Data Protection & Privacy Policy
GDPR (UK/EU) + FERPA/PPRA (USA)
Purple Ruler (Enlai International LTD.)
DATA PROTECTION POLICY​
ICO Registration Reference: ZB398374
Date of Ratification:
30/01/2023
Last Review date:
​
29/06/2024
Next Review date:
​
29/12/2024
Signed:
Data Protection Officer/Director of Operations: Daniel Demarmels
Safeguarding Lead/Director of Human Resources: Bella Ma
Signed:
Data Protection Officer/Director of Operations: Daniel Demarmels
Safeguarding Lead/Director of Human Resources: Bella Ma
Signed:
Data Protection Officer/Director of Operations: Daniel Demarmels
Safeguarding Lead/Director of Human Resources: Bella Ma
Overview
​
Data protection for our schools is extremely important. Schools work with an incredible amount of personal data. This includes information such as pupil names, addresses, medical information, images, and more. Additionally, information related to job applicants, governors, staff, and volunteers is often stored within a school database.
The Data Protection Act (DPA) was designed to protect the privacy of individuals. When the DPA was updated to the GDPR in May 2018, the regulations around data protection changed throughout Europe. Schools handle what the GDPR classifies as ‘special category data,’ detailing pupil information such as ethnicity, race, biometric data, and trade-union membership in some instances. This data is subject to strict controls, and therefore, schools need to adhere to GDPR guidelines and protect this information efficiently.
​
Data protection refers to safeguarding private and important information from compromise, corruption, and loss. Data protection is becoming ever more important in today’s data-driven society, as the amount of information created and stored expands year on year.
​
Our compnu aims to ensure that all personal data collected about staff, pupils, parents, governors, visitors and other individuals is collected, stored and processed in accordance with UK data protection law.
This policy applies to all personal data, regardless of whether it is in paper or electronic format.
​
The schools we serve provide us with varying amounts of data and information from their records. We adhere to the above principles to ensure that no matter what is passed to us, we interact with it in a manner supported in law.
​
Legislation and guidance
​
This policy meets the requirements of the:
​
-
UK General Data Protection Regulation (UK GDPR) – the EU GDPR was incorporated into UK legislation, with some amendments, by The Data Protection, Privacy and Electronic Communications (Amendments etc) (EU Exit) Regulations 2020
​
​
It is based on guidance published by the Information Commissioner’s Office (ICO) on the UK GDPR.
​
In addition, this policy complies with regulation 5 of the Education (Pupil Information) (England) Regulations 2005, which gives parents the right of access to their child’s educational record.
​
In addition, this policy complies with our funding agreement and articles of association.
​
We are registered with the ICO. ICO Registration Reference: ZB398374
​
Terms and Definitions
Data controller
​
A data controller is an individual or organisation that manages how data is processed and is responsible for complying with data protection regulations.
​
Data processor
​
The data processor is a person or other body, other than an employee of the data controller, who processes identifiable personal data on behalf of the data controller.
​
Data subject
​
The identified or identifiable individual whose personal data is held or processed.
​
Personal data
​
Any information that relates to a living individual which identifies them such as; name (including initials), identification number/s, their location data or online identifier, such as a user name. It may also be specific factors such as an individual’s medical, economic, cultural, physical or genetic identity.
​
Personal data breach
​
A personal data breach is a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data.
Processing
​
Processing is when anything is done to personal data, such as collecting, recording, organising, structuring, storing, adapting, altering, retrieving, using, disseminating, erasing or destroying. This can be manual or automated.
​
Special categories of personal data
​
This is personal data which is of a more sensitive nature and needs further protection such as; race, political views, religious or spiritual beliefs, genetics, medical and health records, sexual orientation, genetic information, biometric information, membership of specific groups such as trade unions.
​
The data controller
​
Our school processes personal data relating to parents, pupils, staff, governors, visitors and others, and therefore is a data controller.
The school is registered with the ICO / has paid its data protection fee to the ICO, as legally required.
​
Roles and responsibilities
​
This policy applies to all staff employed by our school, in addition to any external organisations or individuals working on our behalf. Staff who do not comply with this policy may face disciplinary action.
​
Governing board
​
The governing board has overall responsibility for ensuring that our school complies with all relevant data protection obligations.
​
Data protection officer
The data protection officer (DPO) is responsible for overseeing the implementation of this policy, monitoring our compliance with data protection law, and developing related policies and guidelines where applicable.
They will provide an annual report of their activities directly to the governing board and, where relevant, report to the board their advice and recommendations on school data protection issues.
The DPO is also the first point of contact for individuals whose data the school processes, and for the ICO.
Full details of the DPO’s responsibilities are set out in their job description.
Our DPO is Daniel Demarmels and is contactable via DPO@purpleruler.com - The DPO is also the company director of operations and holds himself out at such.
​
All staff
​
Staff are responsible for:
​
-
Collecting, storing and processing any personal data in accordance with this policy
-
Informing the school of any changes to their personal data, such as a change of address
-
Contacting the DPO in the following circumstances:​​​
-
If they need to rely on or capture consent, draft a privacy notice, deal with data protection rights invoked by an individual, or transfer personal data outside the UK
-
If there has been a data breach
-
Whenever they are engaging in a new activity that may affect the privacy rights of individuals
-
If they need help with any contracts or sharing personal data with third parties
-
-
If they are unsure whether or not they have a lawful basis to use personal data in a particular way
-
If they have any concerns that this policy is not being followed
-
With any questions about the operation of this policy, data protection law, retaining personal data or keeping personal data secure
​
Data protection principles
​
The UK GDPR is based on data protection principles that our organisation must comply with.
The principles say that personal data must be:
​
-
Processed lawfully, fairly and in a transparent manner
-
Collected for specified, explicit and legitimate purposes
-
Adequate, relevant and limited to what is necessary to fulfil the purposes for which it is processed
-
Accurate and, where necessary, kept up to date
-
Kept for no longer than is necessary for the purposes for which it is processed
-
Processed in a way that ensures it is appropriately secure
​
This policy sets out how the school aims to comply with these principles.
​
Collecting personal data
​
Lawfulness, fairness and transparency
​
We will only process personal data where we have one of 6 ‘lawful bases’ (legal reasons) to do so under data protection law:
​
​
-
The data needs to be processed so that the school can fulfil a contract with the individual, or the individual has asked the school to take specific steps before entering into a contract
-
The data needs to be processed so that the organisation can comply with a legal obligation
-
The data needs to be processed to ensure the vital interests of the individual or another person i.e. to protect someone’s life
-
The data needs to be processed so that the organisation, as a public authority, can perform a task in the public interest or exercise its official authority
-
The data needs to be processed for the legitimate interests of the organisation (where the processing is not for any tasks the school performs as a public authority) or a third party, provided the individual’s rights and freedoms are not overridden
-
The individual (or their parent/carer when appropriate in the case of a pupil) has freely given clear consent
​
For special categories of personal data, we will also meet one of the special category conditions for processing under data protection law:
​
​
-
The individual (or their parent/carer when appropriate in the case of a pupil) has given explicit consent
-
The data needs to be processed to perform or exercise obligations or rights in relation to employment, social security or social protection law
-
The data needs to be processed to ensure the vital interests of the individual or another person, where the individual is physically or legally incapable of giving consent
-
The data has already been made manifestly public by the individual
-
The data needs to be processed for the establishment, exercise or defence of legal claims
-
The data needs to be processed for reasons of substantial public interest as defined in legislation
-
The data needs to be processed for health or social care purposes, and the processing is done by, or under the direction of, a health or social work professional or by any other person obliged to confidentiality under law
-
The data needs to be processed for public health reasons, and the processing is done by, or under the direction of, a health professional or by any other person obliged to confidentiality under law
-
The data needs to be processed for archiving purposes, scientific or historical research purposes, or statistical purposes, and the processing is in the public interest
​
For criminal offence data, we will meet both a lawful basis and a condition set out under data protection law. Conditions include:
​
​
-
The individual (or their parent/carer when appropriate in the case of a pupil) has given consent
-
The data needs to be processed to ensure the vital interests of the individual or another person, where the individual is physically or legally incapable of giving consent
-
The data has already been made manifestly public by the individual
-
The data needs to be processed for or in connection with legal proceedings, to obtain legal advice, or for the establishment, exercise or defence of legal rights
-
The data needs to be processed for reasons of substantial public interest as defined in legislation
​
Whenever we first collect personal data directly from individuals, we will provide them with the relevant information required by data protection law.
​
​
We will always consider the fairness of our data processing. We will ensure we do not handle personal data in ways that individuals would not reasonably expect, or use personal data in ways which have unjustified adverse effects on them.
​
Limitation, minimisation and accuracy
​
We will only collect personal data for specified, explicit and legitimate reasons. We will explain these reasons to the individuals when we first collect their data.
If we want to use personal data for reasons other than those given when we first obtained it, we will inform the individuals concerned before we do so, and seek consent where necessary.
Staff must only process personal data where it is necessary in order to do their jobs.
We will keep data accurate and, where necessary, up to date. Inaccurate data will be rectified or erased when appropriate.
In addition, when staff no longer need the personal data they hold, they must ensure it is deleted or anonymized. This will be done in accordance with the school’s record retention schedule.
Lesson recordings and all associated lesson data with either be anonymized or deleted upon the expiry of the working relationship of the organization with any given school.
All associated data obtained from the school by the organization pursuant to the education provision requested by the school is held in such a way as to be automatically deleted upon the expiry of the working relationship between Purple Ruler and the School.
​
Sharing personal data
​
We will not share personal data with anyone else without consent, but there are certain circumstances where we may be required to do so. These include, but are not limited to, situations where:
​
-
There is an issue with a pupil or parent/carer that puts the safety of our staff at risk
-
We need to liaise with other agencies – we will seek consent as necessary before doing this
-
Our suppliers or contractors need data to enable us to provide services to our staff and pupils – for example, MIS system or IT services. When doing this, we will:​
-
Establish a contract with the supplier or contractor to ensure the fair and lawful processing of any personal data we share
-
Only share data that the supplier or contractor needs to carry out their service
-
-
Only appoint suppliers or contractors which can provide sufficient guarantees that they comply with UK data protection law
​
We will also share personal data with law enforcement and government bodies where we are legally required to do so.
We may also share personal data with emergency services and local authorities to help them to respond to an emergency situation that affects any of our pupils or staff.
Where we transfer personal data internationally, we will do so in accordance with UK data protection law.
​
Subject access requests and other rights of individuals
​
Subject access requests
​
Individuals have a right to make a ‘subject access request’ to gain access to personal information that the school holds about them. This includes:
​
-
Confirmation that their personal data is being processed
-
Access to a copy of the data
-
The purposes of the data processing
-
The categories of personal data concerned
-
Who the data has been, or will be, shared with
-
How long the data will be stored for, or if this isn’t possible, the criteria used to determine this period
-
Where relevant, the existence of the right to request rectification, erasure or restriction, or to object to such processing
-
The right to lodge a complaint with the ICO or another supervisory authority
-
The source of the data, if not the individual
-
Whether any automated decision-making is being applied to their data, and what the significance and consequences of this might be for the individual
-
The safeguards provided if the data is being transferred internationally
​
Subject access requests can be submitted in any form, but we may be able to respond to requests more quickly if they are made in writing and include:
​
​
-
Name of individual
-
Correspondence address
-
Contact number and email address
-
Details of the information requested
​
If staff receive a subject access request in any form they must immediately forward it to the DPO.
​
​
Children and subject access requests
​
Personal data about a child belongs to that child, and not the child's parents or carers. For a parent or carer to make a subject access request with respect to their child, the child must either be unable to understand their rights and the implications of a subject access request, or have given their consent.
Children aged 12 and above are generally regarded to be mature enough to understand their rights and the implications of a subject access request. Therefore, most subject access requests from parents or carers of pupils at our school may not be granted without the express permission of the pupil. This is not a rule and a pupil’s ability to understand their rights will always be judged on a case-by-case basis.
​
Responding to subject access requests
​
When responding to requests, we:
​
-
May ask the individual to provide 2 forms of identification
-
May contact the individual via phone to confirm the request was made
-
Will respond without delay and within 1 month of receipt of the request (or receipt of the additional information needed to confirm identity, where relevant)
-
Will provide the information free of charge
-
May tell the individual we will comply within 3 months of receipt of the request, where a request is complex or numerous. We will inform the individual of this within 1 month, and explain why the extension is necessary
​
We may not disclose information for a variety of reasons, such as if it:
​
​
-
Might cause serious harm to the physical or mental health of the pupil or another individual
-
Would reveal that the child is being or has been abused, or is at risk of abuse, where the disclosure of that information would not be in the child’s best interests
-
Would include another person’s personal data that we can’t reasonably anonymize, and we don’t have the other person’s consent and it would be unreasonable to proceed without it
-
Is part of certain sensitive documents, such as those related to crime, immigration, legal proceedings or legal professional privilege, management forecasts, negotiations, confidential references, or exam scripts
​
If the request is unfounded or excessive, we may refuse to act on it, or charge a reasonable fee to cover administrative costs. We will take into account whether the request is repetitive in nature when making this decision.
When we refuse a request, we will tell the individual why, and tell them they have the right to complain to the ICO or they can seek to enforce their subject access right through the courts.
​
​
Other data protection rights of the individual
​
In addition to the right to make a subject access request (see above), and to receive information when we are collecting their data about how we use and process it (see section 7), individuals also have the right to:
​
​
-
Withdraw their consent to processing at any time
-
Ask us to rectify, erase or restrict processing of their personal data (in certain circumstances)
-
Prevent use of their personal data for direct marketing
-
Object to processing which has been justified on the basis of public interest, official authority or legitimate interests
-
Challenge decisions based solely on automated decision making or profiling (i.e. making decisions or evaluating certain things about an individual based on their personal data with no human involvement)
-
Be notified of a data breach (in certain circumstances)
-
Make a complaint to the ICO
-
Ask for their personal data to be transferred to a third party in a structured, commonly used and machine-readable format (in certain circumstances)
​
Individuals should submit any request to exercise these rights to the DPO. If staff receive such a request, they must immediately forward it to the DPO.
​
Photographs and videos
​
As part of our organization's activities, we may take photographs and record images of individuals within our classes.
We will obtain written consent from parents/carers, or pupils aged 18 and over via the school for photographs and videos to be taken of pupils for communication, marketing and promotional materials. We will never approach a parent or student directly with this request.
​
Where we need consent, we will clearly explain how the photograph and/or video will be used to both the parent/carer and pupil.
​
Any photographs and videos taken by students/parents/carers/school staff at schools for their own personal use are not covered by data protection legislation. However, we will ask that photos or videos with other pupils are not shared publicly on social media for safeguarding reasons, unless all the relevant parents/carers (or pupils where appropriate) have agreed to this.
​
Consent can be refused or withdrawn at any time. If consent is withdrawn, we will delete the photograph or video and not distribute it further.
​
When using photographs and videos in this way we will not accompany them with any other personal information about the child, to ensure they cannot be identified.
​
See our safeguarding policy to learn more: www.purpleruler.com/safeguarding.
​
Data protection by design and default
​
We will put measures in place to show that we have integrated data protection into all of our data processing activities, including:
​
-
Appointing a suitably qualified DPO, and ensuring they have the necessary resources to fulfil their duties and maintain their expert knowledge
-
Only processing personal data that is necessary for each specific purpose of processing, and always in line with the data protection principles set out in relevant data protection law (see section 6)
-
Completing data protection impact assessments where the school’s processing of personal data presents a high risk to rights and freedoms of individuals, and when introducing new technologies (the DPO will advise on this process)
-
Integrating data protection into internal documents including this policy, any related policies and privacy notices.
-
Regularly training members of staff on data protection law, this policy, any related policies and any other data protection matters; we will also keep a record of attendance
-
Regularly conducting reviews and audits to test our privacy measures and make sure we are compliant
-
Data is stored exclusively in our servers physically located on the premises of our institutional investor, ADM Computer Services Limited.
-
Maintaining records of our processing activities, including:​
-
For all personal data that we hold, maintaining an internal record of the type of data, type of data subject, how and why we are using the data, any third-party recipients, any transfers outside of the UK and the safeguards for those, retention periods and how we are keeping the data secure
-
-
For the benefit of data subjects, making available the name and contact details of our school and DPO and all information we are required to share about how we use and process their personal data (via our privacy notices)
​
Data security and storage of records
​
We will protect personal data and keep it safe from unauthorised or unlawful access, alteration, processing or disclosure, and against accidental or unlawful loss, destruction or damage.
In particular:
​
-
Paper-based records and portable electronic devices, such as laptops and hard drives that contain personal data, are kept under lock and key when not in use
-
Papers containing confidential personal data must not be left on office and classroom desks, on staffroom tables, or left anywhere else where there is general access
-
Where personal information needs to be taken off site, staff must sign it in and out from the school office
-
Passwords that are at least 10 characters long containing letters and numbers are used to access school computers, laptops and other electronic devices. Staff are reminded that they should not reuse passwords from other sites
-
Encryption software is used to protect all portable devices and removable media, such as laptops and USB devices
-
Staff, pupils or governors who store personal information on their personal devices are expected to follow the same security procedures as for school-owned equipment.
-
Where we need to share personal data with a third party, we carry out due diligence and take reasonable steps to ensure it is stored securely and adequately protected
​
Disposal of records
​
Personal data that is no longer needed will be disposed of securely. Personal data that has become inaccurate or out of date will also be disposed of securely, where we cannot or do not need to rectify or update it.
For example, we will shred or incinerate paper-based records, and overwrite or delete electronic files. We may also use a third party to safely dispose of records on the school’s behalf. If we do so, we will require the third party to provide sufficient guarantees that it complies with data protection law.
​
Personal data breaches
​
The organization will make all reasonable endeavors to ensure that there are no personal data breaches.
In the unlikely event of a suspected data breach, we will follow the procedure set out in appendix 1.
When appropriate, we will report the data breach to the ICO within 72 hours after becoming aware of it. Such breaches in a school context may include, but are not limited to:
-
A non-anonymised dataset being published on the organisation website which shows the exam results of pupils eligible for the pupil premium
-
Safeguarding information being made available to an unauthorised person
-
The theft of a school laptop containing non-encrypted personal data about pupils
​
Training
​
All staff and governors are provided with data protection training as part of their induction process.
Data protection will also form part of continuing professional development, where changes to legislation, guidance or the school’s processes make it necessary.
​
Monitoring arrangements
​
The DPO is responsible for monitoring and reviewing this policy.
This policy will be reviewed annually and approved by the full governing board.
Note: the annual review frequency here reflects the Department for Education’s recommendation in its advice on statutory policies.
​
Appendix 1: Personal data breach procedure
This procedure is based on guidance on personal data breaches produced by the Information Commissioner’s Office (ICO).
-
On finding or causing a breach, or potential breach, the staff member, governor or data processor must immediately notify the data protection officer (DPO) by <insert your reporting procedure, e.g. using a dedicated email address, filling out a reporting form, etc.>
-
The DPO will investigate the report, and determine whether a breach has occurred. To decide, the DPO will consider whether personal data has been accidentally or unlawfully:
-
Lost
-
Stolen
-
Destroyed
-
Altered
-
Disclosed or made available where it should not have been
-
Made available to unauthorised people
-
-
Staff and governors will cooperate with the investigation (including allowing access to information and responding to questions). The investigation will not be treated as a disciplinary investigation
-
If a breach has occurred or it is considered to be likely that is the case, the DPO will alert the headteacher and the chair of governors
-
The DPO will make all reasonable efforts to contain and minimise the impact of the breach. Relevant staff members or data processors should help the DPO with this where necessary, and the DPO should take external advice when required (e.g. from IT providers). (See the actions relevant to specific data types at the end of this procedure)
-
The DPO will assess the potential consequences (based on how serious they are and how likely they are to happen) before and after the implementation of steps to mitigate the consequences
-
The DPO will work out whether the breach must be reported to the ICO and the individuals affected using the ICO’s self-assessment tool
-
The DPO will document the decisions (either way), in case the decisions are challenged at a later date by the ICO or an individual affected by the breach. Documented decisions are stored <set out where you keep records of these decisions – for example, on the school’s computer system, or on a designated software solution>
-
Where the ICO must be notified, the DPO will do this via the ‘report a breach’ page of the ICO website, or through its breach report line (0303 123 1113), within 72 hours of the school’s awareness of the breach. As required, the DPO will set out:
-
A description of the nature of the personal data breach including, where possible:
-
The categories and approximate number of individuals concerned
-
The categories and approximate number of personal data records concerned
-
-
The name and contact details of the DPO
-
A description of the likely consequences of the personal data breach
-
A description of the measures that have been, or will be taken, to deal with the breach and mitigate any possible adverse effects on the individual(s) concerned
-
-
If all the above details are not yet known, the DPO will report as much as they can within 72 hours of the school’s awareness of the breach. The report will explain that there is a delay, the reasons why, and when the DPO expects to have further information. The DPO will submit the remaining information as soon as possible
-
Where the school is required to communicate with individuals whose personal data has been breached, the DPO will tell them in writing. This notification will set out:
-
A description, in clear and plain language, of the nature of the personal data breach
-
The name and contact details of the DPO
-
A description of the likely consequences of the personal data breach
-
A description of the measures that have been, or will be, taken to deal with the data breach and mitigate any possible adverse effects on the individual(s) concerned
-
-
The DPO will consider, in light of the investigation and any engagement with affected individuals, whether to notify any relevant third parties who can help mitigate the loss to individuals – for example, the police, insurers, banks or credit card companies
-
The DPO will document each breach, irrespective of whether it is reported to the ICO. For each breach, this record will include the:
-
Facts and cause
-
Effects
-
Action taken to contain it and ensure it does not happen again (such as establishing more robust processes or providing further training for individuals)
-
​
Records of all breaches will be stored <set out where you will keep these records – for example, on the school’s computer system, or on a designated software solution.
​
​
-
The DPO and headteacher will meet to review what happened and how it can be stopped from happening again. This meeting will happen as soon as reasonably possible
-
The DPO and headteacher will meet regularly [or insert how often] to assess recorded data breaches and identify any trends or patterns requiring action by the school to reduce risks of future breaches
​
Actions to minimise the impact of data breaches
We set out below the steps we might take to try and mitigate the impact of different types of data breach if they were to occur, focusing especially on breaches involving particularly risky or sensitive information. We will review the effectiveness of these actions and amend them as necessary after any data breach.
Sensitive information being disclosed via email (including safeguarding records)
-
If special category data (sensitive information) is accidentally made available via email to unauthorised individuals, the sender must attempt to recall the email as soon as they become aware of the error
-
Members of staff who receive personal data sent in error must alert the sender and the DPO as soon as they become aware of the error
-
If the sender is unavailable or cannot recall the email for any reason, the DPO will ask the [ICT department/external IT support provider] to attempt to recall it from external recipients and remove it from the school’s email system (retaining a copy if required as evidence)
-
In any cases where the recall is unsuccessful or cannot be confirmed as successful, the DPO will consider whether it’s appropriate to contact the relevant unauthorised individuals who received the email, explain that the information was sent in error, and request that those individuals delete the information and do not share, publish, save or replicate it in any way
-
The DPO will endeavor to obtain a written response from all the individuals who received the data, confirming that they have complied with this request
-
The DPO will carry out an internet search to check that the information has not been made public; if it has, we will contact the publisher/website owner or administrator to request that the information is removed from their website and deleted
​
External Data Processing and Risk Controll
​
​
​
​
​
​
​
​
​
​
​
​
​
U.S. Education Data Privacy Policy Addendum (15/ October / 2023 )
​
Purple Ruler is committed to protecting the privacy of student data and ensuring compliance with applicable U.S. laws, including the Family Educational Rights and Privacy Act (FERPA) and the Protection of Pupil Rights Amendment (PPRA), as part of our service to school districts providing tutoring services.
​
Collection and Use of Information
As a third-party provider to school districts, Purple Ruler collects only the necessary personal information to facilitate effective tutoring services. This includes:
-
Student Names: To personalize and tailor the tutoring sessions to individual students.
-
Email Addresses: To communicate with students regarding scheduling, feedback, and support for their tutoring sessions.
-
Academic Information: To assess the needs of students and provide customized tutoring that addresses their specific academic challenges.
Rights and Responsibilities
Parental Rights: Under FERPA, parents have the right to inspect and review their child's education records maintained by Purple Ruler. Requests for access to records must be submitted in writing and will be fulfilled within a reasonable time frame, not exceeding 45 days.
Student Rights: Students who are aged 18 or older, or attending a postsecondary institution, are considered "eligible students" and may exercise rights to inspect and review their educational records directly.
Disclosure of Information: Purple Ruler may disclose personal information from education records without consent to the extent permitted under FERPA regulations. This includes disclosures to:
-
Officials with legitimate educational interests;
-
Other schools to which a student is transferring;
-
Specified officials for audit or evaluation purposes;
-
Appropriate parties in connection with financial aid to a student;
-
Organizations conducting certain studies for or on behalf of the school;
-
Accrediting organizations;
-
Compliance with a judicial order or lawfully issued subpoena;
-
Appropriate officials in cases of health and safety emergencies;
-
State and local authorities, within a juvenile justice system, pursuant to specific State law.
Data Protection: Purple Ruler employs industry-standard security measures to protect the integrity and confidentiality of student information. Access to data is limited to authorized personnel who are trained in compliant data handling practices.
Opt-Out Rights
Under PPRA, parents and eligible students have the right to opt out of any survey, analysis, or evaluation that reveals information concerning:
-
Political affiliations or beliefs;
-
Mental or psychological problems;
-
Sex behavior or attitudes;
-
Illegal, anti-social, self-incriminating, or demeaning behavior;
-
Critical appraisals of other individuals with whom respondents have close family relationships;
-
Legally recognized privileged relationships;
-
Religious practices, affiliations, or beliefs;
-
Income for program eligibility determination.
​
Amendments and Updates to Personal Information
Parents and eligible students have the right to request the amendment of records that they believe to be inaccurate, misleading, or in violation of the student’s privacy rights. Such requests must be made in writing and will be reviewed promptly. If the request is denied, the parent or eligible student will be provided with information on how to request a formal hearing.
Data Security Incident Response Policy
1. Purpose and Scope
The Data Security Incident Response Policy at Purple Ruler is designed to provide a structured approach to identifying, managing, and mitigating data security incidents. This policy ensures compliance with current data protection legislation, including GDPR and ICO codes of practice. It applies to all employees, contractors, volunteers, and third-party partners.
2. Incident Identification
-
Monitoring and Detection: Implement continuous monitoring tools to detect unusual activities or potential security breaches.
-
User Reporting: Encourage employees and partners to report any suspicious activities or potential data breaches immediately through established reporting channels.
3. Incident Reporting
-
Immediate Notification: All incidents must be reported to the Data Protection Officer (DPO) within 24 hours of detection. Use the designated incident reporting form or dedicated email (DPO@purpleruler.com).
-
Initial Assessment: The DPO will conduct an initial assessment to determine the severity and scope of the incident.
4. Incident Classification
-
Severity Levels: Classify incidents based on their impact and urgency. Categories may include minor, significant, and critical incidents.
-
Documentation: Maintain detailed records of each incident, including time of occurrence, affected systems, and initial assessment results.
5. Response and Containment
-
Immediate Actions: Implement measures to contain the incident, such as isolating affected systems, revoking compromised credentials, and applying necessary patches.
-
Communication: Inform relevant stakeholders, including affected individuals, management, and regulatory bodies, as required.
6. Investigation and Analysis
-
Root Cause Analysis: Conduct a thorough investigation to determine the root cause of the incident.
-
Data Forensics: Utilize data forensics tools to analyze affected systems and recover evidence.
-
Incident Review: Document findings and lessons learned to prevent future occurrences.
7. Mitigation and Recovery
-
Remediation Plans: Develop and implement remediation plans to address identified vulnerabilities.
-
System Restoration: Ensure affected systems are securely restored to normal operations.
-
Continuous Improvement: Update security policies and procedures based on incident analysis.
8. Communication and Reporting
-
Internal Reporting: Regularly update internal stakeholders on the status of the incident and recovery efforts.
-
External Reporting: Report significant incidents to the Information Commissioner’s Office (ICO) within 72 hours, as required by GDPR. Notify affected individuals promptly.
9. Training and Awareness
-
Regular Training: Conduct annual training sessions on incident response procedures for all staff.
-
Simulated Exercises: Perform regular simulated incident response exercises to test and improve the effectiveness of the incident response plan.
Information Security Management Policy
1. Purpose and Scope
The Information Security Management Policy ensures the protection of Purple Ruler’s information assets against all internal and external threats. This policy is applicable to all employees, contractors, volunteers, and third-party partners.
2. Information Security Objectives
-
Confidentiality: Ensure that sensitive information is accessible only to those authorized to access it.
-
Integrity: Safeguard the accuracy and completeness of information and processing methods.
-
Availability: Ensure that authorized users have access to information and associated assets when required.
3. Roles and Responsibilities
-
Data Protection Officer (DPO): Oversees the implementation of the Information Security Management Policy and ensures compliance with relevant regulations.
-
Information Security Team: Responsible for developing, implementing, and maintaining security measures and procedures.
-
Employees and Contractors: Required to adhere to security policies and report any security incidents or vulnerabilities.
4. Risk Management
-
Risk Assessment: Conduct regular risk assessments to identify potential security threats and vulnerabilities.
-
Risk Mitigation: Implement appropriate controls to mitigate identified risks, including technical, administrative, and physical safeguards.
5. Access Control
-
User Access Management: Ensure that access to information systems is granted based on the principle of least privilege.
-
Authentication and Authorization: Use strong authentication methods and ensure that access rights are regularly reviewed and updated.
6. Data Protection
-
Encryption: Encrypt sensitive data both in transit and at rest to protect against unauthorized access.
-
Data Minimization: Collect and retain only the minimum amount of data necessary for business operations.
-
Data Retention and Disposal: Establish and enforce data retention schedules and ensure secure disposal of data that is no longer needed.
7. Network Security
-
Firewall and Intrusion Detection: Implement firewalls, intrusion detection, and prevention systems to protect the network from unauthorized access and attacks.
-
Secure Configuration: Ensure that all network devices and systems are securely configured and regularly updated.
8. Physical Security
-
Secure Facilities: Ensure that all facilities housing information systems are physically secure and access is restricted to authorized personnel.
-
Environmental Controls: Implement controls to protect against environmental threats such as fire, flood, and power outages.
9. Incident Management
-
Incident Response Plan: Develop and maintain an incident response plan to handle security incidents promptly and effectively.
-
Incident Reporting: Ensure that all security incidents are reported, documented, and investigated.
10. Compliance and Audit
-
Regulatory Compliance: Ensure compliance with relevant data protection regulations, including GDPR and ICO guidelines.
-
Regular Audits: Conduct regular security audits to assess compliance with security policies and identify areas for improvement.
11. Continuous Improvement
-
Policy Review: Regularly review and update the Information Security Management Policy to reflect changes in the regulatory environment and emerging threats.
-
Feedback Mechanism: Encourage feedback from staff to identify and address security concerns and improve security practices.
Processes for Responding to Information Rights Requests
​
1. Introduction
​
At Purple Ruler, we prioritize the privacy and rights of individuals regarding their personal data. Our processes for responding to information rights requests are comprehensive, ensuring compliance with GDPR and other relevant data protection regulations. These processes are designed to handle requests efficiently and transparently, providing individuals with timely access to their data and the ability to exercise their rights.
2. Types of Information Rights Requests
The types of requests we manage include:
-
Subject Access Requests (SARs)
-
Requests for Rectification
-
Requests for Erasure (Right to be Forgotten)
-
Requests for Restriction of Processing
-
Requests for Data Portability
-
Objections to Processing
-
Rights Related to Automated Decision-Making and Profiling
3. Submission of Requests
3.1 Request Submission Channels
-
Online Form: Individuals can submit requests through our dedicated online form available on the Purple Ruler website.
-
Email: Requests can be sent directly to our Data Protection Officer (DPO) at DPO@purpleruler.com.
-
Postal Mail: Requests can also be submitted via postal mail to our head office address.
3.2 Information Required
-
Identification: Proof of identity is required to process the request (e.g., a copy of an ID card or passport).
-
Details of Request: Clear and specific details about the request, including the type of information sought, corrections needed, or other rights being exercised.
4. Initial Acknowledgment
4.1 Acknowledgment Timeline
-
Confirmation Receipt: Requests are acknowledged within 5 business days of receipt.
-
Verification: The DPO verifies the identity of the requester and the validity of the request.
4.2 Record Keeping
-
Log Entry: Each request is logged in our Data Protection Management System, noting the date of receipt, type of request, and details provided.
5. Processing Requests
5.1 Subject Access Requests (SARs)
-
Data Compilation: Gather all relevant personal data held by Purple Ruler.
-
Data Review: Ensure no third-party personal data is disclosed without consent.
-
Response: Provide a copy of the requested data, an explanation of how it is used, and who it has been shared with within 30 days.
5.2 Requests for Rectification
-
Data Verification: Verify the data that needs correction.
-
Amendment: Correct inaccuracies or incomplete data.
-
Notification: Inform the individual of the rectification and any relevant third parties.
5.3 Requests for Erasure
-
Eligibility Check: Determine if the data qualifies for erasure under GDPR.
-
Data Removal: Securely delete the data from all systems.
-
Confirmation: Notify the individual of the data erasure.
5.4 Requests for Restriction of Processing
-
Temporary Suspension: Temporarily restrict the processing of the data.
-
Assessment: Review the grounds for restriction.
-
Outcome Communication: Inform the individual of the restriction status and any subsequent steps.
5.5 Requests for Data Portability
-
Data Preparation: Compile the data in a structured, commonly used, and machine-readable format.
-
Transfer: Send the data to the individual or a designated third party securely.
-
Confirmation: Notify the individual once the transfer is complete.
5.6 Objections to Processing
-
Assessment: Evaluate the grounds for objection.
-
Decision: Cease processing if the objection is upheld, or provide a justification if processing continues.
-
Notification: Inform the individual of the decision and any actions taken.
5.7 Automated Decision-Making and Profiling
-
Review: Assess the automated decision-making process.
-
Intervention: Provide human intervention if requested, allowing individuals to express their views and contest decisions.
-
Outcome: Communicate the outcome of the review to the individual.
6. Timely Response and Extensions
6.1 Standard Response Time
-
30-Day Period: Aim to complete all requests within 30 days of receipt.
6.2 Extensions
-
Complex Requests: If a request is complex or numerous, an extension of up to 60 days may be applied.
-
Notification: Inform the requester of the extension and the reasons for it within the initial 30 days.
7. Communication and Transparency
7.1 Regular Updates
-
Progress Reports: Provide regular updates to the requester on the status of their request.
-
Clear Communication: Ensure all communications are clear and transparent.
8. Data Security and Confidentiality
8.1 Secure Handling
-
Encryption: Use encryption for all data transfers.
-
Access Control: Limit access to personal data to authorized personnel only.
8.2 Confidentiality
-
Non-Disclosure: Ensure no unauthorized disclosure of personal data during the request process.
9. Documentation and Record-Keeping
9.1 Comprehensive Records
-
Request Log: Maintain detailed records of all requests and responses.
-
Audit Trail: Ensure a clear audit trail for compliance and accountability.
10. Training and Awareness
10.1 Staff Training
-
Regular Training: Conduct regular training sessions for staff on handling information rights requests.
-
Awareness Programs: Implement ongoing awareness programs to reinforce the importance of data protection.
11. Review and Improvement
11.1 Regular Reviews
-
Policy Review: Regularly review and update this policy to ensure it remains effective and compliant with current legislation.
-
Feedback Mechanism: Encourage feedback from requesters and staff to identify areas for improvement.
11.2 Continuous Improvement
-
Process Enhancement: Use feedback and audit results to continuously improve the process for handling information rights requests.
​
Contact Information
For questions or concerns regarding this policy or the handling of personal information, please contact our Data Protection Officer at:
​
​
This policy complements our comprehensive GDPR-compliant data protection policy, ensuring adherence to specific U.S. regulatory requirements while safeguarding the rights and privacy of our users.
​
​
​
​
​
​
​
​
​