From the 25th May 2018, the General Data Protection Regulation law takes effect. You’ve probably seen GDPR everywhere recently and that’s because it is a regulation in European Union law on data protection for every individual within the EU.
We know you may have a few questions about it and might want to know whether or not you need to prepare for it. We’ve put together what we know and will explain how it affects everyone who is registered with Advance TRS.
GDPR regulates the way personal data is treated or used within any organization who is subject to this information. Personal data is anything that can identify a person. You need to comply with the GDPR law if your company or organization has collected, stored, transmitted or even erased personal data. The old GDPR law will be replaced on the 25th May with the new one and there are some changes that have been introduced that everyone needs to be aware of.
What is Advance TRS doing to prepare?
The Advance TRS company structure facilitates transparent and compliant administration of the GDPR updates, this includes assigning responsibilities for Data Protection to a specific individual within the structure of the organisation. Through the implementation of defined processes and with a strong focus on managing risk, Advance TRS is committed to communicating openly with internal and external customers on how their personal data is collected and stored. This also includes a regular review of the accuracy of personal data held along with routine opportunities for this to be updated.
Advance TRS only process personal data that is essential to business operations or our continued compliance with government and regulatory bodies where we are required to achieve certain operational, vocational and administrative standards. All personal data is stored in a password-protected database located on an external server within a high-security data centre in the United Kingdom.
Data security is of paramount importance to Advance TRS as part of our protection from any data breaches. Systems are constantly monitored, audited and assessed to facilitate the detection of potential breaches.