Securiti leads GigaOm's DSPM Vendor Evaluation with top ratings across technical capabilities & business value.

View

The Data Protection Act of 2018 & The UK GDPR

Operationalize DPA compliance with the most comprehensive PrivacyOps platform

Get Free GDPR Assessment

Last Updated on November 20, 2023

Schedule Your
Personal Demo

Learn how you can leverage Securiti’s Data Command Center to address data security, privacy, governance, and compliance.

See a demo
Schedule your demo today

The Data Protection Act (DPA) of 2018 was passed in April 2016 and came into effect on May 25, 2018. This was the same day the General Data Protection Regulation (GDPR) came into effect.

The DPA implemented the GDPR in the UK, codified its requirements into the UK law, and made the necessary exemptions and requirements based on the UK’s data protection needs. However, from December 2020, the UK is no longer subject to the EU GDPR due to Brexit. The UK GDPR refers to the GDPR as it was on 31st December 2020 in a “frozen” state and any applicable case law at that point. Now, the UK GDPR and the DPA should be read together. The UK DPA has specific chapters on data processing by law enforcement and intelligence service bodies.


The Solution

Securiti promises thorough compliance with both the Data Protection Act of 2018 and the UK GDPR thanks to its PI data discovery, DSR automation, documented accountability, and AI-process automation features, among others.

Each of the aforementioned solutions is backed up by state-of-the-art artificial intelligence and machine-learning-based algorithms, making Securiti a market leader in providing data compliance and governance solutions.

Request a demo today to learn how Securiti can aid you and your organization's compliance efforts.

UK GDPR Compliance Solution

With its state-of-the-art artificial intelligence and machine-learning-based tools, Securiti is a market leader in providing data governance and compliance solutions.

Request a demo today to learn how Securiti can aid you and your organization's compliance efforts.


 

Automate Consumer Data Access Request Handling

DPA Sections 12, 13 & UK GDPR Article 15

Organizations can easily automate the process related to data access requests while being compliant with the law.

UK-GDPR-DSR-Handling-securiti
UK-GDPR-dsr-requests-securiti

Secure Fulfillment of Data Access Requests

DPA Sections 12, 13 & UK GDPR Article 15

A central portal ensures all data access requests are streamlined and easily viewable via a singular dashboard, allowing you to keep track of them in real time.

Automate Processing of Rectification Requests

UK GDPR Article 16

All rectification requests received can be automated, and their progress visible via the central dashboard in real time.

UK-GDPR-data-rectify-request-securiti
UK-GDPR-data-erasure-request-securiti

Automate Erasure Requests

UK GDPR Article 17

All erasure requests received can be automated, and their progress visible via the central dashboard in real time.

Automate Object & Restriction of Processing Requests

UK GDPR Articles 18, 19

All objections and restrictions of data processing requests can be automated, and their progress visible via the central dashboard in real time.

UK-GDPR-processing-request-securiti
UK-GDPR-personal-data-monitoring-tracking-securiti

Monitor & Track Consent

UK GDPR Articles 6, 7, 9

Organizations can monitor their users’ consent related to various data processing activities via the central dashboard. This ensures that all data collection is compliant with the data protection requirements while also guaranteeing no illegal transfers, sharing, or selling of data not consented by the user occurs.

Assess Readiness

DPA Section 4, 8, 13 & UK GDPR Articles 5, 24, 25

Organizations can conduct regular internal assessments of their various data-related processes to evaluate their effectiveness. Additionally, these assessments can help identify gaps and deficiencies, which can be appropriately remedied.

UK-GDPR-Data-Protection-Readiness-Assessment-securiti
UK-GDPR-Data-flow-Mapping-securiti

Map Data Flows & Generate Reports

UK GDPR Article 30

Automate all incoming and outgoing data transfers in real time to ensure all transfers are compliant with the appropriate data protection requirements.

Automate Data Breach Response Notifications

UK GDPR Articles 33, 34

Organizations can easily automate compliance actions and data breach response notifications to concerned stakeholders in connection to security incidents by leveraging a knowledge database on security incident diagnosis and response.

UK-GDPR-breach-response-notification-securiti
UK-GDPR-manage-vendor-risk-securiti

Manage Vendor Risk

​​UK GDPR Articles 28

Organizations can easily track all their vendors’ data processing activities to ensure their practices are in compliance with the law.

Meet Cookie Compliance

UK GDPR Articles 6, 7, 21

Ensure all cookies being used by an organization are compliant with the appropriate requirements of the law.

UK-GDPR-Cookie-Consent-Compliance-securiti
Privacy-Policy-Management-UK-GDPR-securiti

Privacy Policy & Notice Management

UK GDPR Articles 12, 13

Generate privacy policies that are compliant with the appropriate data protection laws in informing the users about the data collection practices of the organization while also automating any notice requirements.

Key Rights Under Data Protection Act & UK GDPR

The DPA and the UK GDPR ensure all users have a specific set of rights, known as data subject rights, to ensure they retain control over how their data is used. These rights include the following:

Right of Access

The data subjects have a right to obtain confirmation as to whether or not personal data concerning the data subject are being processed and access to personal data.

Data subjects can request the following information about the data collected:

  • Purpose of data collection;
  • Categories of collected data;
  • How long the collected data will be stored;
  • Any third parties the collected data has been shared with or sold to;
  • Existence of automated decision-making mechanisms.

Right to Rectification

All data subjects have a right to request rectification of any collected data if it has become outdated/incorrect/obsolete since the data was initially collected. In case of incomplete data, the data subjects will have the right to provide a supplementary statement to complete such incomplete data.


Right to Erasure

Also known as the Right to be Forgotten, all data subjects have the right to request any collected on them be destroyed, and any existing data processing activities be ceased accordingly.

The data processor/controller must abide by any such requests if any of the following criteria are met:

  • Data collected is no longer necessary for the purpose they were collected;
  • The data subject has withdrawn their consent to data collection;
  • The data subject has objected to data collection;
  • Data was unlawfully processed;
  • Data has to be erased pursuant to a legal obligation in a state where the data controller is a subject.

Right to Data Portability

All data subjects have the right to receive all data collected on them by a data processor or controller in a structured, commonly used, and machine-readable format that can be accessed easily via an appropriate electronic device.


Right to Object

All data subjects have the right to request an end to all data collection and processing activities related to their data. The data processor/controller must cease all their data collection activities once such a request is made unless they have legitimate reasons for continuing to do so related to legal, contractual, and national security reasons. The right to object includes the right to withdraw consent for direct marketing purposes.


Right to Restriction of Processing

All data subjects have the right to request a restriction on the processing or collection of their personal data in the following circumstances:

  • The data subject contests the accuracy of the data collected;
  • Data was unlawfully processed and the data subject requests the restriction of data processing rather than erasure of data;
  • The data controller no longer needs to process the data;
  • The data subject has objected to their data being processed and verification is pending.

Automated Individual Decision-Making

All data subjects have a right to request an end to any automated decision-making, including profiling that may have legal implications for the data subject.

However, this right does not apply in the following cases:

  • The data subject has explicitly consented to automated decision making;
  • The state permits the data controller to carry out such activities;
  • Automated decision-making is necessary for the performance of a contract between the data subject and the data controller.

Notification Obligation Regarding Rectification/Erasure of Personal Data

The data processor/controller must ensure that any rectification, erasure, and restricting of processing data requests made by a data subject are properly communicated to all parties that had access to the data subject’s data.

The data processor/controller may be exempt from this requirement if notifying all such parties would require a disproportionate effort. The data subject must be informed of all these parties that had access to their data if they request such information.

The DPA contains several limitations to data subjects’ rights as they are provided under the UK GDPR. One such exception aims to protect the national security and defense of the country. Accordingly, the rights of data subjects do not apply if the exemption is required to safeguard national security or defense purposes, however, only in relation to manual unstructured data held by FOI public authorities.

Facts Related to Data Protection Act & UK GDPR

Here are some facts about the Data Protection Act 2018 & the UK GDPR

1

The Data Protection, Privacy and Electronic Communications (Amendments etc.) EU Exit Regulations 2019 amended the EU GDPR, resulting in the UK GDPR.

2

In case of data breaches, organizations can be fined €20 million or 4% of annual global turnover (whichever one is higher) and €10 million or 2% of annual global turnover (whichever one is higher) in case of administrative failures.

3

The Data Protection Act of 2018 applies to any organization that holds data belonging to UK residents. It also applies to entities processing personal data in the context of the activities of an establishment of a controller or a processor in the UK, regardless of whether the processing takes place in the UK or not.

4

Data processors and controllers must respond to all data subject requests without undue delay and in any event, within 30 days of the receipt of the request.

5

UK post-Brexit International Data Transfer Agreement is a replacement of former SCCs and facilitates cross-border data transfers from the UK to non-adequate third countries.

6

The Information Commissioner’s Office (ICO) is the relevant regulatory body responsible for ensuring compliance with the DPA read with UK GDPR.

IDC MarketScape

Securiti named a Leader in the IDC MarketScape for Data Privacy Compliance Software

Read the Report
Videos
View More
Mitigating OWASP Top 10 for LLM Applications 2025
Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...
View More
Top 6 DSPM Use Cases
With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...
View More
Colorado Privacy Act (CPA)
What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...
View More
Securiti for Copilot in SaaS
Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...
View More
Top 10 Considerations for Safely Using Unstructured Data with GenAI
A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....
View More
Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes
As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...
View More
Navigating CPRA: Key Insights for Businesses
What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...
View More
Navigating the Shift: Transitioning to PCI DSS v4.0
What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...
View More
Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)
AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...
AWS Startup Showcase Cybersecurity Governance With Generative AI View More
AWS Startup Showcase Cybersecurity Governance With Generative AI
Balancing Innovation and Governance with Generative AI Generative AI has the potential to disrupt all aspects of business, with powerful new capabilities. However, with...

Spotlight Talks

Spotlight 11:29
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Watch Now View
Spotlight 11:18
Rewiring Real Estate Finance — How Walker & Dunlop Is Giving Its $135B Portfolio a Data-First Refresh
Watch Now View
Spotlight 13:38
Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines
Sanofi Thumbnail
Watch Now View
Spotlight 10:35
There’s Been a Material Shift in the Data Center of Gravity
Watch Now View
Spotlight 14:21
AI Governance Is Much More than Technology Risk Mitigation
AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3
You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge
Watch Now View
Spotlight 47:42
Cybersecurity – Where Leaders are Buying, Building, and Partnering
Rehan Jalil
Watch Now View
Spotlight 27:29
Building Safe AI with Databricks and Gencore
Rehan Jalil
Watch Now View
Spotlight 46:02
Building Safe Enterprise AI: A Practical Roadmap
Watch Now View
Spotlight 13:32
Ensuring Solid Governance Is Like Squeezing Jello
Watch Now View
Latest
Simplifying Global Direct Marketing Compliance with Securiti’s Rules Matrix View More
Simplifying Global Direct Marketing Compliance with Securiti’s Rules Matrix
The Challenge of Navigating Global Data Privacy Laws In today’s privacy-first world, navigating data protection laws and direct marketing compliance requirements is no easy...
View More
Databricks AI Summit (DAIS) 2025 Wrap Up
5 New Developments in Databricks and How Securiti Customers Benefit Concerns over the risk of leaking sensitive data are currently the number one blocker...
A Complete Guide on Uganda’s Data Protection and Privacy Act (DPPA) View More
A Complete Guide on Uganda’s Data Protection and Privacy Act (DPPA)
Delve into Uganda's Data Protection and Privacy Act (DPPA), including data subject rights, organizational obligations, and penalties for non-compliance.
Data Risk Management View More
What Is Data Risk Management?
Learn the ins and outs of data risk management, key reasons for data risk and best practices for managing data risks.
Beyond DLP: Guide to Modern Data Protection with DSPM View More
Beyond DLP: Guide to Modern Data Protection with DSPM
Learn why traditional data security tools fall short in the cloud and AI era. Learn how DSPM helps secure sensitive data and ensure compliance.
Mastering Cookie Consent: Global Compliance & Customer Trust View More
Mastering Cookie Consent: Global Compliance & Customer Trust
Discover how to master cookie consent with strategies for global compliance and building customer trust while aligning with key data privacy regulations.
Singapore’s PDPA & Consent: Clear Guidelines for Enterprise Leaders View More
Singapore’s PDPA & Consent: Clear Guidelines for Enterprise Leaders
Download the essential infographic for enterprise leaders: A clear, actionable guide to Singapore’s PDPA and consent requirements. Stay compliant and protect your business.
View More
Australia’s Privacy Act & Consent: Essential Guide for Enterprise Leaders
Download the essential infographic for enterprise leaders: A clear, actionable guide to Australia’s Privacy Act and consent requirements. Stay compliant and protect your business.
Gencore AI and Amazon Bedrock View More
Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock
Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...
DSPM Vendor Due Diligence View More
DSPM Vendor Due Diligence
DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...
What's
New