View on GitHub

Reprotec UK Ltd Policies Home Page

Home page for ISO and employee policies

Data Transfer Policy

1. Introduction

Data can potentially be transferred in a wide variety of media and methods both into and out of our company, in electronic and/or paper format. In every transfer there is a risk that the information may be lost, misappropriated or accidentally released. Where this data is controlled data, this represents a risk to our company of breaching our responsibilities under the DPA and could lead to regulatory action, including significant fines.

2. Purpose and scope

This policy lays out the practical methods that need to be applied in undertaking a transfer of data, and will provide additional guidance more specifically on the transfers of controlled data. This policy is applicable to anyone handling sensitive information that may have a need to transfer client or company data, including:

3. Initial considerations

Before you undertake a physical data transfer, ensure you have the appropriate authorisation to do so. Bear in mind any restrictions in place for the sharing or transfer of controlled data.

4. Data transfer methods

This section lists the main methods of data transfer and also sets out any restrictions and requirements for the secure transfer of controlled data. Before choosing your method of transfer you must consider the following:

4.1. Via email

There are 3 main email routes that can be considered when transferring data via email. These are outlined below, with relevant restrictions highlighted. All transfers of data by email must be done in a way that complies with the Acceptable Use Policy.


General email rules

4.2. Via standard email “@Opusworks.com”

When sending information internally between “Opusworks.com” addresses, this is already secure and does not require any additional actions.

4.3. Telephone / mobile phone

As phone calls may be monitored, overheard or intercepted either deliberately or accidentally, care must be taken as follows:-

4.4. Sending information by post

You, as the sender, are responsible for making sure that:

You are responsible for the package up until its successful arrival at its destination. You must therefore ensure you choose the most appropriate method of transfer and mitigate any potential loss or risk to the information. Posting of sensitive / confidential data an extra level of protection must be applied when sending:

4.5. Hand delivery / collection

Hand delivery or collection of a document is also an approved method of transfer. When arranging for an individual to collect information, you should be satisfied that your know that they are who they say they are and seek an appropriate form of identification before you hand over any documentation.

5. Transferring data outside of the United Kingdom / EEA

You must speak to the Information Security Management Team before agreeing or undertaking any transfers of any data outside of the EEA. This is especially important when handling controlled data. You must check, as part of information management due diligence that any service providers you procure are not planning to process personal data outside the EEA. E.g. some service providers may use cloud based systems for data storage which are not UK based. Principle Eight of the Data Protection Act 1998 (DPA), requires that personal data must not be transferred to a country or territory outside the European Economic Area (EEA) unless the country or territory can provide an adequate level of protection for the rights and freedoms of the individuals whose data is being transferred. It is important to note that all other principles of the Data Protection Act are still relevant and must be complied with.

6. Reporting data incidents

Staff must report any suspected or actual security breaches to the ISMS Committee

7. Policy review

This policy will be reviewed on an annual basis or sooner as is required where there are changes in legislation or recommended changes to improve best practice.

back