The Pitfalls Of GDPR & Cyber Security For Micro Organisations

When we think of charities, what usually springs to mind are the grand challenges and associated fundraising drives. We’re asked to help cure cancer, end poverty, or fight injustice. What's less visible are the thousands of micro charities, non-profits and private clubs enriching people’s lives by building and maintaining communities. 

Whether they’re a charity, helping people build a support network, a non-profit helping people gain work experience, or a small club, whose members pay a subscription to share a hobby, the problem is the same. Their funding comes with the expectation that they'll do something that GDPR and Cyber Security both make harder. 

Often these organisations' volunteers are also business owners, volunteering their skills in their spare time... But the risk of decisions made in business and as a trustee are different. 

Is GDPR dividing opinions so much that charities feel they have to stop fulfilling their purpose? 

Decisions made by committee are inherently conservative, so the lowest risk decision a small charity or club can make is to stop doing the thing they're scared of. 

As you're reading this, millions of small community-led organisations are deciding whether to stop providing services such as membership directories and support networks because they’re unclear about how their responsibilities have changed. The prospect of fines divides committees, resulting in a loss of the skills and knowledge needed to fulfil the organisation’s purpose. What's worse, is that the services that they're considering withdrawing are the things that help people connect with their communities. 

What do they need to know? 

GDPR isn’t intended to stop us sharing data, and Google and Facebook share far more information about us than micro charities will ever collect. What is expected is more transparency and documentation of what’s happening, identification of the lawful basis to carry out this activity, and the processes and security measures they will use to manage the risk of a breach. 
Not collecting data is a legitimate cyber security measure, but good security isn't intended to be obstructive. In the case where they have to have a database of personal information whatever happens, but are considering reducing the services is used for, their cyber risk remains almost the same. 

Cyber risk relates to the value of data to hackers – as you collect information you collect risk. Adding some more security to reduce the risk would probably let them continue their projects. Keeping data subjects safe is either a question of protecting or of not collecting data. 

The choice not to use data is reducing an entirely different risk – the risk that the charity hasn’t understood the regulation, or that their members disagree with how their data is being used. Here’s what Piers Clayden had to say about the legal aspects of helping people stay in touch: 

“Small charities face a number of challenges when trying to work out how to comply with GDPR. The problem being that compliance will require the 2 things that small charities don’t have in abundance – time to drive through the necessary changes in practice and policy and money to take external advice (because the available guidance may not provide the answers you are looking for).

“Organisations who handle (‘process’) personal data can only do so legally where they have ‘lawful grounds’ for that processing. For charities trying to stay in touch with members and potential donors, the lawful grounds will most likely either be on the basis of the member/donors’ ‘consent’ or that the processing is necessary for the charity’s ‘legitimate interests’. 

“If a charity can mount an arguable case for using the ‘legitimate interests’ grounds (and it does require some analysis) then it may save the charity from having to seek new consents from its existing database.”

So, any charity or club collecting personal data might have to rethink what they're doing. If the data is collected purely for marketing or fundraising then it's unlikely to be a legitimate interest, but charities and clubs have a huge advantage over businesses... They're already required to be transparent. They have constitutions or they've had to register with the charities commission.

So if you're responsible for making decisions about a charity’s data use, or questioning whether you can even afford to send every member a letter asking for their consent... what did you already promise your donors and members that you would do?

This is an editorial article containing opinions that are not intended to replace advice. If you need support developing cyber security processes please follow the links below.

By Emma Osborn, independent cyber security consultant, OCSRC Ltd, with Piers Clayden, technology lawyer, Clayden Law Ltd.

Emma Osborn is an independent cyber security consultant, specialising in the support of smaller organisations and non-technical business leaders as they develop their cyber security processes.  OCSRC

If you’re looking for specialist legal advice, Piers Clayden can be found here: Clayden Law 

You Might Also Read:

GDPR For Dummies:

GDPR: It’s A Marathon, Not A Sprint:

« Hacking The Vote
A Guide To Preventing Charity Cybercrime »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

QTS

QTS

QTS Realty Trust, Inc. is a leading provider of secure, compliant data center, hybrid cloud and managed services.

Homeland Security Advanced Research Projects Agency (HSARPA)

Homeland Security Advanced Research Projects Agency (HSARPA)

HSARPA's Cyber Security Division (CSD) was set up to address DHS cyber operational and critical infrastructure protection requirements.

Security Research Labs (SRLabs)

Security Research Labs (SRLabs)

Security Research Labs is a Berlin-based hacking research collective and consulting think tank.

NTOP

NTOP

NTOP develop high-quality network traffic analysis and DDoS protection software used by small individuals as well by large telecom operators.

Seqrite

Seqrite

Seqrite offers a highly advanced range of enterprise and IT security solutions to protect your organization's most critical data.

LEADS

LEADS

LEADS is considered as a leading ICT Solution Provider and an IT partner of choice in Bangladesh.

Granted Consultancy

Granted Consultancy

Granted Consultancy is a business consultancy that specialises in securing funding to support companies with the development and commercialisation of new and innovative products and technologies.

Qmulos

Qmulos

Qmulos’ real-time continuous monitoring risk management suite, Q-Compliance, provides a massively flexible and scalable solution to optimizing operational security.

Kindus

Kindus

Kindus is an IT security, assurance and cyber security risk management consultancy.

SecurityGate

SecurityGate

SecurityGate.io is the only Integrated Risk Management platform built for OT/ICS cybersecurity. The leading Risk Assessment Platform for Critical Infrastructure.

OptimEyes.ai

OptimEyes.ai

OptimEyes.ai is a unique AI-powered, on-demand SaaS solution for cyber-security, data privacy and compliance risk modeling.

Match Systems

Match Systems

Match Systems provides blockchain investigations, KYC, KYT, AML, Due Diligence and compliance services.

CentriVault

CentriVault

CentriVault is a leading independent provider of Cyber Security and Data protection services to small and medium enterprises (SMEs).

Infodot Technologies

Infodot Technologies

Infodot Technologies specialize in a co-managed IT support and services approach, where businesses share their IT responsibilities with a skilled Managed IT Services Provider (MSP).

Labyrinth Technology

Labyrinth Technology

Labyrinth Technology is an IT support company based in London specialising in cyber security for small to medium sized businesses.

Sensiba

Sensiba

Sensiba are accountants, consultants, and experts in good business. We use deep industry experience to help organizations solve problems, navigate complexity, and build sustainable growth.