Version: 1.0 Last Updated: {{ site.updated_date | default: "Please update in admin settings" }} Review Date: {{ site.policy_review_date | default: "Annual review required" }}
This policy explains how {{ site.organization_name | default: "your organization" }} handles personal and sensitive data collected through CheckTick surveys, in compliance with data protection laws.
1. Introduction
1.1 Purpose
This policy sets out how we: - Collect, use, and protect survey data - Ensure compliance with data protection laws - Respect the rights of survey participants - Define responsibilities for data handling
1.2 Scope
This policy applies to: - All survey data collected through CheckTick - All users with access to CheckTick (survey creators, editors, viewers, organization administrators) - Personal data, sensitive personal data, and anonymous data - Data throughout its lifecycle (collection, storage, use, deletion)
1.3 Legal Basis
This policy complies with: - UK GDPR - Data Protection Act 2018 - EU GDPR - Regulation (EU) 2016/679 (if applicable) - NHS Data Security and Protection Toolkit (for NHS organizations) - Caldicott Principles (for health and social care data) - Common Law Duty of Confidentiality
2. Data Controller Information
2.1 Data Controller
The data controller for survey data is:
Organization: {{ site.organization_name | default: "Your Organization Name" }} Address: {{ site.organization_address | default: "Your Organization Address" }} Email: {{ site.data_controller_email | default: site.admin_email | default: "[email protected]" }} Phone: {{ site.organization_phone | default: "Your Organization Phone" }}
2.2 Data Protection Officer (DPO)
If your organization is required to appoint a DPO:
Name: {{ site.dpo_name | default: "To be appointed" }} Email: {{ site.dpo_email | default: site.data_controller_email | default: "[email protected]" }} Phone: {{ site.dpo_phone | default: "Contact via email" }}
When to contact the DPO: - Questions about data protection rights - Concerns about data handling - Data breach notifications - Subject access requests - Complaints about data processing
2.3 Information Governance Lead
For operational data governance questions:
Name: {{ site.ig_lead_name | default: "Contact organization administrator" }} Email: {{ site.ig_lead_email | default: site.admin_email | default: "[email protected]" }} Phone: {{ site.ig_lead_phone | default: "Contact via email" }}
3. Data Protection Principles
We process data in accordance with the following principles (GDPR Article 5):
3.1 Lawfulness, Fairness, and Transparency
We will: - Process data lawfully with appropriate legal basis - Be transparent about what data we collect and why - Inform participants how their data will be used - Not use data in ways participants wouldn't reasonably expect
3.2 Purpose Limitation
We will: - Collect data for specific, explicit, and legitimate purposes - Not use data in ways incompatible with those purposes - Clearly state the purpose when creating surveys - Obtain new consent if purpose changes significantly
3.3 Data Minimization
We will: - Collect only data that is necessary for the stated purpose - Not collect data "just in case" it might be useful - Design surveys to minimize personal data collection - Use anonymization and pseudonymization where possible
3.4 Accuracy
We will: - Take reasonable steps to ensure data is accurate - Allow participants to correct their responses (where appropriate) - Update or delete inaccurate data when identified - Provide mechanisms for data quality checks
3.5 Storage Limitation
We will: - Keep data only as long as necessary for the stated purpose - Implement automatic deletion after retention periods expire - Provide warnings before deletion - Securely delete data when no longer needed
Default retention period: 6 months after survey closure Maximum retention period: 24 months after survey closure See: Data Retention Policy
3.6 Integrity and Confidentiality
We will: - Implement appropriate technical and organizational security measures - Protect data from unauthorized access, loss, or damage - Encrypt data in transit and at rest - Limit access to authorized personnel only - Audit all data access
See: Data Security Guide
3.7 Accountability
We will: - Demonstrate compliance with data protection principles - Maintain records of processing activities - Conduct Data Protection Impact Assessments (DPIAs) when required - Regularly review and update policies - Train staff on data protection responsibilities
4. Lawful Basis for Processing
4.1 Legal Bases
We process data under one or more of the following legal bases (GDPR Article 6):
1. Consent (Article 6(1)(a)) - Participants provide explicit, informed consent - Used for most surveys collecting personal data - Consent can be withdrawn at any time
2. Legal Obligation (Article 6(1)(c)) - Processing necessary to comply with legal requirements - e.g., statutory audits, mandatory reporting
3. Public Task (Article 6(1)(e)) - Processing necessary for tasks in the public interest - e.g., public health monitoring, service improvement
4. Legitimate Interests (Article 6(1)(f)) - Processing necessary for legitimate interests - Balanced against participants' rights and interests - Not used for sensitive personal data
4.2 Special Category Data
For sensitive personal data (health, race, religion, etc.), we use (GDPR Article 9):
1. Explicit Consent (Article 9(2)(a)) - Clear, specific consent for processing sensitive data
2. Public Health (Article 9(2)(h) & (i)) - Processing necessary for public health purposes - Health/social care provision - Conducted under duty of confidentiality
3. Research (Article 9(2)(j)) - Processing necessary for research in public interest - Subject to appropriate safeguards
5. Data Subject Rights
Participants have the following rights under GDPR:
5.1 Right to Be Informed
Participants must be informed: - What data is collected - Why it's collected - How it will be used - Who will have access - How long it will be kept - Their rights
Implementation: Privacy notice shown before survey
5.2 Right of Access
Participants can request: - Confirmation that we process their data - Copy of their data - Information about processing
How to request: Contact organization administrator Response time: Within 30 days Cost: Free (unless excessive/repeated requests)
5.3 Right to Rectification
Participants can request: - Correction of inaccurate data - Completion of incomplete data
Implementation: Contact organization administrator Response time: Within 30 days
5.4 Right to Erasure ("Right to be Forgotten")
Participants can request deletion if: - Data no longer necessary - Consent is withdrawn - Data processed unlawfully - Legal obligation to delete
Exceptions: - Legal claims/proceedings - Public interest in health - Research in public interest (with safeguards)
Implementation: Contact organization administrator Response time: Within 30 days
5.5 Right to Restrict Processing
Participants can request restriction if: - Accuracy is contested - Processing is unlawful (but they don't want deletion) - We no longer need the data, but they need it for legal claims - They've objected to processing (pending verification)
Implementation: Data marked as restricted, not deleted Response time: Within 30 days
5.6 Right to Data Portability
Participants can request: - Their data in machine-readable format (CSV, JSON) - Transfer to another organization (where feasible)
Applies when: - Processing based on consent or contract - Processing is automated
Implementation: Download survey responses Response time: Within 30 days
5.7 Right to Object
Participants can object to processing based on: - Legitimate interests - Public interest - Research purposes
Implementation: Case-by-case assessment Response time: Within 30 days
5.8 Rights Related to Automated Decision Making
Not applicable - CheckTick does not perform automated decision-making or profiling.
6. Roles and Responsibilities
6.1 Data Controller
Responsibilities: - Ensure compliance with data protection laws - Approve high-risk processing activities - Respond to regulatory inquiries - Maintain accountability documentation
Who: Organization administrator or designated role
6.2 Data Protection Officer (DPO)
Responsibilities: - Advise on data protection compliance - Monitor compliance with policy - Conduct DPIAs and audits - Liaise with regulatory authorities - Handle data subject requests and complaints
Who: As appointed by organization (if required)
6.3 Survey Creators
Responsibilities: - Design surveys with data minimization in mind - Provide clear privacy notices - Choose appropriate legal basis - Close surveys when data collection complete - Download and securely store data if needed - Delete data when no longer needed
Access: Can download their own survey data
6.4 Organization Owners
Responsibilities: - Oversee data governance for all surveys - Assign data custodians as needed - Review and extend retention periods - Manage legal holds - Respond to data subject requests - Investigate data breaches
Access: Can download all survey data in organization
6.5 Data Custodians
Responsibilities: - Securely store and manage assigned survey data - Follow data security best practices - Report data breaches immediately - Delete data when instructed
Access: Can download data from assigned surveys only
6.6 Editors and Viewers
Responsibilities: - Edit survey structure only (editors) - No access to response data - Report suspected breaches
Access: Cannot download survey data
7. Security Measures
7.1 Technical Measures
We implement:
Encryption:
- Data encrypted in transit (TLS 1.3)
- Data encrypted at rest (AES-256)
- Database encryption
Access Control:
- Role-based access control (RBAC)
- Multi-factor authentication (recommended)
- Password policies (minimum 12 characters)
Audit Logging:
- All data access logged
- Download history maintained
- Regular audit reviews
Backup and Recovery:
- Regular automated backups
- Encrypted backups
- Disaster recovery procedures
See: Data Security Guide
7.2 Organizational Measures
We implement:
Policies and Procedures:
- This data protection policy
- Data breach response plan
- Access control procedures
- Retention and deletion schedules
Training:
- Mandatory data protection training
- Role-specific training
- Regular refresher training
Audits:
- Regular compliance audits
- Penetration testing
- Vulnerability assessments
Vendor Management:
- Data processing agreements with third parties
- Vendor security assessments
- Regular reviews
8. Data Sharing
8.1 Internal Sharing
Data may be shared within the organization with:
- Organization administrators
- Survey creators (their own surveys)
- Data custodians (assigned surveys)
Conditions:
- Role-based access only
- Legitimate need to know
- Logged and auditable
8.2 External Sharing
Data may be shared externally only when:
- Legal obligation requires it
- Participant has consented
- Necessary for public health
- Anonymized/aggregated (not personal data)
Safeguards:
- Data sharing agreement in place
- Minimum necessary data shared
- Secure transfer methods
- Recipient security assessment
8.3 International Transfers
If data is transferred outside UK/EU:
- Adequate level of protection ensured
- Appropriate safeguards in place (e.g., Standard Contractual Clauses)
- Documented and approved
Current: CheckTick data stored in {{ site.data_location | default: "UK/EU" }}
9. Data Breach Management
9.1 Definition
A data breach is any incident that compromises the confidentiality, integrity, or availability of personal data.
Examples:
- Unauthorized access
- Accidental disclosure
- Loss or theft of devices
- Ransomware/malware
- Improper disposal
9.2 Reporting Internally
Any breach must be reported immediately:
- Report to organization administrator (within 1 hour)
- Report to DPO (within 1 hour, if applicable)
- Provide details:
- What happened
- When it happened
- What data was affected
- Potential impact
- Actions taken
See: Data Security Guide - Breach Response
9.3 Reporting to Authorities
If breach likely to result in risk to rights and freedoms:
Report to ICO (or relevant authority):
- Within 72 hours of becoming aware
- Include details of breach and mitigation
- Ongoing updates as investigation proceeds
Our DPO/administrator will handle regulatory reporting.
9.4 Notifying Individuals
If breach likely to result in high risk to individuals:
Notify affected individuals:
- Without undue delay
- In clear, plain language
- Describe nature of breach
- Provide contact point for information
- Describe likely consequences
- Recommend protective measures
10. Data Protection Impact Assessments (DPIAs)
10.1 When Required
We conduct DPIAs for:
- New types of data collection
- Large-scale processing of special category data
- Systematic monitoring
- Automated decision-making
- Processing vulnerable individuals' data
10.2 DPIA Process
- Describe processing activity
- Assess necessity and proportionality
- Identify risks to individuals
- Evaluate risk severity and likelihood
- Identify mitigation measures
- Approve or reject processing
- Review and update regularly
10.3 Consultation
DPIAs are reviewed by:
- Data Protection Officer
- Organization administrator
- Relevant stakeholders
- ICO (if high risk remains after mitigation)
11. Retention and Deletion
11.1 Retention Periods
Survey Responses:
- Default: 6 months after survey closure
- Maximum: 24 months after survey closure
- Extensions require justification
Audit Logs:
- Retained for 6 years (regulatory requirement)
- Anonymized after 2 years
Backup Data:
- Included in main retention periods
- Purged when main data deleted
11.2 Deletion Process
Soft Deletion:
- Survey data marked deleted
- 30-day grace period for recovery
- Not visible to users
Hard Deletion:
- After 30 days, permanent deletion
- All backups purged
- Cannot be recovered
- Deletion logged
11.3 Legal Holds
Processing may be extended beyond retention periods for:
- Legal proceedings
- Regulatory investigations
- Formal complaints
Legal holds:
- Applied by organization owner only
- Require documented justification
- Reviewed every 6 months
- Lifted when no longer needed
12. Training and Awareness
12.1 Mandatory Training
All users must complete:
- Data protection awareness training (annually)
- Role-specific training (on appointment)
- CheckTick-specific training (before first use)
12.2 Training Content
Awareness Training Covers:
- Data protection principles
- Legal obligations
- Individual rights
- Security best practices
- Breach reporting
Role-Specific Training:
- Survey creators: Privacy by design, consent
- Data custodians: Secure data handling
- Organization owners: Compliance oversight
12.3 Refresher Training
- Annual refresher required
- Policy updates communicated immediately
- New regulations incorporated
13. Monitoring and Review
13.1 Policy Review
This policy is reviewed:
- Annually (minimum)
- When regulations change
- After significant data breaches
- When new processing activities introduced
Next review: {{ site.policy_review_date | default: "Set in admin settings" }}
13.2 Compliance Monitoring
We monitor compliance through:
- Quarterly access audits
- Annual security assessments
- Data protection impact assessments
- User training records
- Incident reports
13.3 Metrics
We track:
- Number of surveys with personal data
- Data subject requests (type, response time)
- Data breaches (number, severity)
- Training completion rates
- Retention period extensions
14. Contact and Complaints
14.1 General Inquiries
For questions about this policy or data protection:
Email: {{ site.data_controller_email | default: site.admin_email | default: "[email protected]" }} Phone: {{ site.organization_phone | default: "Contact via email" }} Post: {{ site.organization_address | default: "Your Organization Address" }}
14.2 Data Subject Requests
To exercise your rights (access, rectification, erasure, etc.):
Email: {{ site.dpo_email | default: site.data_controller_email | default: "[email protected]" }} Subject Line: "Data Subject Request - [Your Name]" Include: Full name, contact details, description of request
Response time: Within 30 days
14.3 Complaints
If you are not satisfied with how we handle your data:
Internal Complaint:
- Contact our DPO/administrator (details above)
- We will investigate and respond within 30 days
External Complaint:
- You have the right to complain to the supervisory authority:
Information Commissioner's Office (ICO): Website: https://ico.org.uk/ Phone: 0303 123 1113 Post: Information Commissioner's Office, Wycliffe House, Water Lane, Wilmslow, Cheshire, SK9 5AF
15. Related Documentation
User Guides:
- Data Governance Overview
- Data Export Guide
- Data Retention Policy
- Data Security Guide
- Special Cases Guide
Technical Documentation:
External References:
Document Control
Version History:
| Version | Date | Author | Changes |
|---|---|---|---|
| 1.0 | {{ site.updated_date | default: "YYYY-MM-DD" }} | {{ site.ig_lead_name | default: "Name" }} | Initial policy |
Approval:
| Role | Name | Signature | Date |
|---|---|---|---|
| Data Controller | {{ site.organization_owner | default: "Name" }} | _____ | __ |
| DPO (if applicable) | {{ site.dpo_name | default: "Name" }} | _____ | __ |
Distribution:
- All CheckTick users (via system notification)
- Organization website
- Staff handbook
- New user onboarding
This policy is effective from: {{ site.policy_effective_date | default: "Date of publication" }}
Note: Fields marked with {{ }} should be configured in CheckTick admin settings or organization profile.