" The GDPC is a certification scheme that focuses on the processing of personal data using risk based controls which enables organisations to easily demonstrate compliance with UK GDPR to the publicstakeholders and the ICO. "

REQUEST THE INFORMATION PACK

The information pack contains everything you need to know in one convenient document. The pack includes, quick start guides, detailed information, application forms, useful tools, case studies and other examples.

WHAT WE DO

As a Certification Body, we provide a number of other functions to assist those organisations considering our scheme and those using our scheme, whilst at the same time ensuring necessary information is publicly available on demand for validation purposes.

MAINTAIN PUBLICALLY ACCESSIBLE REGISTERS

We maintain three public registers for the purposes of reference and validation. Where our certification mark is displayed Transparency, Fairness, Accuracy, Security, Legal Rights, Accountability and Compensation are assured.

#1 CERTIFICATION HOLDERS REGISTER

The Certification Register details a variety of information for the public and other organisations to use to validate certificates, review the certificate's purposes and limitations of applicability.

#2 AUTHORISED THIRD PARTY REGISTER

Approved Third Party Organisations can be approached by potential Certification Applicants to undertake a range of services on our behalf. Applicants can use the register review services offered by Authorised Third Party Organisations prior to engagement.

#3 REVOCATION AND SUSPENSION REGISTER

Certificates are issued with a number of conditions that must be continually met. Where the certificate holder is in breach of the conditions we reserve the right to suspend or revoke a certificate. Where a certificate has been suspended or revoked, we will make the reasons for the actions taken a matter of public record.

COMPLAINTS PANEL

We will investigate reports of breaches to the conditions for issued certifications. Where necessary we will suspend or revoke certificates and make this information public on our registers.

SUSPENSION

Where we deem necessary we will temporarily suspend a certificate. A suspension will typically be issued where we have instructed the certificate holder to implement remedial changes.

REVOCATION

Where we deem necessary we will permanently revoke a certificate. This will typically be for serious infringements, disregard, persistent offending and in cases where there is evidence for other types of aggravating circumstances. 

LEGAL ACTION

Where required we will issue legal proceedings when our mark is used without our authorisation or in contravention to the stipulated conditions associated with it.

APPROVE CERTIFICATION

We will receive applications for certification and review the application against our certification scheme wording.

CERTIFICATION AUDITS

Audits are undertaken against our Certification Scheme Criteria in accordance with an ISO17065:2012 conformity assessment.

TYPES OF CERTIFICATION

Whilst our certification scheme focuses on the processing activities, certificates could be considered to cover a product, a service, a process or any data processing activity relating to personal data.

MACHINE READABLE ICONS

Where technology allows, we will issue machine readable marks. These marks can be used by search engines or other technologies to help data subjects understand the certification they are engaged with and proactively protect them before their personal data is processed, especially where they are children or considered vulnerable.

AUTHORISE THIRD PARTIES

As a certification body we can consider applications and appoint other third party organisations to undertake certification related activities on our behalf.

AUDIT THIRD PARTIES

We are required to ensure those organisations and the individuals involved with conducting certification services on our behalf do so to the required standard and have the necessary infrastructure, knowledge, resources and systems in place to support these activities.

SPECIALISMS

Over time we predict third party organisations to specialise in a variety of sectors. For example, a health care professional could draw upon their experience and industry knowledge to audit health care related organisations. A detailed first hand understanding of industry terminology and common practices could expedite and enhance the auditing process.

REVENUES & FEES

Whilst we charge a fee to vet and approve an Authorised Third Party organisation, the fees the third party charge for their services are for them to retain in their entirety to avoid any conflicts of interest. We do not stipulate the fees that can be charged for the certification related services. It is for the Authorised Third Party and the Certification Applicant to agree terms independently.

INFORMATION

We exist to provide a valuable public service and as part of that service we will provide information to help the public, organisations along with other entities and stakeholders understand, access and use our services. We do not provide opinions because in doing so we would be auditing our own views, opinions and methods.

NEW & EMERGING THREATS

It is vital to be aware of adequacy decisions, changes to laws, legal precedents and rulings, government sanctions and advances in new and emerging technology such as artificial intelligence to ensure any risks to the processing of personal data remain appropriate, relevant and in always in place.

NEWS

We will keep certificate holders and authorised third party organisations, subscribers and other stakeholders up to date with relevant news and events.

PUBLIC RECORDS

We are obligated to maintain a number of public records and ensure availability for on demand access. This ensures transparency and fairness are maintained which are some of our core values.

HELP

Whilst we are always committed to providing help and information, it should be noted that we cannot provide advice related to certification. Guidance is provided in exceptional circumstances for some complex areas of data processing and in cases where it is deemed necessary or unavoidable.

TOOLS

We have a number of tools and templates available for free download and to freely redistribute to assist with the collation of the information required to submit an application. Articles and case studies are continually published to provide context to applicants in some cases. 

LANGUAGES

Whilst our Certification Scheme applies to global data processing related to UK Data Subjects, it is currently only available in UK English. We are in the process of providing our scheme wording in other languages.

INTEROPERABILITY MAPPING

Our certification scheme is interoperable with a number of industry standards and schemes. We have a number of mapping documents to show how our certification scheme maps to other schemes and standards. The number of interoperable schemes is constantly growing and can be viewed here.

Frequently Asked Questions - FAQs

This simple answer is no, not yet. To be able to issue certificates we must first be authorised to do so by the ICO and we are nearing being awarded this accolade.
The process of becoming a Certification Body is a two stage process that takes between 18 months to 24 months to complete. We are in the latter stages of the process and expect to be able to offer a full range of certification services in Q2 2023.

Our certification scheme wording has been evaluated by the ICO to ensure our scheme meets the strict criteria set out by the ICO and aligns to its goals and objectives.

Full details for the role of the ICO in the UK GDPR certification process can be found here: https://ico.org.uk/for-organisations/guide-to-data-protection/guide-to-the-general-data-protection-regulation-gdpr/certification-schemes-detailed-guidance/

The second stage of the approval process reviews our auditing standards and methodology. UKAS (Untied Kingdom Accreditation Service) will review our auditing methodology against ISO/IEC 17065:2012 (Conformity assessment — Requirements for bodies certifying products, processes and services).
Our auditing methodology is built to ISO/IEC Directives, Part 1 Annex SL which dovetails into ISO/IEC 17065:2012.

Full details of the role of UKAS in the certification process can be found here:
https://www.ukas.com/accreditation/about/developing-new-programmes/development-programmes/uk-gdpr/

Whilst we cannot issue certification at this point in time, we are accepting "registers of interest" from organisations that wish to become certified and we would like to speak to organisations as part of our consultation.

With certification services expected to be available from A2 2023, we would encourage organisations that are looking for early adoption to start to make preparations so that they are ready to submit an application when the application process officially opens.

As a Certification Body we can choose to appoint other third party organisations to undertake certification related activities on our behalf. A common activity would be auditing organisations applying for certification using our methodology and certification scheme wording.

Whilst auditors could audit any data processing activity, we envisage specialisms forming where auditors with practical experience gained from working in certain sectors would audit those sectors. Having a first hand knowledge of terminology, typical operational functions and a general broad understanding would mean the data subjects, the audit process, the auditor and the audited organisation would be likely to benefit from the auditor having an in-depth understanding built up from any time spent operating in the sector.

Certification lasts for 12 months from the date of issue and is based on ISO17065:2012 and follows the ISO methodology of a Full Audit in Year 1 with Surveillance Audits in Years 2 and 3, with a Full Audit in Year 4 and then surveillance audits in years 5 and 6 and so on for the as long as certification is required.

As a certification body we must ensure we provide the necessary information you will need to make informed decisions but cannot provide any recommendations or influence your decision making. In doing so we would be auditing our own views, opinions and methods.

We will provide:
- Public registers of Certified Processes, Authorised Third Party Organisations and a Register of Suspended, Expired and Revoked Certificates.
- Feedback regarding the suitability of any proposed certified process will be provided prior to the Full Audit commencing. This stage ensures the certified process is auditable, highlights potential first and third party costs, considers timescales and other necessary resources required to satisfy the auditing criteria and to continually maintain the conditions of certification.
- A list of auditors will be provided for the applicant to select from. We do not influence the applicant's selection of an auditor and all auditors have equal standing. Considerations such as geographic location, expertise, cost and availability should form the decision making.
- Information that could affect the risks to personal data will be available in various forms such as email newsletters, articles and press releases. This could be related to new and emerging threats or changes to legislation and how the risks affect the certified process for the applicant or certificate holder to determine.
- An independent panel exists to hear complaints from the public, applicants or certification holders to review the circumstances before making any decisions concerning dismissing claims, stipulating actions to be taken, suspensions, revocations or restorations relating to certified processes, failed applications, bias, corruption or other matters.

All the information necessary for any purpose is available for free download. If you would like to speak to a representative appointments are available via video link. To book an appointment, get in touch via our contacts page on this website.

Some insurers offer reduced premiums where our Certification Scheme is implemented. Certification reduces the likelihood of incidents occurring and should an incident occur, reduces the severity of any impact. This positively affects risks in the eyes of the insurer and means the Certified Process is a quantifiable and insurable risk. Some insurers can narrow the insurance to cover only the Certified Process which reduces the risk and therefore, the cost of the insurance cover. This typically relates to insurance policies that cover business interruption and business continuity as well as cyber insurance where the organisation is at risk from compensation claims from data subjects.

Yes, in certain circumstances Certification is deemed by the ICO as a significant form of mitigation, but it should be stated that it doesn't give an organisation the freedom to act disingenuously. The ICO has published its Regulatory Action Policy following on from its Consultation on Statutory Guidance. The ICO explains the approach it takes, listing aggravating factors which will likely see a sterner view is taken and mitigating circumstances which are factored and will likely see a more tolerant view is taken.

Adherence to a UK GDPR Certification Scheme is not compulsory, but it should be remembered that compliance with UK GDPR and the Data Protection Act 2018 is mandated for any organisation meeting the requirements set out by the ICO.
UK GDPR Certification is optional and it is intended to be particularly suited to organisations that would derive a benefit from having its products, services or processes certified.
Certification is also intended to be a practical way for an organisations to easily demonstrate compliance with UK GDPR to individuals, businesses and the supervisory authority, namely the ICO.
There is general "Trend Towards Trust" and the public are increasingly becoming cautious about who they entrust with their data and this is true of all demographics. Certification is a way to provide the assurances that individuals seek which will encourage engagement. This could be a commercial benefit and result in increased sales or trust gained in a public service provided by a public body such as the COVID app or algorithms used to provide public services such as predicted exam results.
Businesses are also increasing the level of due diligence they undertake when forming commercial relationships or when reviewing existing suppliers and commercial relationships. Certification can eliminate the friction that the due diligence process creates in commercial relationships. This friction can sometimes heavily disrupt or even derail these relationships and so certification is intended to simplify and expedite this stage.
Demonstrating UK GDPR compliance for the purpose of obtaining cyber insurance is also a consideration for many organisations and their insurers. Certification mitigates many of the insured risks and this is something insurers welcome. Insurance often forms part of the conditions of a commercial relationship so not being able to obtain insurance could result in a commercial relationship being untenable.
In the event of a data breach, being able to demonstrate compliance to a UK GDPR approved scheme will be considered as a mitigating factor by the ICO. The ICO has published a draft paper where it explains how it adopts a mitigation factor and aggravating factor approach when considering regulatory actions and penalties.

Whilst UK GDPR certification is not compulsory in itself it is accepted that external societal and commercial pressures may make certification necessary.

The Certification process is priced according to the complexity and size of the Target of Evaluation/Scope. Where the Target of Evaluation is narrow, so the cost can be relatively small. It should be remembered that the entire organisation is not typically audited, just an individual product, service or process. A number of detailed examples are provided in the pricing section of this website. We can provide you with a quotation after receiving and evaluating a completed Target of Evaluation form.
The initial certification lasts for 12 months from the date of issue and will need to be reviewed and renewed annually thereafter. Certification is based on an ISO 17065:2012 framework and follows the ISO methodology of a Full Audit in Year 1 with Surveillance Audits in Years 2 and 3, with a Full Audit in Year 4 and then Surveillance Audits in years 5 and 6, and so on for as long as certification is required.

The following schemes are interoperable with this certification scheme. It should be this scheme is authored to align with ISO/IEC Directives, Part 1 Annex SL which dovetails into ISO/IEC 17065:2012 and any ISO/IEC standard will be interoperable to a greater or lesser extent. This removes duplication of effort and conflicts.

It should be noted that no ISO/IEC standard demonstrates UK GDPR compliance in its entirety and ISO/IEC standards only cover aspects of UK GDPR compliance. 

The ISO/IEC 27000 family of standards are particularly aligned to this rectification scheme.

The following are interoperable with this certification scheme;
CQC - The Health and Social Care Act 2008
FCA - Service standards 2020/21 - Financial Conduct Authority
Cyber Essentials and Cyber Essentials Plus
PCI/DSS 4.0
Pensions
SRA Code of Conduct and Lexcel
Schools
SSAIB and NSI
NIST Framework
Construction

Tendering Frameworks

Forthcoming Legislation
IOT
Online Safety Bill
CCCA
Privacy Shield (Revoked and New Version)



The answer is yes and this is how the GDPC was designed to operate. Certifying individual processes or sub processes reduces the overheads required to gain certification and maintain certification. Furthermore, as our certification scheme recognises other certified processes, so processes relying on other already certified systems, even in external organisations are simpler to achieve.

We will issue a unique certification ID number and authorise you to display our mark. Machine readable marks are interpretable by web browsers or technologies and where the certified processing is electronic, so marks will be machine readable.

Certification costs vary due to the Target of Evaluation being unique for each application, but in all cases the costs can be identified and approximated before committal.

Filing Fees
Pre-Applications are filed and reviewed for applicability and suitability.

Auditing Fees
Upon successful Pre-Application and audit cost will be proposed. This will be itemised as per our pricing framework to ensure transparency.
This will include;
Auditor Fees
Expenses

Third Party Experts
In some cases third party experts may be required to independently advise the auditor. This could be expertise in understanding source code or a niche area like molecular science. The Auditor would be unable to make a well formed decision with an understating of the object being reviewed without the assistance of a third party expert.

Implementation Costs
The cost of implementation will vary depending on the readiness of the organisation. A GAP analysis will identify the level of effort and investment required to mitigate nonconformities.

Maintenance and Annual Audits
Ongoing costs are established and means tested during the Initial Audit. These will include budget allocation for maintenance of certified systems and other costs. It will be the case that costs are established at the outset and means any costs will not come as a surprise.

Certified Data Processing has far more application than just the security of Processing Personal Data.

Its not just about preventing cyber attacks...UK GDPR 

Whilst the security of processing is one of the main strengths of UK GDPR in the constant battle against cyber threats, there are many more applications for UK GDPR. Further to this, implementing UK GDPR doesn't necessarily result in an overall negative for an organisation.

UK GDPR if implemented proportionally and appropriately can and does deliver;
Operational Benefits - Strong organisational and technical system invariably result in efficiencies and result in fewer problems.

Commercial Benefits - In a time when organisations are becoming more risk aware as the threats, especially cyber threats increase so other entities 

Ethical and Societal Benefits - The world is waking up to how their personal data is used and how it can positively and negatively affect their lives, often in a significant way. Problems are constantly emerging that directly result from the processing of personal data and technology. Some of the effects of technology on society are Mental health and suicide, threats to freedom and a lack of control, division, radicalisation and brainwashing, addictions to technology and services, sleep deprivation, discrimination, breach to human rights, gambling addition.

Public Trust Benefits - At a time when there is an identifiable trend towards trust, organisations that gain trust will find implementing their plans are better received by customers, members of the public, employees or any other stakeholders. Avoiding distrust is equally important. Many initiatives that had good intentions and could have delivered huge benefits have been scuppered by distrust. Algorithms and Artificial Intelligence (AI) will play a part in our lives, but the distrust in systems using these technologies needs to be overcome. Certification is a way for the public to quickly assess and easily understand that the relevant checks have been undertaken to ensure they are protected.

A common misconception with UK GDPR is that its purpose is to merely serve to prevent data breaches resulting from cyber attacks resulting in other applications for Certified Processing occasionally overlooked. For a full list of applications applied in practice, visit our Case Studies section here.

1 - Certifying the Availability of Personal Data
When certain types of personal data are unavailable it can pose significant risks to people, especially when it is medical data. Knowing if an individual has their medication can either result in a double dose or create suffering or complications where a dose is skipped.

2 - Certifying the Accuracy of Personal Data
A degree of inaccuracy can discriminate against individuals. Women who had suffered short term post-natal depression denied medical insurance on the basis that they had a history of mental illness.

3 - Certifying Data Subject Rights, including the right to compensation
Many societal issues can be resolved and long term consequences avoided if Data Controllers meet their obligations to the Data Subject and process their requests accurately and in a timely way.
When Data Subjects are adversely affected in either a financial or emotional way, they have the right to compensation. Certificated Processes ensure there is adequate provision to compensate the affected Data Subjects.

4 - Certifying Processing to remove barriers and speed up processing
Whilst UK GDPR offers protection, fear of breaking it can mean a necessary worthwhile action are either delayed or not taken. Transfers of patients are often held up due to fear of creating a Data Breach under UK GDPR. Where the process is clearly marked as Certified a staff member can operate freely, without concern and have any errors captured.

5 - Certifying Processing for Economic reasons
The UK and other economies wish to encourage the tech sector. Certification promotes trust so that customers are prepared to engage and distrust deters and ever increasingly sceptical and informed public.
The fantastic work and opportunities created by new technologies can be quickly derailed when concerns over security, privacy or otherwise come to light.
New Tech and Space
- Sales Friction often manifested in the form of Due Diligence holds up working relationships. UK GDPR stipulates that risks are established and mitigated BEFORE processing commences. In the case of two organisations working together, this can and often does bring a potential working relationship to a halt or even sever a once otherwise healthy working relationship.
- Due Diligence has seen an increase partly due to the Insurance Sector reviewing Business Continuity Insurance and Cyber Insurance. It is established that whilst they will insure their client, they wont cover the client's supply chain. The risk is therefore passed and the only way to mitigate this is through transfers of risk in the form of Due Diligence and Data Processing Agreements.
- Insurance has seen a rise in cost but with Insurance being a prerequisite for many working relationships, regardless of cost, Insurance needs to be in place. As Certification can be as narrow as the Target of Evaluation, so the scope of the insurance can be narrowed and the cost significantly reduced. Some insurers already offer reduced insurance premiums where our certification is in place to reflect the accurate understanding of the size and level of risk, the lower likelihood of incidents occurring and the reduced impact from mitigating actions.

6 - Certifying Algorithms.
Algorithms deserve special consideration due to the huge number of people they affect and the degree of risk. Making sure algorithms are adequately risk assessed, have any risks considered and mitigated with their use transparently communicated and the right to have a human make a decision firmly in place.

7 - Protecting Children and Vulnerable People, informing those with disabilities.
To ensure those with disabilities are able to make an equally informed decision, for example those with sight related conditions should be able to access a privacy policy to inform them ahead of giving consent. Children and the vulnerable, who are not necessarily in a position to make decisions should have their interests protected. Where advanced technologies are in place and an unfair imbalance between technology provider and data subject exists, so that imbalance should be addressed. Vulnerable people gambling.............

8 - Interoperability
This scheme is interoperable with a number of existing standards and regulations. Over time the number of interoperable standards that recognise this scheme will increase. Where we are interoperable, duplication of data related processing can be avoided and demonstrated easily and quickly.

Data Rights

Lorem ipsum dolor amet, consecte tempor incididunt ut labore et dolore tumber tur adipisicing elit.

Transparency

Lorem ipsum dolor amet, consecte tempor incididunt ut labore et dolore tumber tur adipisicing elit.

Security of Processing

Lorem ipsum dolor amet, consecte tempor incididunt ut labore et dolore tumber tur adipisicing elit.

Security of Processing

The Security of Processing is what most people consider to be the purpose of UK GDPR and organisations focus on as it is perceived that the biggest threat to them is being hacked.

strength UK GDPR bring.

Physical security.
Digital security.
Operational security.
Administrative security.

confidentiality, integrity, availability’ and ‘resilience

Where security of processing is implemented,


Whilst the champions security of processing is one of the important functions main applications of UK GDPR in the constant battle against cyber threats, there are many more applications for. 

De-duplication of effort




Cyber Attacks

Common repetitive tasks such as risk assessments for patient transfers.

Certainty

We staff know a process is certificated and can quickly identify this by a mark, they can work more freely and confidently.

Avoids Human Error

Where a process is established and tested, human error is significantly reduce or eliminated.

Availability of Processing

Personal data, especially special category data, for example, medical data can present serious risks to life threatening if it isn't available when it is needed.

Certification looks to ensure personal data that is identified as presenting significant risks to the data subject when it isn't available for processing is protected to ensure the systems and recovery etc are evaluated and meet the 

Pension Trusts and Financial Services
Whilst financial institutions 


.

Public Sector:
Revenues and Benefits

If revenues and benefits are unavailable then the consequences to the data subject would be severe.

Public and Private Sector: Medical Records

If medical records are unavailable, medical professionals are unable to make informed decisions. Was the patient given pain relief, yes - there is a risk of a double dose - no - the patient suffers unnecessarily.

Private Sector:
Biometric Data 

Biometric Data is increasingly being used to gain access to systems. Where the data is unavailable access to financial systems would be impossible.

Accuracy of Processing

Inaccurate records or out of date personal records can have all manner of repercussions for data subjects, often significant and in some cases life threatening. Certified processing protects 

Inaccurate Records
Credit referencing is an example where inaccurate information can lead to the refusal of a loan or mortgage, failure to pass referencing for a job or tenancy to name but a few circumstances that have a significant impact on an individual and their family.

Out of Data
In a cruel twist, women who suffered from short term post natal depression had this still listed as an existing mental illness many years later and in most cases their depression was only suffered in the very short term. These same women had medical insurance declined or were forced to pay inflated premiums. In the the most unfortunate cases some individuals developed terminal illnesses that would have been treated privately that were not available on the NHS and they were not in a financial position to cover the cost. They lost their lives due to out of date records.

Rubbish in/ Rubbish Out
Systems output inaccurate results where they are fed inaccurate data records. Certified systems ensure data is captured accurately, keep the records up to date in the primary, secondary and any tertiary systems.

Right of Access and Right of Rectification
When combined with organisational systems that facilitate the Right of Access and the Right of Rectification, situations where inaccurate records or out of date information negatively impact of the lives of data subjects are avoided.

Radiation Oncology

Lorem ipsum dolor amet, consecte tempor incididunt ut labore et dolore tumber tur adipisicing elit.

Primary Care

Lorem ipsum dolor amet, consecte tempor incididunt ut labore et dolore tumber tur adipisicing elit.

Pediatrics

Lorem ipsum dolor amet, consecte tempor incididunt ut labore et dolore tumber tur adipisicing elit.

Data Rights and the Right to Compensation

The Trend Towards Trust shows that organisations that respect data subject's right are winning the Trust or Data Subjects. Where data subjects represent a commercial value

Many consequences that result from deficient personal data processing can be mitigated or even avoided if the rights of the data subject are adhered to. 

New and Emerging Risks
Once personal data is in the possession of a system it instantly becomes a risk to the data subject. Data Rights are a way to remedy every scenario that results from personal data. 

Right to be Informed
The right to be informed can be summed up in a single word - "Transparency". At the outset and before an individual provides their personal information and before problems form, if data subjects is made aware of all the details relating to the intended processing they can make an informed decision about their level of engagement.
Persons with disabilities are often unable to make informed decisions because their disability is not catered the cannot access the privacy notice before engagement.
Certified Processes ensure the audience is considered with disabilities catered for and written using terminology their audiences can understand.
The scheme uses presented icons which are machine-readable. These icons depict pictorially the risks and elements of processing in a way where a data subject can quickly make an informed decision without having to work to find answers. Extensive terms and conditions, whilst it can be argued are by definition transparency they are at the same time nontransparent because the it requires a disproportional effort for the data subject to get to a position where they become informed.

Right of Access - 30 days
This is the starting point of resolving Personal Data issues. When data subjects have sight of the personal data that pertains to them they can invoke other data rights to either remedy issues and gain control.

Right of Rectification - Upon receipt of the request
When personal data records are inaccurate or out-dated, especially when Auto-mated Decision Making is taking place individuals are often adversely affected. This could be refusal of medical insurance or penalised premiums, a failed mortgage application. In some circumstances the affects are minimal but in others the consequences can be life changing. As rectification requests are intended to be actioned on receipt they are particularly relevant to time sensitive activities such as finance applications.

Right of Erasure - 30 days
The Right of Erasure is a way for a Data Subject to create a clean slate and take back control. It is an means for Children, the Vulnerable or any individual that has made a decision they later come to regret to rectify their situation. This could be the removal of their image from a social media platform, even in cases where they have not posted the images themselves.

Right to Restriction of Processing - Upon receipt of the request
As a forerunner to an Erasure Request, a data subject can request a restriction is put on the processing of their personal data. Where the processing is creating mental anguish the restriction of processing can immediately alleviate any distress being suffered, especially where the personal data is in a public forum and the situation worsens the longer personal data is being processed.

Right to Data Portability - 30 days
Personal Data has a value and this value should be in the ownership of that data it pertains to. One of the ways for consumers to access the market freely is to respect the right of data portability.

Right to Object - 30 days
The right to object gives the data subject the right to prevent their data being processed. Situations can therefore be avoided before they occur and any damage is done. This could be especially useful for parents to use to protect their children or those with power of attorney to protect vulnerable people. The right to object is one of the data rights that is wholly preventative.

Right Pertaining to Automated Decision-Making
Automated Decision-Making often uses algorithms. Algorithms can deliver huge benefits to society, individuals and organisations when correctly implemented after going through appropriate level of testing, evaluation, risk mitigation and supported with the necessary controls.

Right to Compensation
Article 82 in UK GDPR says;
" Any person who has suffered material or non-material damage as a result of an infringement of this Regulation shall have the right to receive compensation from the controller or processor for the damage suffered. "

Whilst organisations can "promise" to process data they are entrusted with in accordance with the UK GDPR, means tested or insurance backed certified processing can be seen to have a "guarantee".
Where a data subject is adversely affected resulting from a data breach or other breach of processing responsibilities they can rely on the protections assured with certified processing to mitigate their material loss financially or help repair the damaged caused by non-material damage, such as mental anguish.

Material Damages
Data Subjects are protected where our mark is displayed. In the event that they suffer material damage such as a financial loss resulting from a data breach they can be assured the Data Controller, who is ultimately responsible, is either means tested or insured to adequately compensate them.

Non-Material Damages
Where the Data Subject has suffered non-material damage such as mental anguish resulting from data processing activities they shall be entitled to compensation.

Palliative Medicine

Lorem ipsum dolor amet, consecte tempor incididunt ut labore et dolore tumber tur adipisicing elit.

Pain Management

Lorem ipsum dolor amet, consecte tempor incididunt ut labore et dolore tumber tur adipisicing elit.

Orthopedic Services

Lorem ipsum dolor amet, consecte tempor incididunt ut labore et dolore tumber tur adipisicing elit.

Children, the Vulnerable & the Disabled

Organisations wishing to demonstrate their systems sufficiently meet the needs of children, vulnerable groups and disabled groups can do so through certifying their data processing. Where certified processing expects, targets or involves children, vulnerable people, disabled people or any other high risk groups, a number of additional safeguards shall be considered and identified risks shall be appropriately mitigated.

Children
Under UK GDPR the age of a child is defined as being under 18 years old and from the age of 13 years old a child can autonomously engage with information society services, such as social media. Our standard also considers the recommendations set out in the ICO's Age Appropriate Design Code (Children's Code).

Where the processing of children's data is taking place, risks to children must be assessed and any associated risks mitigated. Children, their parents and guardians can be assured that data rights will be supported by the necessary mechanisms. Mental anguish suffered by children being bullied or who have posted images or other information can be significantly reduced by removing it quickly and thoroughly from the public domain. Where the root cause of the mental anguish is resolved quickly the child will avoid moving from a state on low mood to more severe mental illness. Low mood can often be treated less invasively and without administering drugs. It should not be the case that a child has longer recovery times resulting from more severe cases of mental illness because the organisation processing their personal data did not mitigate the risks to them and make adequate provision to support it.

Vulnerable Groups
Our scheme is risk based and when the consideration and evaluation of risk identifies any vulnerable groups, risks shall be appropriately mitigated. Vulnerable people can be groups that have;
Neurodivergent Conditions
Addictions (Pathological Gambling, Smart Phone - TikTok)

The capacity for vulnerable groups of people to make informed and rational decisions is diminished. It is necessary to protect these groups to ensure they are not exploited and in the cases of addiction, the associated risks are mitigated.

Processing involving children's data who also fall into vulnerable groups results in the most severe cases and sees much higher levels of suicide. Failing to identify where processing affects these groups and mitigate the consequences must be considered.

Disabled Groups
Individuals with disabilities often find it more difficult or even impossible to make informed decisions where the necessary information relating to their data processing because their needs have not been considered or accommodated. This fails to satisfy the requirement for transparency. It should be the case that disabled groups are not disadvantaged.

Low Technical Understanding
Low technical ability data subjects using high technology dependent processing often do so in a complete state of trust. Whilst it is for the data subject to make the necessary efforts to inform themselves, the information to make the informed decision needs to presented in a way that can easily be understood.
This standard requires the need for visual icons that when presented electronically are machine readable. Any language used must be written in a way that is understood by its audience and where possible simplified.

Children

Risks considered, Risks Mitigated, Data Rights considered and supported.

Vulberable

Risks Assessments are undertaken in a way that factors in the additional risks to vulnerable people.

Disabled

Access and transparency are considered to ensure disabled groups are not adversely affected.

Certifing Algorithms, AI and Automated Decision Making

Algorithms can dramatically speed up data processing, reduce costs and when accurately programmed and populated can make decisions more accurately and consistently than a human could. In some cases algorithms can perform tasks that would be impossible for a human. Algorithms can contribute in valuable and positive way to society. For these reasons the use of algorithms is increasing in frequency and algorithms are entrusted to make increasingly important decisions that drastically affect people lives. When the decisions are bad decisions, the consequences can be severe and life changing.

Certification reviews the use of algorithms to ensure a number of criteria are satisfied to protect those that the algorithms have determination over. 

Algorithms

AI

Automated Decision Making
Systems with a limited set of outcomes that pigeon hole people.

Accuracy and Testing

Transparency
Where algorithms are used, the data subjects are appropriately made aware, not only of the fact that algorithms are making decisions but also of the risks to them. The ability to request human intervention should be communicated clearly in a way the average person could understand.

Existence and Use of Automated Decision Making

Risk Mitigation

Human Decision Making
Where algorithms are certified, organisations have considered and implemented adequate mechanisms supported be sufficient resources to make human decisions when requested. 

Transparency

Where Algorithms are used, their use shall be clear and transparent, along with the rights associated with them communicated to the data subject.

Risk Mitigation

Risk Assessments are undertaken and made available to Data Subjects so they can make informed decisions about the risks to them before committing their trust to the Algorithmic Processing.

Human Decision Making

Certified Algorithms must allow for the data subject to request a human makes the decision, be clearly communicated and be able to be actioned in a timely manner.

Commercial & Economic benefits of Certified Processing

Sit quas assum id. Ut oporteat senserit eum. Lucilius electram quo id, vidit virtute habemus te mea. Qui sumo assueverit eu. Per utinam ridens volutpat an, cum discere mandamus ut, pro in semper prompta omnesque. At pri quando ridens nostrum, labore maiorum democritum an pri. In his dolor nullam, ut usu meliore fabellas, nam meliore nostrum at. Has facete vivendum cu, ea malorum maiestatis ius. Sed fugit quaestio ei. Mazim consulatu consectetuer pri ea, no eius sapientem laboramus vix. Mel an conceptam adversarium, civibus splendide scriptorem nec ea.

Due Diligence

Reduced Sales Friction
EU anyone looking to minimise risk

Reduced Insurance Premiums and Attainable Insurance
Issues at renewal

Target of Evaluation based insurance


Competitive Advantages and Consumer Trust
Reputation enhancing

Data Minimisation - wastage
sadas

LGBT Health

Lorem ipsum dolor amet, consecte tempor incididunt ut labore et dolore tumber tur adipisicing elit.

Kidney/Renal Services

Lorem ipsum dolor amet, consecte tempor incididunt ut labore et dolore tumber tur adipisicing elit.

Interventional Radiology

Lorem ipsum dolor amet, consecte tempor incididunt ut labore et dolore tumber tur adipisicing elit.

Processing Friction

I is well documented that scenarios that require personal data to be passed can constitute a delay and in some cases a totally avoidable delay. This can be particularly common where individuals that do not have an understanding of UK GDPR fear the creation of a data breach more than being reprimanded for not carrying out a task.

In other cases Risk Assessments are undertaken with outcomes that completely halt processing altogether.

This causes unnecessary delays or barriers which have negative repercussions such as delays transferring patients, creating unnecessary suffering in some cases and clogging up resources, again negatively impacting other patients and wasting valuable resources.

Certification frees up staff because where they see the mark, they can be confident that the underlying processes and safeguards are in place. They do not need to be a UK GDPR expert to conduct their job.

Fluid Data Transfers

Lorem ipsum dolor amet, consecte tempor incididunt ut labore et dolore tumber tur adipisicing elit.

Infectious Diseases

Lorem ipsum dolor amet, consecte tempor incididunt ut labore et dolore tumber tur adipisicing elit.

Hospital Medicine

Lorem ipsum dolor amet, consecte tempor incididunt ut labore et dolore tumber tur adipisicing elit.

New and emerging threats