access Requests 

Individuals have a right to make a ‘subject access request’ to gain access to personal information that the Trust holds about them. This includes: 

 

  • Confirmation that their personal data is being processed 
  • Access to a copy of the data 
  • The purposes of the data processing 
  • The categories of personal data concerned 
  • Who the data has been, or will be, shared with 
  • How long the data will be stored for, or if this isn’t possible, the criteria used to determine this period 
  • Where relevant, the existence of the right to request rectification, erasure or restriction, or to object to such processing 
  • The right to lodge a complaint with the ICO or another supervisory authority 
  • The source of the data, if not the individual 
  • Whether any automated decision-making is being applied to their data, and what the significance and consequences of this might be for the individual 
  • The safeguards provided if the data is being transferred internationally 

 

Subject access requests can be submitted in any form, but we may be able to respond to requests more quickly if they are made in writing and include: 

 

  • Name of individual 
  • Correspondence address 
  • Contact number and email address 
  • Details of the information requested 

 

If staff receive, or suspect that a subject access request has been made in any form they must immediately forward it to the DPO. 

 

9.2 Children and Subject Access Requests 

Personal data about a child belongs to that child, and not the child's parents or carers. For a parent or carer to make a subject access request with respect to their child, the child must either be unable to understand their rights and the implications of a subject access request, or have given their consent. 

Children below the age of 12 are generally not regarded to be mature enough to understand their rights and the implications of a subject access request. Therefore, most subject access requests from parents or carers of students at our school may be granted without the express permission of the student. This is not a rule and a student’s ability to understand their rights will always be judged on a case-by-case basis. 

 

Children aged 12 and above are generally regarded to be mature enough to understand their rights and the implications of a subject access request. Therefore, most subject access requests from parents or carers of students at our school may not be granted without the express permission of the student. This is not a rule and a student’s ability to understand their rights will always be judged on a case-by-case basis. 

 

9.3 Responding to Subject Access Requests When responding to requests, we:  

 

  • May ask the individual to provide 2 forms of identification 
  • May contact the individual via phone to confirm the request was made  
  • Will respond without delay and within 1 month of receipt of the request (or receipt of the additional information needed to confirm identity, where relevant) 
  • Will provide the information free of charge 
  • May tell the individual we will comply within 3 months of receipt of the request, where a request is complex or numerous. We will inform the individual of this within 1 month, and explain why the extension is necessary 

 

We may not disclose information for a variety of reasons, such as if it: 

 

  • Might cause serious harm to the physical or mental health of the student or another individual 
  • Would reveal that the child is being or has been abused, or is at risk of abuse, where the disclosure of that information would not be in the child’s best interests 
  • Would include another person’s personal data that we can’t reasonably anonymise, and we don’t have the other person’s consent and it would be unreasonable to proceed without it 
  • Is part of certain sensitive documents, such as those related to crime, immigration, legal proceedings or legal professional privilege, management forecasts, negotiations, confidential references, or exam scripts 

 

If the request is unfounded or excessive, we may refuse to act on it, or charge a reasonable fee to cover administrative costs. We will take into account whether the request is repetitive in nature when making this decision. 

 

When we refuse a request, we will tell the individual why, and tell them they have the right to complain to the ICO or they can seek to enforce their subject access right through the courts. 

 

9.4 Other Data Protection Rights of the Individual 

In addition to the right to make a subject access request (see above), and to receive information when we are collecting their data about how we use and process it (see section 7), individuals also have the right to: 

 

  • Withdraw their consent to processing at any time 
  • Ask us to rectify, erase or restrict processing of their personal data (in certain circumstances) 
  • Prevent use of their personal data for direct marketing 
  • Object to processing which has been justified on the basis of public interest, official authority or legitimate interests 
  • Challenge decisions based solely on automated decision making or profiling (i.e. making decisions or evaluating certain things about an individual based on their personal data with no human involvement) ✓ Be notified of a data breach (in certain circumstances) 
  • Make a complaint to the ICO 
  • Ask for their personal data to be transferred to a third party in a structured, commonly used and machine readable format (in certain circumstances) 

 

Individuals should submit any request to exercise these rights to the DPO. If staff receive such a request, they must immediately forward it to the DPO. 

 

      

10.      Biometric Recognition Systems 

 

ACE does not use biometric information for students or staff. 

 

11.      CCTV 

 

We use CCTV in various locations around the ACE Headquaters to ensure it remains safe. We will follow the ICO’s guidance for the use of CCTV, and comply with data protection principles.  

 

We do not need to ask individuals’ permission to use CCTV, but we make it clear where individuals are being recorded. Security cameras are clearly visible and accompanied by prominent signs explaining that CCTV is in use. 

 

CCTV is in use in order to monitor the health and safety of the premises, to ensure that only those permitted to have access to the school are on our premises and to prevent and detect crime or unlawful acts. CCTV images are monitored from time to time and may be used in disciplinary, grievance, complaints or management processes. We may also need to share these images with the Court/Tribunal, Police, regulatory bodies, a relevant local authority or those who are entitled to consider it where is it used as evidence.   

 

Any enquiries about the CCTV system should be directed to the Principal in each respective school. 

 

12.      Photographs and Videos 

 

We do not take photos in out work without written permission form the client.

13.      Artificial intelligence (AI) 

 

Artificial intelligence (AI) tools are now widespread and easy to access. 

 

To ensure that personal and sensitive data remains secure, no one will be permitted to enter such data into unauthorised generative AI tools or chatbots and these have been restricted by ICT where possible. 

 

If personal and/or sensitive data is entered into an unauthorised generative AI tool, ACE will treat this as a data breach, and will follow the personal data breach procedure outlined in appendix 1. 

 

 

14.     Data Protection by Design and Default 

 

We will put measures in place to show that we have integrated data protection into all of our data processing activities, including: 

 

  • Appointing a suitably qualified DPO, and ensuring they have the necessary resources to fulfil their duties and maintain their expert knowledge 
  • Only processing personal data that is necessary for each specific purpose of processing, and always in line with the data protection principles set out in relevant data protection law (see section 6) 
  • Completing data protection impact assessments where the Trust’s processing of personal data presents a high risk to rights and freedoms of individuals, and when introducing new technologies (the DPO will advise on this process) 
  • Integrating data protection into internal documents including this policy, any related policies and privacy notices 
  • Regularly training members of staff on data protection law, this policy, any related policies and any other data protection matters; we will also keep a record of attendance 
  • Regularly conducting reviews and audits to test our privacy measures and make sure we are compliant 
  • Appropriate safeguards being put in place if we transfer any personal data outside of the UK, where different data protection laws will apply 
  • Maintaining records of our processing activities, including:  
    • For the benefit of data subjects, making available the name and contact details of our Trust and DPO and all information we are required to share about how we use and process their personal data (via our privacy notices) 
    • For all personal data that we hold, maintaining an internal record of the type of data, type of data subject, how and why we are using the data, any third-party recipients, any transfers outside of the UK and the safeguards for those, retention periods and how we are keeping the data secure 

 

15.      Data Security and Storage of Records 

 

We will protect personal data and keep it safe from unauthorised or unlawful access, alteration, processing or disclosure, and against accidental or unlawful loss, destruction or damage. In particular: 

 

  • Paper-based records and portable electronic devices, such as laptops and hard drives that contain personal data, are kept under lock and key when not in use 
  • Papers containing confidential personal data must not be left on office and classroom desks, on staffroom tables, or left anywhere else where there is general access 
  • Where personal information needs to be taken off site, staff must ensure it is brought back and confidentially disposed of. 
  • Passwords that are at least 10 characters long containing letters and numbers are used to access school computers, laptops and other electronic devices. Staff and pupils are reminded that they should not reuse passwords from other sites  
  • Encryption software is used to protect all portable devices and removable media, such as laptops and USB devices 
  • Staff, students or governors who store personal information on their personal devices are expected to follow the same security procedures as for school-owned equipment (see our ICT policy/acceptable use agreement/policy on acceptable use) 
  • Where we need to share personal data with a third party, we carry out due diligence and take reasonable steps to ensure it is stored securely and adequately protected (see section 8) 

 

16.      Disposal of Records 

 

Personal data that is no longer needed will be disposed of securely. Personal data that has become inaccurate or out of date will also be disposed of securely, where we cannot or do not need to rectify or update it. 

 

For example, we will shred or incinerate paper-based records, and overwrite or delete electronic files. We may also use a third party to safely dispose of records . If we do so, we will require the third party to provide sufficient guarantees that it complies with data protection law. 

 

17.      Personal Data Breaches 

 

ACE will make all reasonable endeavours to ensure that there are no personal data breaches.   

In the unlikely event of a suspected data breach, we will follow the procedure set out in appendix 1. 

 

When appropriate, we will report the data breach to the ICO within 72 hours after becoming aware of it. 

 

18.     Training 

 

All staff are provided with data protection training as part of their induction process. 

Data protection will also form part of continuing professional development, where changes to legislation, guidance or the Trust’s processes make it necessary. 

 

19.     Monitoring Arrangements 

 

The DPO is responsible for monitoring and reviewing this policy. 

This policy will be reviewed annually and approved by the full board. 


Appendix 1: Personal Data Breach Procedure 

 

This procedure is based on guidance on personal data breaches produced by the Information Commissioner’s Office (ICO). 

 

  • On finding or causing a breach, or potential breach, the staff member, governor or data processor must immediately notify the DPO by emailing samwestengineering@gmail.com 

 

  • The DPO will investigate the report and determine whether a breach has occurred. To decide, the DPO will consider whether personal data has been accidentally or unlawfully:  
      • Lost  
      • Stolen 
      • Destroyed 
      • Altered 
      • Disclosed or made available where it should not have been 
      • Made available to unauthorised people 

 

  • Staff will cooperate with the investigation (including allowing access to information and responding to questions). The investigation will not be treated as a disciplinary investigation  

 

  • If a breach has occurred or it is considered to be likely that is the case, the DPO will alert the Director.

 

  • The DPO will make all reasonable efforts to contain and minimise the impact of the breach. Relevant staff members or data processors should help the DPO with this where necessary, and the DPO should take external advice when required (e.g. from IT providers).  

 

  • The DPO will assess the potential consequences, based on how serious they are, and how likely they are to happen before and after the implementation of steps to mitigate the consequences  

 

  • The DPO will work out whether the breach must be reported to the ICO and the individuals affected using the ICO’s self-assessment tool 

 

  • The DPO will document the decisions (either way), in case it is challenged at a later date by the ICO or an individual affected by the breach. 

 

  • Where the ICO must be notified, the DPO will do this via the ‘report a breach’ page of the ICO website, or through its breach report line (0303 123 1113), within 72 hours of the school’s awareness of the breach. As required, the DPO will set out:  
    • A description of the nature of the personal data breach including, where possible: 
    • o     The categories and approximate number of individuals concerned 

    o     The categories and approximate number of personal data records concerned 

    • The name and contact details of the DPO 
    • A description of the likely consequences of the personal data breach 
    • A description of the measures that have been, or will be taken, to deal with the breach and mitigate any possible adverse effects on the individual(s) concerned 

  

  • If all the above details are not yet known, the DPO will report as much as they can within 72 hours of the awareness of the breach. The report will explain that there is a delay, the reasons why, and when the DPO expects to have further information. The DPO will submit the remaining information as soon as possible 

 

  • Where the Compmay is required to communicate with individuals whose personal data has been breached, the DPO will tell them in writing. This notification will set out:  
    • A description, in clear and plain language, of the nature of the personal data breach 
    • The name and contact details of the DPO 
    • A description of the likely consequences of the personal data breach 
    • A description of the measures that have been, or will be, taken to deal with the data breach and mitigate any possible adverse effects on the individual(s) concerned 

  

  • The DPO will consider, in light of the investigation and any engagement with affected individuals, whether to notify any relevant third parties who can help mitigate the loss to individuals – for example, the police, insurers, banks or credit card companies 

 

  • The DPO will document each breach, irrespective of whether it is reported to the ICO. For each breach, this record will include the:  
    • Facts and cause 
    • Effects 
    • Action taken to contain it and ensure it does not happen again (such as establishing more robust processes or providing further training for individuals) 

 

  • The DPO and Director will meet to review what happened and how it can be stopped from happening again. This meeting will happen as soon as reasonably possible . 

 

  • The DPO and Director will meet regularly  to assess recorded data breaches and identify any trends or patterns requiring action by the school to reduce risks of future breaches 

 

 

Actions to minimise the impact of data breaches 

 

We set out below the steps we might take to try and mitigate the impact of different types of data breach if they were to occur, focusing especially on breaches involving particularly risky or sensitive information. We will review the effectiveness of these actions and amend them as necessary after any data breach. 

 

Sensitive information being disclosed via email (including safeguarding records) 

 

  • If special category data (sensitive information) is accidentally made available via email to unauthorised individuals, the sender must attempt to recall the email as soon as they become aware of the error 
  • Members of staff who receive personal data sent in error must alert the sender and the DPO as soon as they become aware of the error 
  • If the sender is unavailable or cannot recall the email for any reason, the DPO will ask the ICT Manager to attempt to recall it from external recipients and remove it from the school’s email system (retaining a copy if required as evidence) 
  • In any cases where the recall is unsuccessful or cannot be confirmed as successful, the DPO will consider whether it’s appropriate to contact the relevant unauthorised individuals who received the email, explain that the information was sent in error, and request that those individuals delete the information and do not share, publish, save or replicate it in any way 
  • The DPO will endeavour to obtain a written response from all the individuals who received the data, confirming that they have complied with this request 
  • The DPO will carry out an internet search to check that the information has not been made public; if it has, we will contact the publisher/website owner or administrator to request that the information is removed from their website and deleted 
  • If safeguarding information is compromised, the DPO will inform the designated safeguarding lead and discuss whether the school should inform any, or all, of its 3 local safeguarding partners