The Pitfalls Of GDPR & Cyber Security For Micro Organisations

When we think of charities, what usually springs to mind are the grand challenges and associated fundraising drives. We’re asked to help cure cancer, end poverty, or fight injustice. What's less visible are the thousands of micro charities, non-profits and private clubs enriching people’s lives by building and maintaining communities. 

Whether they’re a charity, helping people build a support network, a non-profit helping people gain work experience, or a small club, whose members pay a subscription to share a hobby, the problem is the same. Their funding comes with the expectation that they'll do something that GDPR and Cyber Security both make harder. 

Often these organisations' volunteers are also business owners, volunteering their skills in their spare time... But the risk of decisions made in business and as a trustee are different. 

Is GDPR dividing opinions so much that charities feel they have to stop fulfilling their purpose? 

Decisions made by committee are inherently conservative, so the lowest risk decision a small charity or club can make is to stop doing the thing they're scared of. 

As you're reading this, millions of small community-led organisations are deciding whether to stop providing services such as membership directories and support networks because they’re unclear about how their responsibilities have changed. The prospect of fines divides committees, resulting in a loss of the skills and knowledge needed to fulfil the organisation’s purpose. What's worse, is that the services that they're considering withdrawing are the things that help people connect with their communities. 

What do they need to know? 

GDPR isn’t intended to stop us sharing data, and Google and Facebook share far more information about us than micro charities will ever collect. What is expected is more transparency and documentation of what’s happening, identification of the lawful basis to carry out this activity, and the processes and security measures they will use to manage the risk of a breach. 
Not collecting data is a legitimate cyber security measure, but good security isn't intended to be obstructive. In the case where they have to have a database of personal information whatever happens, but are considering reducing the services is used for, their cyber risk remains almost the same. 

Cyber risk relates to the value of data to hackers – as you collect information you collect risk. Adding some more security to reduce the risk would probably let them continue their projects. Keeping data subjects safe is either a question of protecting or of not collecting data. 

The choice not to use data is reducing an entirely different risk – the risk that the charity hasn’t understood the regulation, or that their members disagree with how their data is being used. Here’s what Piers Clayden had to say about the legal aspects of helping people stay in touch: 

“Small charities face a number of challenges when trying to work out how to comply with GDPR. The problem being that compliance will require the 2 things that small charities don’t have in abundance – time to drive through the necessary changes in practice and policy and money to take external advice (because the available guidance may not provide the answers you are looking for).

“Organisations who handle (‘process’) personal data can only do so legally where they have ‘lawful grounds’ for that processing. For charities trying to stay in touch with members and potential donors, the lawful grounds will most likely either be on the basis of the member/donors’ ‘consent’ or that the processing is necessary for the charity’s ‘legitimate interests’. 

“If a charity can mount an arguable case for using the ‘legitimate interests’ grounds (and it does require some analysis) then it may save the charity from having to seek new consents from its existing database.”

So, any charity or club collecting personal data might have to rethink what they're doing. If the data is collected purely for marketing or fundraising then it's unlikely to be a legitimate interest, but charities and clubs have a huge advantage over businesses... They're already required to be transparent. They have constitutions or they've had to register with the charities commission.

So if you're responsible for making decisions about a charity’s data use, or questioning whether you can even afford to send every member a letter asking for their consent... what did you already promise your donors and members that you would do?

This is an editorial article containing opinions that are not intended to replace advice. If you need support developing cyber security processes please follow the links below.

By Emma Osborn, independent cyber security consultant, OCSRC Ltd, with Piers Clayden, technology lawyer, Clayden Law Ltd.

Emma Osborn is an independent cyber security consultant, specialising in the support of smaller organisations and non-technical business leaders as they develop their cyber security processes.  OCSRC

If you’re looking for specialist legal advice, Piers Clayden can be found here: Clayden Law 

You Might Also Read:

GDPR For Dummies:

GDPR: It’s A Marathon, Not A Sprint:

« Hacking The Vote
A Guide To Preventing Charity Cybercrime »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Digital Shadows

Digital Shadows

Digital Shadows is a cyber threat intelligence company that helps clients discover sensitive data exposed through social media, cloud services and mobile devices

SecureAuth

SecureAuth

SecureAuth delivers cutting edge identity and information security solutions for cloud, mobile, web, and VPN systems.

Linklaters LLP

Linklaters LLP

Linklaters is an international law firm. Practice areas include Information Management and Data Protection.

Lakeside Software

Lakeside Software

Lakeside Software is how organizations with large, complex IT environments can finally get visibility across their entire digital estates and see how to do more with less.

Protectimus

Protectimus

Affordable two factor authentication (2FA) provider. Protect your data from theft with multi factor authentication service from Protectimus.

Physec

Physec

Physec offers innovative security products and solutions for the Internet of Things ecosystem.

CultureAI

CultureAI

CultureAI deliver intelligent cyber security awareness education and tools that build resilient security cultures where employees help defend.

Griffiss Institute (GI)

Griffiss Institute (GI)

GI's primary role is to advocate and facilitate the co-operation of private industry, academia, and the Air Force Research Laboratory in developing solutions to critical cyber security problems.

HITRUST Alliance

HITRUST Alliance

HITRUST provides widely-adopted common risk and compliance management frameworks, related assessment and assurance methodologies.

Onfido

Onfido

Onfido is building the new identity standard for the internet. We digitally prove people’s real identities using a photo ID and facial biometrics.

Nettoken

Nettoken

Nettoken is the first identity management platform designed for everyday internet users, to encourage awareness and control of our ever expanding digital footprint and personal cybersecurity.

SoloKeys

SoloKeys

SoloKeys provides the first open-source FIDO2 security key: Protect your online accounts against unauthorized access by using the most secure login method.

BDO Global

BDO Global

BDO is an international network of public accounting, tax and advisory firms which perform professional services under the name of BDO.

Coralogix

Coralogix

Coralogix are rebuilding the path to observability using a real-time streaming analytics pipeline that provides monitoring, visualization, and alerting capabilities without the burden of indexing.

Aceiss

Aceiss

Aceiss empowers access security, providing unprecedented visibility and insights into user access.

Windstream

Windstream

Windstream is a leading provider of advanced network communications and technology solutions for consumers, small businesses, enterprise organizations and carrier partners across the US.