GDPR Compliance
Overview
MDHosting Ltd processes personal data as a data controller and processor for web hosting services. This document outlines our compliance with the UK General Data Protection Regulation (UK GDPR) and provides procedures for maintaining ongoing compliance.
Regulatory Framework: - UK GDPR (retained EU law post-Brexit) - Data Protection Act 2018 - Privacy and Electronic Communications Regulations (PECR)
Supervisory Authority: Information Commissioner's Office (ICO) ICO Registration: ZB044018 Company Number: 09796097 (incorporated 25 September 2015)
German Server Location
All client data is hosted on servers located in Germany (Hetzner datacentres), providing strong EU data protection under both UK GDPR and EU GDPR frameworks.
Data Protection Officer
DPO Appointment Status
MDHosting Ltd has not appointed a Data Protection Officer (DPO). This decision is compliant with UK GDPR, which does not mandate DPO appointment for all organisations.
Legal Requirements for DPO Appointment
Under UK GDPR Article 37, DPO appointment is mandatory only when:
- Public Authority: The controller or processor is a public authority or body (except courts acting in judicial capacity)
- Core Activities: The core activities of the controller or processor consist of processing operations which require regular and systematic monitoring of data subjects on a large scale
- Special Category Data: The core activities consist of large-scale processing of special categories of data (Article 9) or criminal conviction data (Article 10)
Why MDHosting Does Not Require a DPO
Organisational Size: - Small hosting provider (under 250 employees) - Limited scope of processing operations - Not a large-scale processor by GDPR definitions
Processing Activities: - Standard web hosting services (not special category data) - No systematic monitoring beyond security logging - No profiling or automated decision-making - Processing proportionate to business size
Data Categories: - Client account data only (name, email, billing details) - No processing of special category data: - No health data - No biometric data - No political opinions, religious beliefs, or trade union membership - No criminal convictions data
Scale Assessment: - Approximately 30 active hosting accounts - Not considered "large scale" under UK GDPR - ICO guidance suggests large scale involves thousands of individuals or significant geographical reach
Data Protection Responsibility
Although no formal DPO is appointed, data protection responsibilities are assigned as follows:
Data Protection Lead: Matthew Dinsdale (Director) Contact: admin@mdhosting.co.uk Responsibilities: - Oversee GDPR compliance programme - Handle data subject rights requests - Liaise with ICO if required - Approve changes to data processing activities - Maintain data protection policies and procedures - Conduct annual compliance reviews
ICO Contact
For formal regulatory matters, data subjects and clients can contact the Information Commissioner's Office:
Information Commissioner's Office (ICO) Wycliffe House Water Lane Wilmslow Cheshire SK9 5AF
Phone: 0303 123 1113 Website: https://ico.org.uk/
Future Considerations
MDHosting will reconsider DPO appointment if: - Business expands to process significantly more accounts (>1,000 active clients) - New services involve special category data processing - Core activities expand to include systematic monitoring or profiling - Regulatory guidance or legal requirements change - ICO recommends appointment following audit or assessment
DPO appointment status is reviewed annually as part of the compliance monitoring programme.
Data Protection Principles
MDHosting Ltd adheres to the seven data protection principles:
- Lawfulness, Fairness and Transparency - Process data lawfully with clear privacy notices
- Purpose Limitation - Collect data only for specified, explicit purposes
- Data Minimisation - Collect only data that is necessary
- Accuracy - Keep data accurate and up to date
- Storage Limitation - Retain data only as long as necessary
- Integrity and Confidentiality - Secure data with appropriate measures
- Accountability - Demonstrate compliance with all principles
Legal Basis for Processing
Data Controller Activities
MDHosting Ltd processes personal data under the following legal bases:
1. Contract Performance (Article 6(1)(b)) - Processing necessary to provide hosting services - Account setup and management - Technical support delivery - Billing and payment processing
2. Legitimate Interests (Article 6(1)(f)) - Server security monitoring and logging - Fraud prevention and detection - Network performance optimisation - System administration and maintenance
3. Legal Obligation (Article 6(1)(c)) - Compliance with tax and accounting requirements - Response to valid legal requests - Retention of business records
4. Consent (Article 6(1)(a)) - Marketing communications (opt-in required) - Optional service features - Testimonials and case studies
Data Processor Activities
When acting as a data processor for client websites: - Processing instructions defined in hosting agreements - Client retains data controller responsibilities - MDHosting provides technical and organisational measures - Data processing agreements (DPAs) in place with clients
Consent Management
When MDHosting processes personal data on the basis of consent (Article 6(1)(a)), we ensure consent is freely given, specific, informed, and unambiguous. This section details our procedures for obtaining, recording, and managing consent.
When Consent is Required
Consent is used as the legal basis for:
Marketing Communications: - Email newsletters and product updates - Service announcements (optional communications beyond essential service emails) - Promotional offers and special deals - Event invitations and webinars
Optional Features: - Beta programme participation - User experience research and surveys - Analytics beyond essential service metrics - Third-party integrations that share data
Public Use of Information: - Testimonials and case studies - Use of company name in client lists - Before-and-after examples of work - Public references or recommendations
Not Based on Consent: - Essential service provision (contract basis) - Security monitoring (legitimate interests) - Billing and invoicing (contract basis) - Legal compliance (legal obligation basis)
Obtaining Consent
Consent Request Requirements:
- Clear and Plain Language
- Avoid legal jargon and technical terminology
- Use short, simple sentences
- Explain what will happen in practical terms
-
Written in British English appropriate for general audience
-
Granular Consent
- Separate consent for different purposes
- Individual opt-in for each type of marketing
- No pre-ticked boxes or assumed consent
-
Each consent stands alone (unbundled)
-
Freely Given
- Consent not a condition of service (unless genuinely necessary)
- No detriment for refusing consent
- Easy to refuse without penalty
-
Service provided regardless of marketing consent
-
Affirmative Action Required
- Active opt-in via checkbox or button
- No pre-selected options
- No implied consent from silence or inactivity
- Clear statement of agreement
Consent Mechanisms:
Website Signup Forms: - Separate checkbox for marketing emails (unchecked by default) - Clear label: "I would like to receive news and offers from MDHosting by email" - Link to privacy notice immediately visible - Optional field, not required to complete registration
Client Portal: - Preferences section for consent management - Toggle switches for each consent type - Immediate effect when changed - Confirmation message displayed
Email Requests: - Explicit request with clear yes/no options - Link to online consent form - Reply confirmation required - Record stored in consent database
Phone Requests: - Verbal consent recorded and confirmed in writing - Follow-up email with consent details - Opt-in link sent for written confirmation - Not relied upon until written confirmation received
Recording Consent
For each consent given, MDHosting records:
Consent Record Contents:
- Data Subject Identification
- Name and email address
- Client account ID (if applicable)
-
Unique consent reference number
-
Consent Details
- Date and time consent given (timestamp)
- Specific purpose consented to
- Exact wording of consent request shown
-
Version of privacy notice in effect
-
Consent Source
- How consent was obtained (web form, email, portal, phone)
- IP address of consent submission (web)
- User agent and device information (web)
-
Staff member who recorded consent (phone/email)
-
Consent Status
- Active or withdrawn
- Withdrawal date and time (if applicable)
- Reason for withdrawal (if provided)
- Renewal date (if consent refreshed)
Storage and Format:
- Consent records stored in secure database (not publicly accessible)
- Encrypted at rest and in transit
- Access restricted to authorised staff only
- Audit trail of all consent record changes
- Regular backups per retention policy
- Segregated from other data for easy retrieval
Audit Trail:
All changes to consent records logged: - Timestamp of change - User who made change - Previous and new values - Reason for change (if manual update) - IP address of change request
Consent Withdrawal
Data subjects have the right to withdraw consent at any time, as easily as consent was given.
Withdrawal Methods:
- Unsubscribe Links
- Every marketing email contains unsubscribe link
- One-click unsubscribe (no login required)
- Immediate processing (within 24 hours)
- Confirmation page displayed
-
Confirmation email sent
-
Client Portal
- Login to portal preferences
- Toggle off consent switches
- Immediate effect
-
Confirmation message shown
-
Email Request
- Email to admin@mdhosting.co.uk
- Subject: "Withdraw Consent" or "Unsubscribe"
- Processed within 48 hours
-
Confirmation sent when complete
-
Written Request
- Post to registered office address
- Processed within 5 business days
- Written confirmation sent
Withdrawal Processing:
- Immediate Actions
- Flag consent as withdrawn in database
- Add to suppression list for relevant processing
- Record timestamp and method of withdrawal
-
Stop processing within 24 hours (email within 48 hours)
-
Notification
- Send confirmation to data subject
- Explain what has stopped
- Clarify what continues (essential service emails)
-
Inform of right to complain to ICO
-
Impact Communication
- Withdrawal does not affect:
- Existing contract obligations
- Past processing that was lawful
- Other legal bases (contract, legitimate interests)
- Essential service communications
-
May affect:
- Access to optional features requiring consent
- Participation in beta programmes
- Receipt of service improvement communications
-
Retention
- Withdrawn consent records retained for 6 months
- Necessary to prevent re-contacting
- Suppression list maintained indefinitely
- Demonstrates compliance with withdrawal request
Marketing Consent (PECR Compliance)
Under Privacy and Electronic Communications Regulations (PECR), electronic marketing requires specific consent.
Email Marketing:
New Clients (No Prior Relationship): - Explicit opt-in required before any marketing - Cannot send marketing without clear consent - Cannot use pre-ticked boxes - Must identify clearly as marketing
Existing Clients (Soft Opt-in): - May send marketing about similar products/services - Only if client details obtained during sale/negotiation - Client must be given clear opt-out at collection - Every message must include unsubscribe option - Opt-out must be honoured immediately
Business-to-Business vs. Consumer: - Individual email addresses require consent (B2C rules) - Generic corporate emails (@company.com) may be less restricted - When in doubt, apply B2C rules - Named individuals at businesses treated as consumers
Unsubscribe Requirements: - Present in every marketing email - Simple and straightforward process - Free of charge - No login or authentication required - Processed within 24 hours
Suppression List Management: - All unsubscribe requests added to suppression list - Checked before every email send - Retained permanently - Prevents accidental re-contact - Shared with email service providers
Third-Party Marketing: - MDHosting does not share data with third parties for their marketing - No consent requests for third-party marketing - Client data not sold or rented - Sub-processors may not use data for their own marketing
Consent Refresh and Renewal
Consent does not expire automatically, but MDHosting implements consent refresh to ensure ongoing validity.
Refresh Triggers:
- Time-Based Refresh (2 years)
- Marketing consent refreshed every 2 years
- Email sent requesting consent renewal
- If no response, cease marketing after 30 days
-
Move to suppression list if no renewal
-
Material Changes
- Significant changes to processing purposes
- New data sharing arrangements
- Changes to sub-processors
-
Privacy notice material updates
-
Inactivity
- No engagement with marketing for 18 months
- No clicks, opens, or website visits
- Considered "inactive"
-
Consent re-confirmation requested
-
Regulatory Changes
- New legal requirements
- ICO guidance changes
- PECR amendments
- Best practice updates
Refresh Process:
- Re-consent Email
- Sent to all consented individuals
- Explains why re-confirmation needed
- Clear opt-in link (not opt-out)
-
30-day deadline for response
-
No Response Handling
- After 30 days, cease marketing
- Retain on suppression list
- Do not assume continued consent
-
Can still send essential service emails
-
Renewed Consent
- New consent record created
- Fresh timestamp and details
- Supersedes previous consent
- Audit trail maintained
Documentation: - All consent refresh campaigns logged - Response rates tracked - Unsubscribes recorded - Annual review of refresh effectiveness
Consent Records Access
Data subjects can request copies of their consent records under Article 15 (Right of Access).
What We Provide: - All current active consents - History of withdrawn consents - Dates of consent and withdrawal - Purposes for which consent was given - Methods of consent collection
Request Process: - Submit via Subject Access Request (see Data Subject Rights section) - Identity verification required - Provided within 1 month - Free of charge
Data We Process
Client Account Data
| Data Type | Purpose | Legal Basis | Retention |
|---|---|---|---|
| Name, email, phone | Account management, support | Contract | Duration + 6 years (tax) |
| Billing address | Invoicing, tax compliance | Contract, legal obligation | Duration + 6 years (tax) |
| Payment details | Payment processing | Contract | Not stored (via payment processor) |
| IP addresses (admin) | Security, access logs | Legitimate interests | 12 months |
| Technical support logs | Service delivery, troubleshooting | Contract | 24 months |
| Website files/databases | Hosting service provision | Contract | Duration + 30 days |
End-User Data (as Processor)
For data stored on client websites, clients are the data controllers: - Website visitor data (analytics, cookies) - Customer databases (e-commerce, CRM) - Form submissions and enquiries - User accounts and profiles
Client Responsibilities
Clients must ensure their own GDPR compliance for data they collect via hosted websites. MDHosting provides the technical infrastructure but does not control website data collection practices.
Cookie Consent & PECR Compliance
The Privacy and Electronic Communications Regulations (PECR) complement UK GDPR and impose specific requirements for cookies and electronic marketing. This section covers MDHosting's compliance with PECR.
UK PECR Requirements
PECR requires: - Consent for storing or accessing information on user devices (cookies and similar technologies) - Consent for electronic marketing communications (email, SMS) - Clear and comprehensive information about cookies - Easy opt-out mechanisms
Exceptions: - Strictly necessary cookies do not require consent - Essential service communications do not require marketing consent
Cookie Categories and Consent
Cookies fall into four categories with different consent requirements:
1. Strictly Necessary Cookies
Purpose: Essential for website operation Consent Required: No Examples: - Session management cookies - Authentication tokens - Load balancer cookies - Security cookies (CSRF tokens) - Shopping basket functionality
MDHosting Usage: - cPanel/control panel session cookies - Client portal authentication - Billing system session management - No consent required per PECR Regulation 6(4)
2. Performance/Analytics Cookies
Purpose: Collect information about website usage Consent Required: Yes Examples: - Google Analytics - Traffic analysis - Page view counters - Error tracking
MDHosting Usage: - Website analytics (if implemented) - User behaviour tracking for service improvement - Consent obtained via cookie banner before setting
3. Functional Cookies
Purpose: Remember user choices and preferences Consent Required: Yes (unless strictly necessary for requested service) Examples: - Language preferences - Region selection - Interface customisation - Accessibility settings
MDHosting Usage: - Minimal functional cookies - Where used, consent obtained via banner
4. Marketing/Targeting Cookies
Purpose: Track users across websites for advertising Consent Required: Yes Examples: - Advertising cookies - Social media tracking pixels - Retargeting cookies
MDHosting Usage: - Not currently used - Would require explicit consent if implemented
MDHosting Website Cookie Compliance
Current Cookie Implementation:
- Essential Cookies Only
- MDHosting website uses only strictly necessary cookies
- Session management for client portal
- Authentication for control panels
-
No analytics or marketing cookies currently deployed
-
Cookie Banner
- If non-essential cookies added, cookie consent banner will be implemented
- Displayed on first visit
- Clear explanation of cookie types
- Accept/reject options for each category
-
Link to detailed cookie policy
-
Cookie Policy Page
- Available at mdhosting.co.uk/cookie-policy
- Lists all cookies used
- Explains purpose and duration
- Provides opt-out instructions
- Updated when cookies change
Cookie Information to Provide:
For each cookie, we document: - Cookie name - Purpose and function - Duration (session or persistent) - First-party or third-party - Data collected - Third parties with access
Cookie Consent Implementation (if non-essential cookies added):
- Banner Display
- Shown before cookies set (except necessary)
- Does not block content unnecessarily
- Clear and concise language
- British English
-
No scrolling or browsing as consent
-
Granular Control
- Category-by-category consent
- Accept all / reject all options
- Customise preferences
-
Save preferences in essential cookie
-
Consent Storage
- Consent choice stored in cookie (ironic but necessary)
- Duration: 12 months then re-prompt
- Can be changed at any time via policy page
-
Withdrawal as easy as granting
-
Prior Consent Requirement
- Non-essential cookies not set until consent given
- Scripts blocked until user accepts
- Re-check consent on each visit if expired
- No assumed consent
Email Marketing PECR Compliance
PECR imposes specific rules on electronic marketing beyond GDPR consent requirements.
Unsolicited Marketing Rules
To Individual Subscribers (B2C): - Opt-in consent required before sending any marketing - Cannot use pre-ticked boxes - Soft opt-in exception: existing customers for similar products - Must identify sender clearly - Must provide free opt-out method - Opt-out must be honoured immediately
To Corporate Subscribers (B2B): - Limited PECR restrictions on generic corporate email addresses - Individual named addresses still require consent - Best practice: treat all as B2C
MDHosting Approach: - Treat all email addresses as B2C (strictest standard) - Always require explicit opt-in - Never purchase email lists - Honour opt-outs within 24 hours
Soft Opt-In Exception
MDHosting may send marketing to existing clients without prior consent if:
Conditions (all must be met): 1. Contact details obtained during sale or negotiations for sale 2. Marketing is for MDHosting's own similar products/services 3. Client given clear opportunity to opt-out at collection 4. Client given clear opt-out in every message
Similar Products/Services: - Web hosting upgrades and add-ons - Related services (email hosting, domains) - Service improvements and new features
Not Similar: - Unrelated third-party products - Services outside hosting/domains - Products requiring separate contracts
Opt-Out Implementation: - Clear "unsubscribe" link in every email - Prominent placement (footer minimum) - One-click unsubscribe (no login required) - Immediate processing (within 24 hours) - Confirmation sent when complete
Message Content Requirements
Every marketing email must include:
Mandatory Elements:
- Clear Identification
- Sender name: "MDHosting Ltd"
- From address: marketing@mdhosting.co.uk or similar
-
Not misleading or deceptive
-
Contact Information
- Valid reply-to address
- Physical address (registered office)
-
Company number: 09796097
-
Clear Marketing Identification
- Recognisable as marketing
- Not disguised as service emails
-
Subject line not misleading
-
Opt-Out Mechanism
- Unsubscribe link in every message
- Clear instructions
- Free of charge
- Simple process
Prohibited Practices: - Misleading headers or subject lines - Concealing sender identity - Failing to provide opt-out - Charging for opt-out - Making opt-out difficult or complex
Suppression List Management
MDHosting maintains a suppression list of individuals who have opted out of marketing.
Suppression List Purpose: - Prevent sending marketing to those who opt-out - Demonstrate PECR compliance - Avoid complaints and ICO investigation - Protect reputation
List Contents: - Email addresses of all opt-outs - Date of opt-out - Method of opt-out - Reason (if provided) - Permanent retention
Suppression Process:
- Adding to List
- All unsubscribe requests added immediately
- All complaint-based opt-outs added
- Regular import from email service provider
-
Manual additions processed within 24 hours
-
List Checking
- Check before every marketing send
- Automated checking in email platform
- Manual review for small sends
-
No marketing to suppressed addresses
-
List Maintenance
- Regular audits (quarterly)
- Remove duplicates
- Verify accuracy
-
Never remove valid opt-outs
-
Third-Party Sharing
- Suppression list shared with email service providers
- Necessary for automated checking
- Processor agreement in place
- No other sharing
Re-consent: - Cannot remove from suppression without explicit new consent - Must be separate, affirmative opt-in - Cannot assume silence is consent - Document new consent clearly
Client Website Cookie Guidance
MDHosting assists clients in achieving cookie compliance for their hosted websites.
Client Responsibilities:
Clients are data controllers for their websites and must: - Implement cookie consent mechanisms - Provide clear cookie information - Obtain consent for non-essential cookies - Honour user preferences - Maintain cookie policies
MDHosting Support:
- Technical Implementation
- Assist with cookie consent plugin installation
- Provide hosting for cookie consent scripts
- Support cookie blocking implementations
-
Troubleshoot consent tool issues
-
Plugin Recommendations
- Cookie Consent plugins for WordPress
- Compliance tools compatible with hosting environment
- Free and premium options
-
UK GDPR/PECR compliant solutions
-
Resources Provided
- Cookie policy templates (on request)
- PECR compliance guidance
- Links to ICO resources
-
Best practice documentation
-
What MDHosting Does Not Do
- Audit client websites for compliance
- Provide legal advice on PECR
- Accept liability for client non-compliance
- Configure client consent tools (unless contracted separately)
Recommended Cookie Consent Plugins:
For WordPress sites: - Cookie Notice & Compliance (free, UK-friendly) - Complianz GDPR/CCPA Cookie Consent (premium, comprehensive) - CookieYes (freemium, easy implementation)
For custom sites: - Cookiebot (paid service, robust) - OneTrust (enterprise solution) - Osano (good for small businesses)
Client Independence
MDHosting provides infrastructure and support but clients remain solely responsible for their website's PECR compliance. Clients should seek legal advice for complex compliance questions.
PECR Enforcement and Penalties
ICO Enforcement Powers: - Issue monetary penalties up to £500,000 - Enforcement notices requiring specific actions - Stop processing orders - Prosecution for certain breaches
Common PECR Violations: - Sending unsolicited marketing emails without consent - Failing to provide opt-out mechanisms - Setting non-essential cookies without consent - Misleading marketing messages - Concealing sender identity
MDHosting Compliance Measures: - Regular staff training on PECR - Documented consent procedures - Suppression list maintenance - Cookie policy updates - Annual compliance reviews
PECR Compliance Checklist
- Only strictly necessary cookies set without consent
- Cookie policy page published and accessible
- Marketing emails only to opted-in recipients
- Unsubscribe link in every marketing email
- Suppression list maintained and checked
- Soft opt-in conditions met for existing customers
- Email sender clearly identified
- Cookie consent banner implemented (if non-essential cookies used)
- Client guidance provided on website cookies
- Annual PECR compliance review conducted
Further Resources
ICO PECR Guidance: - https://ico.org.uk/for-organisations/direct-marketing-and-privacy-and-electronic-communications/ - https://ico.org.uk/for-organisations/guide-to-pecr/
Cookie Guidance: - https://ico.org.uk/for-organisations/uk-gdpr-guidance-and-resources/cookies/
Email Marketing: - https://ico.org.uk/for-organisations/direct-marketing-and-privacy-and-electronic-communications/electronic-and-telephone-marketing/
Data Subject Rights
MDHosting supports all UK GDPR data subject rights. This section details the operational procedures for handling data subject requests.
Request Management Procedures
Request Intake and Logging
Channels for Requests:
Data subjects can submit requests through multiple channels:
- Primary: admin@mdhosting.co.uk
- Alternative: support email addresses
- Automatic forwarding to request queue
-
Acknowledgement sent within 48 hours
-
Client Portal
- Dedicated "Data Rights Request" form
- Secure submission with automatic authentication
- Confirmation displayed immediately
-
Email confirmation sent
-
Postal Mail
- Registered office address (see contact details)
- Scanned and logged upon receipt
- Acknowledgement sent by return post
-
Processed same as email requests
-
Support Ticket
- Can be submitted via normal support channels
- Flagged for priority handling
- Routed to data protection lead
- Subject line tagged: [DATA SUBJECT REQUEST]
Request Logging:
Every data subject request is logged in the Data Subject Request Register:
Log Entry Contains: - Unique reference number (format: DSR-YYYY-MM-###) - Date and time received - Data subject name and contact details - Request type (access, erasure, portability, etc.) - Requested action or information - Channel received (email, portal, post) - Assigned handler - Status (received, verifying, assessing, processing, completed) - Deadline date (1 month from receipt) - Completion date - Outcome and actions taken
Log Location: - Secure internal documentation (not in git repository) - Access restricted to authorised staff - Encrypted storage - Regular backups - Retained for 6 years for audit purposes
Identity Verification Procedures
Before processing any data subject request, identity must be verified to prevent unauthorized disclosure.
Standard Verification (Low-Risk Requests):
For routine requests from known clients:
- Email from Registered Account
- Email received from address on file
- Matches client account email
- No additional verification required
-
Processed immediately
-
Client Portal Submission
- Authenticated login required
- Username/password verification
- Already verified identity
- Processed immediately
Enhanced Verification (High-Risk Requests):
For sensitive requests (e.g., large data access, erasure requests, requests from unknown parties):
- Additional Information Required
- Government-issued photo ID (driving licence, passport)
- Proof of address (utility bill, bank statement)
- Account-specific information (invoice number, service details)
-
Submitted via secure method
-
Verification Timeline
- Request additional documents within 24 hours of initial request
- Allow 5 business days for data subject to provide
- Verify documents within 2 business days
-
Clock for 1-month response starts after verification complete
-
Verification Methods
- Secure file upload via client portal
- Encrypted email attachment
- Postal mail to registered address
- In-person verification (by appointment)
Failed Verification:
If identity cannot be verified: - Inform data subject of failure - Explain what additional information is needed - Provide 10 business days for compliance - If still unverified, request can be refused - Document refusal reason - Inform of right to complain to ICO
Verification Records:
- Method of verification documented in request log
- Copies of ID retained only as long as necessary (destroyed after request complete)
- Verification failure reasons documented
- Audit trail maintained
Request Assessment
Once identity is verified, assess the request for validity and complexity.
Validity Assessment:
- Is This a Valid GDPR Request?
- Does it relate to personal data processing?
- Is it one of the recognised rights (Articles 15-22)?
- Is the data subject making the request (or authorised representative)?
-
Is the request clear and specific?
-
Exemptions and Limitations
- Legal privilege (legal advice, court proceedings)
- Management forecasting
- Negotiations with data subject
- References given in confidence
- Examination scripts and marks
-
Regulatory investigations
-
Manifestly Unfounded or Excessive?
- Clearly frivolous or vexatious
- Repetitive requests without reasonable interval
- Grossly disproportionate effort required
- If yes: can charge reasonable fee or refuse
- Must justify and document decision
- Inform data subject of refusal reason
Complexity Determination:
Determines response timeline (1 month standard, extendable to 3 months if complex):
Simple Requests (1-month timeline): - Single data subject - Small amount of data - Straightforward retrieval - Clear request scope - No legal assessment required
Complex Requests (may extend to 3 months): - Multiple systems or databases - Large volume of data - Requires redaction (third-party data) - Legal assessment needed (exemptions) - Unclear request requiring clarification - Multiple requests received simultaneously
Extension Notification: - If extending to 3 months, notify data subject within 1 month - Explain reasons for extension - Provide new deadline date - Offer interim update if possible
Execution Workflows
Who Handles Requests:
- Data Protection Lead (Director)
- Oversees all data subject requests
- Approves complex or sensitive requests
- Handles erasure and rectification decisions
- Liaises with ICO if complaints arise
-
Final authority on refusals or extensions
-
System Administrators
- Retrieve data from systems and databases
- Perform technical deletions or restrictions
- Extract data for portability requests
- Implement rectifications in systems
-
Provide technical assessments
-
Support Staff
- Initial request intake and logging
- Identity verification
- Routine correspondence with data subjects
- Assembly of data for access requests
- Escalate complex issues to data protection lead
Escalation Procedures:
Escalate to Data Protection Lead if: - Identity verification fails - Request appears manifestly unfounded - Legal exemptions may apply - Erasure conflicts with retention obligations - Objection requires balancing test - Extension beyond 1 month needed - Data subject disputes response - Complaint threatened or made to ICO
Required Approvals:
Data Protection Lead approval required for: - All erasure requests (permanent data deletion) - Refusals or partial refusals - Fee charges for excessive requests - Timeline extensions to 3 months - Restriction of processing decisions - Objection rejections (legitimate grounds assessment)
No approval needed for: - Routine access requests (verified identity, clear scope) - Simple rectifications (obvious errors) - Consent withdrawals (always honoured) - Portability exports (standard format)
Response Procedures
Response Format:
- Secure Delivery Methods
- Email: Encrypted attachment to verified email address
- Portal: Secure download link in client portal (password-protected)
- Postal: Registered post to verified address
-
In-Person: By appointment with ID verification
-
Access Request Response Contents
- Cover letter explaining contents
- Copy of personal data (organized and clear format)
- Processing information (purposes, legal basis, recipients)
- Retention period information
- Information about rights and complaint procedures
- ICO contact details
-
No charge (unless excessive)
-
Other Request Responses
- Confirmation of action taken
- Explanation of any limitations or exemptions
- Next steps if applicable
- Contact for further questions
- ICO complaint rights
Response Templates:
MDHosting maintains templates for: - Access request cover letters - Erasure confirmation letters - Rectification confirmation letters - Portability data delivery notices - Refusal letters (with exemption explanations) - Extension notifications - Fee assessment letters
Fee Assessment:
Generally free of charge, but fees may apply:
When Fees Permitted: - Request is manifestly unfounded or excessive - Repetitive requests for copies (beyond first copy) - Fee must be reasonable (based on administrative cost) - Maximum: typically £10-50 depending on effort
Fee Process: 1. Assess whether fee applicable 2. Calculate reasonable amount 3. Notify data subject of fee and reason 4. Provide invoice for payment 5. Clock stops until fee paid 6. Process request upon payment 7. Document fee decision
Zero Fees for: - First access request copy - Rectification requests - Erasure requests - Restriction requests - Portability requests - Objection requests - Consent withdrawal
Tracking and Monitoring
Request Status Tracking:
All requests tracked through defined stages:
- Received
- Request logged in register
- Acknowledgement sent
- Unique reference assigned
-
Deadline calculated
-
Verifying
- Identity verification in progress
- Additional documents requested
-
Awaiting data subject response
-
Assessing
- Validity being determined
- Complexity evaluation
- Exemptions considered
-
Approval sought if needed
-
Processing
- Data being retrieved/compiled
- Actions being executed
- Response being prepared
-
Quality check in progress
-
Completed
- Response sent to data subject
- Actions confirmed complete
- Log entry finalised
-
Case closed
-
Refused/Suspended
- Identity not verified
- Manifestly unfounded
- Awaiting fee payment
- Reason documented
Deadline Monitoring:
- All requests have automatic deadline tracking
- Alerts sent 7 days before deadline
- Escalation if approaching deadline without completion
- Extension notification sent before original deadline expires
- Missed deadlines flagged and reviewed
Performance Metrics:
Tracked annually: - Total requests received (by type) - Average response time - Percentage within 1-month deadline - Extensions granted (number and reasons) - Refusals (number and reasons) - Complaints to ICO (number and outcomes) - Most common request types - Trends over time
Annual Reporting:
- Performance metrics reviewed annually
- Included in compliance monitoring report
- Trends identified and addressed
- Process improvements implemented
- Staff training needs identified
- Report to senior management
Individual Data Subject Rights
MDHosting provides the following specific rights under UK GDPR:
1. Right of Access (Article 15)
Request Process: 1. Verify identity (email from registered account) 2. Respond within 1 month (extend to 3 months if complex) 3. Provide copy of personal data and processing information 4. Free of charge (excessive requests may incur fee)
What We Provide: - Copy of all personal data held - Processing purposes and legal basis - Data recipients and retention periods - Rights information and complaint procedures
2. Right to Rectification (Article 16)
Process: - Clients can update account details via control panel - Email requests processed within 1 month - Notify any third parties if data was disclosed - Confirm corrections to data subject
3. Right to Erasure / "Right to be Forgotten" (Article 17)
When Applicable: - Data no longer necessary for original purpose - Consent withdrawn (where consent was basis) - Object to processing (legitimate interests basis) - Data processed unlawfully
Limitations: - Cannot delete if required for legal obligations (e.g., tax records) - Cannot delete if necessary for legal claims - Business records retained for 6 years per UK tax law
Process: 1. Assess whether legal grounds for retention exist 2. If erasure granted: delete from live systems and backups 3. Confirm erasure within 1 month 4. Document decision and actions taken
4. Right to Restrict Processing (Article 18)
Grounds for Restriction: - Accuracy of data is contested - Processing is unlawful but erasure refused - Data no longer needed but required for legal claims - Objection to processing is pending verification
Action: Flag account/data as "restricted" - store but do not process
5. Right to Data Portability (Article 20)
Applies to: - Data provided by contract or consent - Automated processing only
We Provide: - Website files (ZIP/tar archive) - Database exports (SQL format) - Email exports (maildir/mbox format) - Account data (CSV/JSON format)
Delivery: Secure download link or direct transfer to new provider
6. Right to Object (Article 21)
Grounds: - Processing based on legitimate interests - Direct marketing (must cease immediately)
Assessment: - Evaluate whether compelling legitimate grounds override - Document decision - Respond within 1 month
7. Rights Related to Automated Decision-Making (Article 22)
Current Status: MDHosting does not use automated decision-making or profiling.
Data Breach Notification
Definition
A personal data breach is: - Unauthorised or accidental access, loss, alteration, or disclosure of personal data - Includes ransomware, hacking, accidental deletion, lost devices
Notification Obligations
To ICO (within 72 hours if high risk): 1. Discover breach 2. Assess severity and risk to individuals 3. Contain breach and secure systems 4. Notify ICO via their online portal if high risk 5. Document breach in breach register
To Data Subjects (without undue delay if high risk): - Direct communication to affected individuals - Clear description of breach and consequences - Measures taken and recommended actions - Contact point for further information
Breach Assessment Criteria
Low Risk (no notification required): - Encrypted data accessed but keys not compromised - Data already public - Breach contained before access occurred
High Risk (ICO + subjects notification required): - Large scale breach affecting many individuals - Sensitive data exposed (passwords, financial data) - Breach could lead to identity theft or fraud - Children's data affected
Breach Response Procedure
Immediate Actions (0-24 hours): 1. Isolate affected systems to prevent further compromise 2. Preserve evidence (logs, system snapshots) 3. Assess scope: what data, how many subjects, how accessed 4. Notify senior management 5. Begin breach log documentation
Short-term Actions (24-72 hours): 1. Complete risk assessment using ICO criteria 2. Implement containment measures 3. Notify ICO if required (within 72 hours) 4. Prepare communications for affected data subjects 5. Notify relevant third parties (e.g., payment processors)
Medium-term Actions (72 hours - 1 month): 1. Notify affected data subjects if high risk 2. Implement remediation measures 3. Monitor for ongoing issues 4. Update security measures to prevent recurrence 5. Complete breach register entry
Long-term Actions: 1. Review and update security procedures 2. Staff training on lessons learned 3. Update risk assessments 4. Review insurance coverage 5. Complete post-incident report
Breach Register
All breaches (even low risk) must be logged: - Date and time of breach discovery - Nature and scope of breach - Data categories and number of subjects affected - Likely consequences - Measures taken to mitigate - Notification decisions and communications - Lessons learned and preventive actions
Location: Secure internal documentation (not committed to git)
Data Retention and Deletion
Retention Policy
| Data Type | Retention Period | Justification |
|---|---|---|
| Active Accounts | Duration of service | Contract performance |
| Closed Accounts | 6 years after closure | UK tax and legal requirements |
| Financial Records | 6 years | HMRC requirements |
| Website Backups | 30 days | Service delivery, disaster recovery |
| Access Logs | 12 months | Security monitoring, legal interests |
| Support Tickets | 24 months | Service quality, reference |
| Marketing Consent | Until withdrawn + 6 months | Consent management |
| Email Communications | 24 months | Business records |
Deletion Procedures
Scheduled Deletions: - Automated backup rotation (30-day cycle) - Quarterly review of closed accounts (6+ years old) - Annual review of marketing database - Log rotation per retention policy
On-Demand Deletions (Right to Erasure): 1. Verify identity and assess legal grounds 2. If approved: - Remove from live databases - Mark for deletion in backup rotation - Purge from active backups where feasible - Update CRM/billing systems 3. Confirm completion to data subject 4. Document in deletion log
Deletion Methods: - Database records: Permanent deletion, not soft delete - File systems: Secure deletion (overwrite, not just unlink) - Backups: Allow natural expiry unless immediate removal required - Physical media: Destruction according to security standards
Data Minimisation
Practices: - Collect only data necessary for service provision - Regular data audits to identify unnecessary data - Automatic removal of redundant files (e.g., old logs) - Privacy-by-design in new systems
Privacy by Design and Default
Privacy by Design (PbD) and Privacy by Default are foundational principles embedded into MDHosting's operations, ensuring data protection is considered from the outset of any new system, service, or process.
Privacy by Design Principles
MDHosting follows the seven foundational principles of Privacy by Design:
1. Proactive Not Reactive; Preventative Not Remedial
- Anticipate and prevent privacy risks before they occur
- Risk assessments conducted before launching new services
- Security measures built into systems from the start
- Regular reviews to identify emerging threats
- Don't wait for breaches to improve security
Implementation: - Threat modelling for new features - Security review before deployment - Regular penetration testing - Monitoring and alerting systems - Incident prevention procedures
2. Privacy as the Default Setting
- Maximum privacy protection delivered automatically
- No action required from data subjects to protect their privacy
- Privacy-protective settings as standard, not optional extras
- Users can reduce privacy if they choose, but secure by default
Implementation: - Strong passwords required (not optional) - HTTPS enforced for all connections - Encryption enabled by default - Minimal data collection from the start - Opt-in (not opt-out) for non-essential processing
3. Privacy Embedded into Design
- Privacy is integral to system design, not added as an afterthought
- Embedded into business processes and technologies
- Essential component, not a separate add-on
- Organisational practices and physical architecture include privacy
Implementation: - Security requirements in project specifications - Privacy considerations in all change requests - Developer training on secure coding - Infrastructure designed with security zones - Access controls embedded in systems
4. Full Functionality - Positive Sum, Not Zero Sum
- Privacy and functionality coexist (not trade-offs)
- Achieve both privacy and business objectives
- Avoid false dichotomies (security vs. usability)
- Win-win solutions prioritised
Implementation: - Secure AND user-friendly authentication - Data minimisation WITHOUT reducing service quality - Encryption WITHOUT performance degradation - Monitoring WITH privacy preservation (anonymisation)
5. End-to-End Security - Full Lifecycle Protection
- Data protected throughout entire lifecycle
- From collection to destruction
- Secure retention during use
- Secure disposal when no longer needed
- Cradle to grave protection
Implementation: - Encryption in transit and at rest - Secure backups with retention limits - Automated data deletion schedules - Secure disposal of decommissioned hardware - Documented data lifecycle procedures
6. Visibility and Transparency
- All stakeholders can verify privacy practices
- Open and accountable operations
- Components and operations remain visible
- Independent verification possible
- "Trust but verify" approach
Implementation: - Published privacy notices - Clear data processing documentation - This GDPR compliance document - Regular audits and reviews - Transparent communication with clients - Third-party security certifications pursued
7. Respect for User Privacy
- User-centric design and operation
- Strong privacy defaults
- Notice given to users
- User-friendly options provided
- Individual interests prioritised
Implementation: - Clear consent mechanisms - Easy data rights request processes - Responsive support for privacy concerns - Privacy-focused product development - Client control over their data
Privacy by Default Implementation
Privacy by Default means systems and services provide the highest level of privacy protection automatically, without requiring user action.
Default Settings at MDHosting
Account Creation: - Minimum data required for account setup - Optional fields clearly marked - No unnecessary information collected - Marketing consent opt-in (not pre-selected) - Strong password requirements enforced
Data Collection: - Only essential cookies set initially - Analytics cookies require consent - No third-party tracking by default - Minimal logging (security essentials only) - No data sharing without explicit permission
Security Settings: - TLS/HTTPS enforced (cannot be disabled) - Strong encryption algorithms (modern standards) - Secure authentication (SSH keys, strong passwords) - Firewall enabled on all servers - Regular security updates applied
Communication Preferences: - Only essential service emails sent automatically - Marketing emails require opt-in - Granular communication preferences - Easy unsubscribe mechanisms - Suppression list respected
Data Retention: - Automatic deletion after retention period - Backups limited to 30 days - Logs rotated per retention policy - Deleted accounts purged after legal minimum - No indefinite data retention
Privacy Impact Assessment Process
For new systems, features, or significant changes, MDHosting conducts Privacy Impact Assessments (PIAs, also called DPIAs - Data Protection Impact Assessments).
When PIA Required
Mandatory for: - New data processing activities - Significant changes to existing processing - New technologies deployment - Large-scale data processing - Processing that may result in high risk to individuals
Examples: - Implementing new analytics platform - Adding biometric authentication - Large-scale email processing - New third-party integrations - Automated decision-making systems
Not typically required for: - Minor system updates - Bug fixes - Performance optimisations without data changes - Routine maintenance - Replacing like-for-like systems
PIA Procedure
Step 1: Identify Need - Screening questionnaire completed - Decision documented - Approval from Data Protection Lead - Scope defined
Step 2: Describe Processing - What personal data is processed? - Why is it processed (purposes)? - Who has access (recipients)? - How long is it retained? - Where is it stored/transferred? - What technologies are used?
Step 3: Assess Necessity and Proportionality - Is processing necessary for stated purpose? - Is there a less intrusive alternative? - Is the amount of data proportionate? - Is retention period justified? - Are security measures adequate?
Step 4: Identify and Assess Risks - Risk to data subject rights and freedoms - Unauthorised access risk - Data loss or destruction risk - Unauthorised disclosure risk - Inability to exercise rights risk - Impact severity (low, medium, high) - Likelihood (unlikely, possible, probable)
Step 5: Identify Mitigation Measures - Technical measures to reduce risk - Organisational measures needed - Additional safeguards - Monitoring and auditing - Staff training requirements - Third-party assurances
Step 6: Document and Approve - PIA report completed - Residual risks identified - Approval by Data Protection Lead - If high residual risk: consult ICO - Implementation only after approval
Step 7: Review and Monitor - Periodic review schedule set - Monitoring arrangements established - Re-assessment triggers defined - Changes trigger new assessment
Privacy by Design Checklist
For all new projects and significant changes:
Planning Phase: - [ ] Privacy requirements identified - [ ] Privacy Impact Assessment completed (if required) - [ ] Data minimisation considered - [ ] Legal basis identified - [ ] Privacy notice requirements understood
Design Phase: - [ ] Security requirements specified - [ ] Data protection measures designed in - [ ] Default privacy settings maximised - [ ] Data subject rights facilitated - [ ] Third-party processors assessed
Development Phase: - [ ] Secure coding practices followed - [ ] Encryption implemented - [ ] Access controls developed - [ ] Audit logging included - [ ] Privacy testing conducted
Deployment Phase: - [ ] Privacy notice updated - [ ] Staff training completed - [ ] Data processing records updated - [ ] Security review passed - [ ] Monitoring configured
Operational Phase: - [ ] Regular privacy reviews scheduled - [ ] Incident response procedures ready - [ ] Data subject rights processes working - [ ] Compliance monitoring active - [ ] Documentation maintained
Privacy by Design Examples at MDHosting
Website Hosting Service: - Minimal client data collected (name, email, billing address) - No unnecessary analytics or tracking - Client files encrypted at rest - HTTPS enforced for all websites - Automatic backup retention limits (30 days) - Easy data export (portability)
Client Portal: - Strong authentication required - Session timeouts implemented - Privacy preferences easily accessible - Consent management built-in - Data rights request form provided - Activity logging for security
Email Hosting: - Spam filtering protects privacy - No email content scanning for advertising - Encryption options available (TLS) - Client control over retention - No sharing with third parties - Webmail over HTTPS only
Billing System: - Payment data handled by PCI-compliant processors - Card details never stored by MDHosting - Tokenization used for recurring billing - Minimal invoicing data collected - Secure client portal access - Automatic invoice retention limits
Continuous Improvement
- Annual review of Privacy by Design implementation
- Staff suggestions for privacy improvements
- Client feedback on privacy features
- Industry best practices monitoring
- Regulatory guidance incorporated
- Technology updates evaluated for privacy impact
Third-Party Processors
MDHosting uses the following sub-processors:
Infrastructure Providers
Hetzner Online GmbH - Service: Server hosting and infrastructure - Location: Germany (EU) - Data Processed: All hosted data - DPA: Standard Hetzner DPA in place - Adequacy: EU-based, GDPR compliant
Service Providers
Stripe, Inc. - Service: Payment processing (primary) - Location: USA (Privacy Shield certified) - Data Processed: Payment transactions (card details not stored by MDHosting) - DPA: Stripe Data Processing Agreement in place - Adequacy: Stripe's EU-US data transfer mechanisms (Standard Contractual Clauses) - Privacy: https://stripe.com/gb/privacy
PayPal Holdings, Inc. - Service: Payment processing (optional alternative) - Location: USA - Data Processed: Payment transactions (handled entirely by PayPal) - DPA: PayPal processes as independent controller - Adequacy: Standard Contractual Clauses for international transfers
Note on GoCardless: - Previously used for Direct Debit processing - Status: Discontinued and no longer in use - All historical data subject to GoCardless retention policies
Blesta LLC - Service: Billing automation and client management platform - Location: USA - Data Processed: Client account data, billing records, service provisioning - Card Data: Not stored by Blesta - uses gateway tokenization (cards stored as tokens via Stripe/PayPal) - PCI Compliance: Blesta bypasses card data entry to payment processors, reducing PCI scope - Privacy: https://www.blesta.com/privacy/ - Features: Client portal (https://mdhosting.co.uk/billing), automated invoicing, support tickets - Integration: Connects with Stripe and PayPal for payment processing
Card Obfuscation
Customer card details stored within Blesta client accounts are obfuscated through tokenization. Raw card numbers are never stored in Blesta - only payment gateway tokens are retained, allowing recurring billing without PCI DSS Level 1 compliance requirements.
Sub-Processor Changes
- Clients notified 30 days before new sub-processor added
- Clients may object and terminate if they cannot accept new sub-processor
- This section (lines 301-348) serves as the authoritative sub-processor list for MDHosting Ltd. Updated when processors are added or removed.
Sub-Processor Due Diligence and Auditing
MDHosting ensures all sub-processors meet GDPR requirements through rigorous due diligence before onboarding and ongoing compliance monitoring.
Pre-Onboarding Due Diligence
Before engaging a new sub-processor, MDHosting conducts comprehensive due diligence:
Step 1: Initial Assessment
- Business need identified and documented
- Alternative solutions considered
- Decision to use sub-processor approved by Data Protection Lead
- Budget and contractual terms reviewed
Step 2: Security Assessment
Evaluate sub-processor's security measures:
Technical Security: - Encryption in transit and at rest - Access controls and authentication - Network security and firewalls - Intrusion detection and prevention - Vulnerability management - Patch management procedures - Secure development practices - Disaster recovery capabilities
Physical Security: - Data centre security (Tier rating) - Physical access controls - Environmental controls - Redundancy and resilience - Geographic location of data storage
Information provided via: - Security questionnaire completion - Third-party audit reports (SOC 2, ISO 27001) - Security certifications - Publicly available security documentation - Direct communication with security team
Step 3: GDPR Compliance Verification
Verify sub-processor's GDPR compliance:
Documentation Review: - Privacy policy and GDPR compliance statement - Data Processing Agreement (DPA) terms - Sub-processor's own sub-processors list - Data subject rights procedures - Breach notification procedures - Data retention and deletion policies - International transfer mechanisms (if applicable)
Compliance Evidence: - GDPR compliance certifications - Privacy Shield certification (if US-based, historical) - Standard Contractual Clauses (SCCs) availability - Adequacy decision coverage - Binding Corporate Rules (if applicable) - ICO or other EU supervisory authority approvals
Key Questions: - Do they process data lawfully? - Can they demonstrate GDPR compliance? - Have they had data breaches? How handled? - Do they cooperate with data subject requests? - Where is data stored and processed? - What are their sub-processors?
Step 4: Data Processing Agreement Review
Examine sub-processor's DPA:
Must Include: - Processing scope and limitations - Processor obligations (security, confidentiality, assistance) - Sub-processor provisions - Breach notification requirements - Audit rights - Data return or deletion on termination - Liability and indemnity - Governing law and jurisdiction
MDHosting Requirements: - DPA must meet UK GDPR Article 28 requirements - Terms must flow down to sub-processor's sub-processors - MDHosting retains liability for sub-processor - Right to audit must be included - Breach notification within 24 hours - Termination rights if non-compliant
Approval: - DPA reviewed by Data Protection Lead - Legal review for significant processors - Negotiations if terms inadequate - Must sign before processing begins
Step 5: Sub-Processor Questionnaire
Complete detailed questionnaire covering:
Company Information: - Legal entity name and registration - Primary business activity - Years in operation - Customer base size - Geographic presence
Data Processing: - Types of data processed for MDHosting - Processing locations (countries) - Data storage locations - Access by sub-processor staff (who, where) - Sub-processor's own sub-processors
Security and Compliance: - Security certifications (ISO 27001, SOC 2, etc.) - Last external security audit date - Penetration testing frequency - Staff security training - Incident response procedures - Business continuity plans
GDPR Compliance: - DPO appointed? Contact details - GDPR compliance programme - Data subject rights procedures - Previous data breaches (number, nature, outcome) - Supervisory authority interactions - Privacy Impact Assessments conducted
Step 6: Risk Assessment and Decision
Assess overall risk and make decision:
Risk Scoring: - Low risk: Established processor, strong security, GDPR compliant, EU-based - Medium risk: Non-EU but adequate safeguards, some security gaps, limited GDPR history - High risk: No GDPR certification, weak security, unclear location, no audit rights
Decision Criteria: - Risk level acceptable for processing type? - Can gaps be remediated before onboarding? - Is sub-processor essential or alternative exists? - Cost vs. risk balanced?
Approval Levels: - Low risk: Data Protection Lead approval - Medium risk: Director approval + monitoring plan - High risk: Reconsider or require improvements first
Step 7: Documentation
Document due diligence: - Questionnaire responses filed - Security assessment summary - DPA signed and stored - Risk assessment recorded - Approval documented - Onboarding date logged - Added to sub-processor register
Ongoing Compliance Monitoring
After onboarding, MDHosting monitors sub-processor compliance:
Annual Compliance Review
Each sub-processor reviewed annually:
Review Components:
- Security Certifications
- Verify ISO 27001, SOC 2, or equivalent current
- Review audit reports if available
- Check expiry dates and renewals
-
Request updated certificates
-
Service Performance
- Uptime and reliability metrics
- Incident frequency and severity
- Support responsiveness
-
Service level agreement compliance
-
Contractual Compliance
- DPA terms still adequate?
- Any material changes to service?
- Pricing and billing correct?
-
Renewal terms acceptable?
-
GDPR Compliance
- No reported data breaches?
- Data subject rights still supported?
- Privacy policy updates reviewed?
-
New sub-processors disclosed?
-
News and Reputation
- Media reports of breaches or issues?
- Regulatory actions by ICO or others?
- Customer complaints or concerns?
- Financial stability concerns?
Annual Review Procedure: 1. Review scheduled (calendar reminder) 2. Information gathered from sources above 3. Sub-processor contacted for updates 4. Assessment summary prepared 5. Approved by Data Protection Lead 6. Continue, monitor, or terminate decision 7. Review documented and filed
Data Breach Notification Monitoring
- Subscribe to sub-processor security bulletins
- Monitor industry news for breaches
- Review sub-processor incident reports
- Check ICO breach notifications database
- Google alerts for sub-processor name + "data breach"
If Sub-Processor Breach Occurs: 1. Assess impact on MDHosting and clients 2. Obtain full details from sub-processor 3. Determine if MDHosting clients affected 4. Notify affected clients within 24 hours 5. Assess if MDHosting ICO notification required 6. Review sub-processor response adequacy 7. Consider termination if response inadequate
Security Updates and Changes
Monitor for: - Major security updates or patches required - Changes to security practices - New certifications obtained - Failed audits or compliance issues - Changes in key security personnel
Contract and Terms Monitoring
Track: - Contract renewal dates - Price changes or new fees - Terms of service updates - DPA amendments - SLA modifications - New sub-processor notifications
Service Level Monitoring
Track performance: - Availability/uptime metrics - Response times - Support ticket resolution - Planned maintenance windows - Unplanned outages - Performance degradation
Documentation and Records
Sub-Processor Register Maintenance
Central register contains: - Sub-processor name and legal entity - Service provided - Data processed - Countries of processing - Date added - Due diligence completion date - Last audit/review date - Next review due date - Risk rating - Current status (active, monitoring, terminated) - DPA on file (yes/no, date) - Certifications held
Regular Updates: - Updated when new sub-processor added - Updated when sub-processor removed - Updated annually after review - Version control maintained - Accessible to Data Protection Lead
Audit Records and Findings
For each sub-processor audit: - Audit date and type - Auditor (internal or third-party) - Scope of audit - Findings and issues identified - Risk level assigned to each finding - Remediation required - Sub-processor response - Remediation verification date - Close-out documentation
Retention: - Audit records retained 6 years - Available for ICO inspection - Provided to clients on request
Non-Compliance Issue Tracking
If sub-processor non-compliance identified:
Issue Log Contains: - Date identified - Nature of non-compliance - Severity (low, medium, high, critical) - Impact on MDHosting and clients - Sub-processor notified date - Response deadline - Sub-processor response - Remediation plan - Verification method - Resolution date - Escalation if not resolved
Escalation Process: - Low: 30 days to remediate - Medium: 14 days to remediate - High: 7 days to remediate - Critical: Immediate action or termination
Remediation Verification
Once sub-processor claims remediation: - Evidence requested (updated policies, audit reports, etc.) - Evidence reviewed and verified - Re-audit if necessary - Acceptance or rejection of remediation - Issue closed or escalated
Termination Procedures
If sub-processor must be terminated:
Termination Triggers: - Material breach of DPA - Serious data breach with inadequate response - Persistent non-compliance despite remediation - Failure to maintain security certifications - Financial insolvency or business closure - Loss of adequacy decision (international transfers) - MDHosting no longer needs service
Termination Process:
- Decision and Notice
- Termination decision approved by Director
- Reasons documented
- Notice period per contract (typically 30-90 days)
-
Written termination notice sent
-
Data Return or Deletion
- Request return of all MDHosting/client data
- Format and method specified (secure transfer)
- Deletion of all copies required
- Deletion timeline specified (within 30 days)
-
Certification of deletion obtained
-
Client Notification
- Clients informed of sub-processor termination
- Explanation of reason (if appropriate)
- Alternative arrangements communicated
- No impact to service continuity assured
-
30 days notice provided (if possible)
-
Alternative Processor Selection
- Identify replacement sub-processor
- Conduct full due diligence (as per onboarding)
- Migration plan developed
- Client notification of new sub-processor
-
30-day objection period honored
-
Documentation
- Termination reason documented
- Data deletion certification filed
- Client notifications logged
- Sub-processor removed from register
- Lessons learned recorded
Emergency Termination:
If immediate termination required (critical breach): - Immediate cessation of processing - No notice period - Emergency data return within 48 hours - Client notification immediate - Alternative arrangements activated - Full investigation and documentation
Sub-Processor Audit Rights
MDHosting reserves right to audit sub-processors per DPA:
Audit Frequency: - At least annually for critical sub-processors - Every 2-3 years for lower-risk sub-processors - Ad-hoc if incident or concern arises - Upon client request (reasonable frequency)
Audit Methods:
- Self-Assessment Questionnaire
- Annual compliance questionnaire
- Updated security information
- Certification renewals
-
Changes disclosure
-
Document Review
- Updated policies and procedures
- Recent audit reports (SOC 2, ISO 27001)
- Penetration test results
-
Incident reports and statistics
-
On-Site Inspection
- Physical data centre visit (if appropriate)
- Staff interviews
- System demonstrations
- Security controls verification
-
Rare, typically for high-value processors
-
Third-Party Audit
- Commission independent auditor
- Comprehensive technical assessment
- Penetration testing
- Used for critical or high-risk processors
- Cost shared or borne by MDHosting
Audit Preparation: - 30 days notice provided (except ad-hoc incidents) - Audit scope defined - Information requests sent in advance - Confidentiality agreements signed - Audit schedule agreed
Audit Reporting: - Findings documented - Issues rated by severity - Recommendations provided - Remediation deadlines set - Follow-up audit scheduled if needed
International Transfers
Current Status: No international transfers outside UK/EU
All data is stored in Germany (EU), which is subject to: - EU GDPR (Germany) - UK GDPR adequacy decision for EU - No additional transfer mechanisms required
If Future Transfers Required: - Use appropriate transfer mechanisms (Adequacy decisions, SCCs, BCRs) - Conduct transfer impact assessments - Update privacy notices - Obtain consent where necessary
Client Data Processing Agreements
When MDHosting acts as a data processor for client websites, Data Processing Agreements (DPAs) establish the legal framework for processing personal data on behalf of clients.
Legal Requirement
Under UK GDPR Article 28, processors must have a contract or other legal act with the controller that sets out: - Subject matter and duration of processing - Nature and purpose of processing - Type of personal data and categories of data subjects - Controller's obligations and rights - Processor's obligations
MDHosting Position: - MDHosting is a data processor for website data hosted on behalf of clients - Clients are data controllers for their website visitors' personal data - DPA required for GDPR compliance - All hosting clients must have DPA in place
When DPA is Required
Mandatory DPAs for: - All web hosting services (client websites process personal data) - Email hosting (client emails contain personal data) - Database hosting (likely to contain personal data) - Any service where client uses MDHosting infrastructure to process personal data
Examples of Client Processing: - WordPress website with contact forms - E-commerce sites with customer databases - Email lists managed by clients - CRM systems hosted on client accounts - Forum or membership sites - Analytics data collection
Not Required When: - Client uses hosting only for static informational websites with no data collection - No forms, cookies, analytics, or user accounts on website - (However, DPA recommended for all clients as good practice)
Standard DPA Terms
MDHosting's standard Data Processing Agreement includes:
1. Processing Scope and Limitations
Subject Matter: - Provision of web hosting, email hosting, and related infrastructure services - Storage and processing of data uploaded by clients
Duration: - Term of hosting agreement - Plus retention period for backups (30 days after termination)
Nature and Purpose: - Processing solely for purpose of providing hosting services - No use of client data for MDHosting's own purposes - No data mining, profiling, or analytics beyond service provision
Types of Personal Data: - As determined by client (MDHosting doesn't control what data clients collect) - May include names, emails, IP addresses, contact details, payment information - Client specifies in DPA schedule
Categories of Data Subjects: - Client's website visitors - Client's customers and users - Client's employees (if applicable) - Any individuals whose data client processes
2. Processor Obligations
Processing Instructions: - Process data only on documented instructions from client - Instructions provided via control panel, support requests, or direct communication - No processing beyond client's instructions - Inform client if instruction violates UK GDPR
Confidentiality: - Staff authorised to process personal data committed to confidentiality - Confidentiality obligations survive termination - No unauthorised disclosure
Security Measures: - Implement appropriate technical and organisational measures (see Technical and Organisational Measures section) - Encryption, access controls, monitoring, backups - Regular security reviews and updates - Measures proportionate to risk
Sub-Processors: - MDHosting may engage sub-processors (Hetzner, payment processors, etc.) - Client informed of sub-processors (listed in this document) - Client may object to new sub-processors - Sub-processors bound by same obligations - MDHosting remains liable for sub-processor performance
Data Subject Rights: - Assist client in responding to data subject requests - Provide necessary information and access - Implement technical measures to facilitate rights (data export, deletion, etc.) - Response within reasonable timeframes
Breach Notification: - Notify client of personal data breaches without undue delay - Notification within 24 hours of breach discovery - Provide details to assist client's ICO notification (if required) - Cooperate in breach investigation and remediation
Audits and Inspections: - Make available information necessary to demonstrate compliance - Allow for and contribute to audits and inspections - Client or appointed auditor may audit annually (on reasonable notice) - MDHosting cooperates fully
Data Return or Deletion: - On termination, return all personal data to client or delete it - Client chooses return or deletion - Data deleted from live systems and backups - Certification of deletion provided - Exception: data required to be retained by law
3. Controller Obligations
Clients (as data controllers) must:
Lawful Instructions: - Provide only lawful processing instructions - Ensure they have legal basis for processing - Not instruct MDHosting to process data unlawfully
Own GDPR Compliance: - Maintain own compliance for website data collection - Provide privacy notices to website visitors - Obtain consent where required - Respond to data subject requests - Maintain records of processing
Data Quality: - Ensure personal data is accurate and up-to-date - Implement data minimisation on their websites - Not collect excessive data - Delete data when no longer needed
Cooperation: - Cooperate with data subject requests affecting hosted data - Respond to MDHosting requests for breach investigation - Notify MDHosting of compliance issues - Provide necessary information for DPA compliance
Sub-Processor Acceptance: - Accept MDHosting's use of documented sub-processors - Object to new sub-processors if cannot accept (may terminate)
4. Data Transfers
- Data stored in Germany (EU) - adequate protection
- No transfers outside UK/EU without client consent
- If future transfers required: Standard Contractual Clauses or other approved mechanism
- Transfer impact assessment conducted before transfer
5. Liability and Indemnity
MDHosting Liability: - Liable for damage caused by processing only if failed to comply with UK GDPR processor obligations - Not liable if followed client's lawful instructions - Liability limited per hosting agreement terms
Client Liability: - Client liable for their own GDPR compliance - MDHosting not liable for client's website data collection practices - Client indemnifies MDHosting for client's GDPR breaches
Limitation: - Liability subject to hosting agreement limitations - No liability for indirect or consequential losses - Maximum liability as specified in hosting terms
DPA Management
DPA Acceptance
New Clients: - DPA provided during account signup - Acceptance required before service activation - Electronic acceptance via signup process - Copy available in client portal
Existing Clients: - DPA terms incorporated in hosting agreement - Acceptance implied by continued use of services - Updated DPA provided when terms change - 30 days notice of material changes
Documentation: - DPA stored securely (not in public git repository) - Accessible in client portal - Reference number logged - Acceptance date recorded
Storage and Tracking
Where DPAs are Stored: - Client account records (secure database) - Client portal documents section - Internal compliance documentation - Encrypted backup storage
Tracking System: - DPA status for each client (accepted, pending, declined) - Version control for DPA document - Acceptance date and method logged - Renewal and review dates tracked
Review and Amendment
Annual Review: - DPA terms reviewed annually - Updated for regulatory changes - Updated for service changes - Updated for new sub-processors
Amendment Process: 1. Material changes identified 2. Updated DPA drafted 3. Clients notified 30 days in advance 4. Acceptance requested via portal 5. Non-acceptance = option to terminate 6. Record amendment and acceptance
Client Requests: - Clients may request specific DPA terms - Reasonable requests accommodated - Custom DPA for enterprise clients - Approval by Data Protection Lead
Client Signature Requirements
Standard DPA: - Electronic acceptance sufficient - Checkbox acceptance in portal - Email confirmation sent - No handwritten signature required
Enterprise/Custom DPA: - May require formal signing - DocuSign or similar e-signature platform - Mutual execution by both parties - Originals retained by both parties
Record Keeping: - Acceptance records retained 6 years after termination - Audit trail of all amendments - Version history maintained - Available for ICO inspection
Sub-Processor Disclosure
Clients informed of sub-processors via:
- This GDPR Document
- Current sub-processors listed in Third-Party Processors section
- Publicly accessible
-
Updated when changes occur
-
DPA Schedule
- Attached to client DPA
- Lists all current sub-processors
-
Updated with DPA amendments
-
Change Notifications
- 30 days notice before adding new sub-processor
- Email notification to all clients
- Portal notification
- Right to object
Client Objection Process: - Client notifies objection within 30 days - MDHosting considers objection - If accommodation impossible: client may terminate without penalty - If accommodation possible: alternative arrangement discussed
DPA Compliance Monitoring
Quarterly Reviews: - Review DPA compliance across client base - Check for new sub-processors requiring disclosure - Verify security measures remain adequate - Update documentation as needed
Annual Audit: - Comprehensive DPA compliance audit - Sample client files reviewed - Sub-processor obligations verified - Improvements identified and implemented
Metrics Tracked: - Percentage of clients with DPA in place - Sub-processor change notifications sent - Client objections received - Breach notifications to clients (number and response time) - Audit requests received and fulfilled
DPA Templates and Resources
Available to Clients: - Standard MDHosting DPA (in client portal) - Sub-processor list (in this document and portal) - Security measures summary - Data return/deletion request form - Audit request procedure
Internal Use: - DPA acceptance tracking spreadsheet - Amendment notification templates - Breach notification to client template - Audit cooperation checklist - Data return/deletion procedure
Privacy Notices
Client Privacy Notice
Location: Website, provided at account signup
Contents: - Identity and contact details of data controller - Data protection officer contact (if appointed) - Purposes and legal basis for processing - Categories of data processed - Recipients of data (sub-processors) - Retention periods - Data subject rights and how to exercise - Right to lodge complaint with ICO - Whether providing data is contractual requirement
Review: Annually or when processing changes
End-User Privacy (Client Websites)
Client Responsibility
Clients must provide their own privacy notices for website visitors. MDHosting is not responsible for client privacy notices.
Support Provided: - Template privacy policy available on request - Guidance on cookie consent requirements - Technical implementation support
Data Protection Impact Assessments (DPIAs)
When Required
DPIA required when processing is likely to result in high risk, including: - Large-scale systematic monitoring - Large-scale processing of special category data - Systematic use of automated decision-making - Processing of children's data - New technologies with high privacy risk
Current Assessment: Standard hosting operations do not require DPIA
Future Triggers: - Implementing automated fraud detection - Large-scale email processing/scanning - Biometric authentication systems - AI/ML-based services
DPIA Process
If required in future: 1. Describe processing and purposes 2. Assess necessity and proportionality 3. Identify and assess risks to data subjects 4. Identify measures to mitigate risks 5. Document outcomes and decisions 6. Consult ICO if high residual risk remains
Technical and Organisational Measures
Security Measures
Access Control: - SSH key authentication (passwords disabled) - Non-standard SSH ports - IP whitelisting where practical - Strong password requirements for control panels
Encryption: - Data in transit: TLS/SSL for all services - SSH encryption for remote access - HTTPS enforced for all websites - Data at rest: Server-level encryption (Hetzner)
Monitoring: - Firewall (CSF) on all servers - Failed login monitoring (Fail2Ban) - Log collection and analysis - Wazuh SIEM deployment (planned Q1 2025)
Backups: - Daily automated backups - 30-day retention - Off-server storage - Regular restoration testing
See Security Overview for complete technical measures.
Organisational Measures
Policies and Procedures: - This GDPR compliance document - Security policies documented - Incident response procedures - Staff confidentiality obligations
Staff Training: - GDPR awareness training (annual) - Security best practices - Incident response procedures - Data handling requirements
Accountability: - Senior management oversight - Regular compliance reviews - Documentation of processing activities - Record of processing activities maintained
Data Processing Records
Record of Processing Activities (Article 30)
Required Information: - Name and contact details of controller - Purposes of processing - Categories of data subjects and personal data - Categories of recipients (including third countries) - Transfers to third countries and safeguards - Retention periods - Technical and organisational security measures
Maintenance: - Updated when processing changes - Available for ICO inspection - Reviewed annually
Format: Internal register (secure location, not in git)
Staff Responsibilities
All Staff
- Understand GDPR principles and company obligations
- Process data only as authorised
- Report suspected data breaches immediately
- Maintain confidentiality of client data
- Complete annual GDPR training
System Administrators
- Implement security measures
- Maintain access controls
- Monitor for security incidents
- Perform regular backups and test restorations
- Document system changes
Support Staff
- Verify identity before disclosing data
- Handle data subject requests appropriately
- Escalate complex requests to management
- Document support interactions
Management
- Oversee GDPR compliance programme
- Approve data processing changes
- Handle data subject rights requests
- Maintain processor agreements
- Liaise with ICO if required
GDPR Training Programme
MDHosting maintains a comprehensive GDPR training programme to ensure all staff understand data protection obligations and handle personal data appropriately.
Training Programme Structure
1. Induction Training (New Staff)
All new staff receive GDPR training during induction:
Timing: - Completed within first week of employment - Before access to personal data granted - Refresher after 30 days - Assessment required
Content: - UK GDPR fundamentals and principles - MDHosting's role as controller and processor - Types of personal data processed - Legal bases for processing - Data subject rights overview - Confidentiality obligations - Data breach reporting procedures - Where to find policies and procedures
Duration: 2-3 hours (online modules + discussion)
Delivery: - ICO online training modules - Internal policy documentation review - One-to-one session with Data Protection Lead - Written materials provided
Assessment: - Quiz on key concepts - 80% pass mark required - Retake if failed - Certificate of completion
2. Annual Refresher Training
All staff complete annual refresher training:
Timing: - Every 12 months from induction or last refresher - Reminders sent 30 days before due - Mandatory completion within 14 days of due date - Tracked in training log
Content: - GDPR principles recap - Updates to regulations or guidance - Changes to MDHosting policies - Case studies and lessons learned - Recent incidents and how to prevent - Data subject rights procedures - Current compliance challenges
Duration: 1-2 hours
Delivery: - Online training modules - Annual team meeting/workshop - Updated written materials - Q&A session
Assessment: - Short quiz on updates and key topics - 80% pass mark - Certificate updated
3. Role-Specific Training Modules
Additional training tailored to specific roles:
Frequency: Annual or when role changes
4. Incident-Based Training
Training provided when incidents occur:
Triggers: - Data breach discovered - Compliance issue identified - Near-miss incident - Client complaint - ICO guidance update
Approach: - Review what happened - Why it happened - How to prevent recurrence - Updated procedures - All relevant staff trained
Training Curriculum by Role
All Staff - Core Curriculum
Topics covered:
- GDPR Fundamentals
- What is GDPR and why it matters
- Seven data protection principles
- Lawful bases for processing
-
Data controller vs. processor roles
-
Data Handling Basics
- What is personal data
- Special category data
- How to handle data securely
- Where data can be stored
- When to encrypt
-
Secure disposal
-
Breach Reporting
- What constitutes a data breach
- Examples of breaches
- How to report immediately
- Who to notify
-
What happens next
-
Confidentiality
- Non-disclosure obligations
- Discussing client data
- Working remotely securely
-
Physical security (locked screens, papers)
-
Subject Rights
- Seven rights overview
- How to recognise a request
- Who to escalate to
- Response timelines
System Administrators - Additional Curriculum
Topics specific to technical roles:
- Security Measures
- Encryption implementation (TLS, SSH, disk)
- Access control configuration
- Firewall and CSF management
- Security patching procedures
-
Vulnerability scanning
-
Access Controls
- Principle of least privilege
- User access provisioning/deprovisioning
- SSH key management
- Password policies enforcement
-
Two-factor authentication
-
Logging and Monitoring
- What to log and why
- Log retention periods
- Log analysis for incidents
- Monitoring tools (Fail2Ban, etc.)
-
Alert response procedures
-
Backup and Recovery
- Backup schedules and verification
- Restoration testing procedures
- Off-site backup security
- Retention period enforcement
-
Secure backup deletion
-
Data Deletion
- Secure deletion methods
- Backup purging procedures
- Overwriting vs. unlinking
- Hardware disposal (secure wiping)
- Verification of deletion
Support Staff - Additional Curriculum
Topics for client-facing roles:
- Identity Verification
- Why verification is critical
- Standard verification methods
- Enhanced verification requirements
- When to escalate
-
Refusing unverified requests
-
Data Subject Requests
- Recognising DSR in support tickets
- Immediate logging procedures
- Timeline importance (1 month)
- What information to collect
-
Escalation to Data Protection Lead
-
Confidentiality in Support
- Verifying who you're speaking to
- Not discussing client A with client B
- Secure communication channels
- Screen sharing precautions
-
Ticket documentation best practices
-
Handling Complaints
- GDPR-related complaints
- Escalation procedures
- Response timelines
- Documentation requirements
- ICO complaint rights information
Management - Additional Curriculum
Topics for oversight and decision-making:
- GDPR Compliance Oversight
- Accountability principle in practice
- Demonstrating compliance
- Record of processing activities
- Compliance monitoring metrics
-
Board/director reporting
-
Decision-Making and Approvals
- When to approve erasure requests
- Balancing legitimate interests
- Assessing manifestly unfounded requests
- Extension decisions (1 to 3 months)
-
Refusal criteria and justification
-
ICO Liaison
- When to contact ICO (breaches, consultations)
- How to prepare for ICO enquiries
- Providing evidence and documentation
- Responding to enforcement notices
-
Formal investigation procedures
-
Breach Assessment
- High risk vs. low risk criteria
- ICO notification requirements
- Data subject notification requirements
- Breach containment decisions
-
Post-incident reviews
-
Vendor Management
- Sub-processor due diligence
- DPA negotiation and approval
- Ongoing vendor auditing
- Termination decisions
- Alternative vendor selection
Training Delivery Methods
1. Online Courses
Primary delivery method:
ICO Resources: - ICO's free online training courses - "Introduction to Data Protection" module - Sector-specific guidance modules - Video tutorials and guides - Case studies and scenarios
Advantages: - Self-paced learning - Consistent content - Automated tracking - Certificates provided - Free of charge
2. Internal Documentation Review
Supplementary method:
Documents to Review: - This GDPR compliance document - Privacy notices - Data processing records - Security policies - Incident response procedures
Approach: - Assigned reading with confirmation - Understanding checks via quiz - Discussion of application to role - Questions answered by Data Protection Lead
3. Scenario-Based Exercises
Interactive learning:
Examples: - "A client emails asking for their data - what do you do?" - "You discover a misconfigured server exposing client files - next steps?" - "Client requests deletion but has outstanding invoices - decision?"
Benefits: - Practical application - Critical thinking - Discussion and debate - Memorable learning - Identifies knowledge gaps
4. External Training (When Required)
Professional training for complex topics:
When Used: - Specialised technical training (security tools) - Legal updates requiring professional interpretation - Complex compliance topics - New regulations or major changes - Management strategic training
Providers: - ICO workshops and seminars - Legal firms (data protection specialists) - Professional training organisations - Industry conferences
Budget: - Allocated annually - Prioritised by need and role - Cost-benefit assessed
Training Records and Tracking
Training Log Contents:
For each staff member: - Employee name and role - Induction training completion date - Induction assessment score - Annual refresher due dates - Annual refresher completion dates - Annual assessment scores - Role-specific training completed - Incident training received - External courses attended - Certificates obtained - Training gaps identified
Log Format: - Spreadsheet or HR system - Accessible to Data Protection Lead and Management - Updated immediately after training - Reviewed monthly for overdue training
Tracking Methods:
- Calendar Reminders
- Annual refresher due dates
- 30-day advance warnings
- 14-day overdue notices
-
Escalation if not completed
-
Completion Tracking
- Online course completion certificates
- Quiz results recorded
- Attendance registers for workshops
-
Self-certification for document reviews
-
Competency Assessment
- Quiz scores tracked
- Practical assessments (scenario responses)
- Manager observations
- Incident performance review
Competency Standards:
- Induction: 80% quiz pass required
- Annual refresher: 80% quiz pass required
- Role-specific: Competency demonstration required
- Continuous: No GDPR-related incidents attributed to lack of training
Remedial Actions if Below Standard: - Additional training provided - One-to-one coaching - Retake assessments - Increased supervision - Role reassessment if persistent failure
Refresher Scheduling
Annual Cycle:
January: - Review training materials for updates - Incorporate regulatory changes - Update quiz questions - Plan year's training schedule
Quarterly: - Review training log for compliance - Chase overdue completions - Assess training effectiveness - Address any gaps
Monthly: - Send upcoming refresher reminders - Process completed training - Update certificates - Report metrics to management
Ad-Hoc: - Incident-triggered training as needed - New hire inductions as required - Role change training when promoted/transferred
Compliance Reporting
Monthly Training Metrics: - Total staff count - Staff with current training (%) - Overdue training count - Recent completions - Average assessment scores - Training gaps identified
Annual Training Report: - Total training hours delivered - All staff training status - Assessment score trends - Training effectiveness evaluation - Incidents linked to training gaps - Improvements for next year - Budget utilisation
Reporting To: - Data Protection Lead (monthly) - Director/Management (quarterly) - Included in annual compliance review - Available for ICO inspection
Training Content Updates
Trigger for Updates: - UK GDPR amendments or new regulations - ICO guidance changes - Lessons learned from incidents - New services or processing activities - Sub-processor changes - Client feedback or complaints - Annual review recommendations
Update Process: 1. Identify need for update 2. Draft updated content 3. Review and approve 4. Distribute to relevant staff 5. Test understanding (if major) 6. Document update in training materials version control
Version Control: - Training materials versioned (v1.0, v1.1, etc.) - Change log maintained - Current version clearly marked - Archived versions retained - Staff trained on current version
Complaints and Supervisory Authority
Internal Complaints
Process: 1. Receive complaint via email or support ticket 2. Acknowledge within 48 hours 3. Investigate and assess 4. Respond with outcome within 1 month 5. Document complaint and resolution
ICO Complaints
Data subjects have the right to lodge complaints with:
Information Commissioner's Office (ICO) Wycliffe House Water Lane Wilmslow Cheshire SK9 5AF
Phone: 0303 123 1113 Website: https://ico.org.uk/make-a-complaint/
Our Cooperation: - Respond to ICO enquiries within requested timeframes - Provide requested documentation and evidence - Implement any required remedial actions - Maintain professional and cooperative relationship
Compliance Monitoring
Regular Reviews
Monthly: - Review new data processing activities - Check for new sub-processors - Review access logs for anomalies
Quarterly: - Review data retention and perform deletions - Update sub-processor list - Check for expired consents
Annually: - Full GDPR compliance audit - Staff training refresh - Privacy notice review and update - Review and update this document - Risk assessment update
Compliance Checklist
- Privacy notices up to date and accessible
- Data processing records maintained
- Sub-processor agreements current
- Breach notification procedures tested
- Staff completed GDPR training
- Data subject rights requests log current
- Security measures documented and operational
- Retention schedule followed
- Backup and recovery tested
- ICO registration current
Resources and References
Legal Framework
- UK GDPR: https://www.legislation.gov.uk/uksi/2019/419/contents/made
- Data Protection Act 2018: https://www.legislation.gov.uk/ukpga/2018/12/contents
- ICO Guidance: https://ico.org.uk/for-organisations/
ICO Resources
- Guide to GDPR: https://ico.org.uk/for-organisations/guide-to-data-protection/guide-to-the-general-data-protection-regulation-gdpr/
- SME Guidance: https://ico.org.uk/for-organisations/sme-web-hub/
- Breach Reporting: https://ico.org.uk/for-organisations/report-a-breach/
Internal Documentation
- Security Overview - Technical security measures
- Incident Response - Security incident procedures
- Backup & Recovery - Data backup procedures
Document Status: ✅ Complete - Comprehensive operational procedures established Last Updated: January 2026 Next Review: January 2027 Document Owner: Matthew Dinsdale (Director) Contact: admin@mdhosting.co.uk
This document establishes comprehensive GDPR compliance procedures for MDHosting Ltd, including operational workflows for data protection, consent management, data subject rights, privacy by design, client data processing agreements, sub-processor management, and staff training. It should be reviewed annually and updated when processing activities change.