Protecting Personal Information All Services 4U is committed to protecting the personal data of our employees, clients, residents, suppliers, and anyone whose information we process. This Data Protection Policy sets out how we comply with the UK General Data Protection Regulation (UK GDPR) and the Data Protection Act 2018, and the responsibilities of everyone in our organisation. This policy applies to all employees, directors, officers, agency workers, contractors, and anyone who processes personal data on our behalf.
We are committed to
This policy is based on the requirements of
| Term | Definition |
| Personal Data | Any information relating to an identified or identifiable living individual |
| Special Category Data | Sensitive data including race, health, religion, sexual orientation, biometric data |
| Processing | Any operation performed on personal data (collecting, storing, using, sharing, deleting) |
| Data Subject | The individual whose personal data is processed |
| Data Controller | The organisation that determines the purposes and means of processing |
| Data Processor | An organisation that processes data on behalf of a controller |
| Personal Data Breach | A security incident affecting personal data |
All Services 4U is a Data Controller for personal data we collect and use for our own purposes.
We are a Data Processor when we process personal data on behalf of our clients (e.g., resident information provided by housing associations).
We adhere to the seven data protection principles set out in the UK GDPR.
Requirements
Our Approach
Requirements
Our Approach
Requirements
Our Approach
Requirements
Our Approach
Requirements
Our Approach
Requirements
Our Approach
Requirements
Our Approach
The Data Protection Lead is responsible for
Contact Name [Name] Email dataprotection@allservices4u.co.uk Phone [Phone number]
We must have a lawful basis before processing personal data.
| Basis | When It Applies |
| Consent | The individual has given clear consent for specific processing |
| Contract | Processing is necessary to perform or prepare a contract with the individual |
| Legal Obligation | Processing is necessary to comply with the law |
| Vital Interests | Processing is necessary to protect someone’s life |
| Public Task | Processing is necessary for a public function or task in the public interest |
| Legitimate Interests | Processing is necessary for our legitimate interests (unless overridden by the individual’s rights) |
For each processing activity, we document
Special category data requires an additional condition
| Condition | Examples |
| Explicit consent | Health data for reasonable adjustments |
| Employment obligations | Sickness records, diversity monitoring |
| Vital interests | Emergency medical information |
| Legal claims | Data needed for legal proceedings |
| Substantial public interest | Safeguarding, preventing fraud |
Processing criminal record data (e.g., DBS checks) requires
We provide clear information about how we use personal data.
Privacy notices include
| Notice | Audience | Location |
| Privacy Policy | Clients, residents, website visitors | Website, on request |
| Employee Privacy Notice | Employees | Staff handbook, intranet |
| Candidate Privacy Notice | Job applicants | Application process |
| Supplier Privacy Notice | Suppliers, subcontractors | Contract documentation |
| CCTV Notice | Visitors, employees | Displayed at premises |
Individuals have rights under the UK GDPR. We respect and facilitate these rights.
| Right | Description |
| Right to be informed | Know how we use their data |
| Right of access | Obtain a copy of their data |
| Right to rectification | Correct inaccurate data |
| Right to erasure | Request deletion of data |
| Right to restrict processing | Limit how we use data |
| Right to data portability | Receive data in portable format |
| Right to object | Object to certain processing |
| Rights related to automated decisions | Not be subject to solely automated decisions |
Step 1 Receive and Log
Step 2 Verify Identity
Step 3 Assess and Respond
Step 4 Document
| Request Type | Timescale | Extension |
| Access (Subject Access Request) | 1 month | +2 months if complex |
| Rectification | 1 month | +2 months if complex |
| Erasure | 1 month | +2 months if complex |
| Restriction | 1 month | +2 months if complex |
| Portability | 1 month | +2 months if complex |
| Objection | Without undue delay | NA |
We may refuse or limit requests where exemptions apply
We will explain if exemptions apply.
We implement appropriate security measures to protect personal data.
| Measure | Implementation |
| Access Controls | Role-based access, unique user accounts, least privilege principle |
| Authentication | Strong passwords, multi-factor authentication for sensitive systems |
| Encryption | Encryption of data in transit (TLS) and at rest where appropriate |
| Firewalls | Network firewalls and intrusion detection |
| Antivirus | Up-to-date antivirus and anti-malware |
| Patching | Regular security updates and patches |
| Backup | Regular backups with secure offsite storage |
| Mobile Devices | Device encryption, remote wipe capability |
| Email Security | Spam filtering, phishing protection |
| Measure | Implementation |
| Policies | This policy and supporting procedures |
| Training | Mandatory data protection training for all staff |
| Access Management | Starterleaver processes, regular access reviews |
| Clear Desk | Clear desk and clear screen policy |
| Confidentiality | Confidentiality clauses in contracts |
| Incident Response | Breach response procedures |
| Physical Security | Secure premises, locked storage |
| Disposal | Secure disposal of documents and equipment |
| Supplier Management | Due diligence and contracts with processors |
| Requirement | Standard |
| Minimum length | 12 characters |
| Complexity | Mix of upper, lower, numbers, symbols |
| Expiry | Every 90 days (or as risk-based) |
| History | Cannot reuse last 12 passwords |
| Sharing | Never share passwords |
| Storage | No written passwords, use password manager |
When working remotely
A personal data breach must be handled promptly and appropriately.
A personal data breach is a security incident that leads to
| Type | Examples |
| Confidentiality | Data sent to wrong recipient, data accessed by unauthorised person, data stolen |
| Integrity | Data altered without authorisation, data corrupted |
| Availability | Data lost, data destroyed, data inaccessible due to ransomware |
All suspected breaches must be reported immediately.
Report to
Data Protection Lead Email dataprotection@allservices4u.co.uk Phone [Phone number]
Out of hours Phone [Emergency number]
When reporting, provide
Step 1 Containment (Immediate)
Step 2 Assessment (Within 24 hours)
Step 3 Notification (Within 72 hours if required)
If the breach is likely to result in a risk to individuals
If the breach is likely to result in a high risk to individuals
Step 4 Review and Learn
All breaches (including near misses) are recorded in the breach register, including
A Data Protection Impact Assessment (DPIA) helps identify and minimise data protection risks.
A DPIA is required when processing is likely to result in a high risk to individuals, including
Step 1 Screening
Determine if a DPIA is required using the screening checklist.
Step 2 Description
Describe the processing
Step 3 Necessity and Proportionality
Assess whether the processing is
Step 4 Risk Assessment
Identify and assess risks to individuals
Step 5 Mitigation
Identify measures to mitigate risks
Step 6 Sign-Off
The DPIA is reviewed and approved by the Data Protection Lead before processing begins.
Step 7 Review
DPIAs are reviewed
All DPIAs are documented and retained, including
We share personal data appropriately and in compliance with data protection law.
Before sharing data externally, we consider
For regular or significant data sharing, we put in place data sharing agreements that cover
When we process data on behalf of clients
When suppliers process data on our behalf
We restrict transfers of personal data outside the UK.
A restricted transfer is a transfer of personal data to
Transfers are permitted where
Before transferring data to a country without adequacy, we assess
We retain personal data only as long as necessary.
| Data Type | Retention Period | Basis |
| Client contracts | Duration + 6 years | Limitation Act |
| Service records | Duration + 6 years | Contractual, legal |
| Compliance certificates | Validity + 6 years | Regulatory |
| Building Safety Act evidence | Life of building | BSA 2022 |
| Financial records | 7 years | Tax, Companies Act |
| Employee records | Employment + 6 years | Limitation Act |
| Recruitment (unsuccessful) | 6 months | ICO guidance |
| CCTV footage | 30 days | Proportionality |
| Website analytics | 26 months | Business need |
| Complaints | 6 years | Limitation Act |
| Accident records | 6 years (40 years for serious injury) | H&S regulations |
| Training records | Employment + 6 years | Legal, regulatory |
When data reaches the end of its retention period
Data may be retained longer if
We maintain records of our processing activities as required by Article 30 of the UK GDPR.
For processing where we are the controller, we record
For processing where we are a processor, we record
We ensure all staff understand their data protection responsibilities.
| Training | Audience | Frequency |
| Data protection awareness | All employees | Induction |
| Data protection refresher | All employees | Annual |
| Data handling procedures | All employees | Induction + updates |
| Breach response | All employees | Annual |
| Advanced data protection | Data handlers | As required |
| DPIA training | Project leads | As required |
Training covers
We promote awareness through
We ensure processors we engage provide appropriate data protection guarantees.
Before engaging a processor, we assess
All processors must sign a data processing agreement covering
We monitor compliance and conduct regular audits.
| Audit | Frequency | Scope |
| Internal data protection audit | Annual | All processing activities |
| IT security audit | Annual | Technical controls |
| Processor audits | Risk-based | Third-party processors |
| Record keeping review | Annual | ROPA, retention, consent |
The Data Protection Lead reports to senior management
Failure to comply with this policy may result in
Report data protection concerns to
You will not be penalised for reporting genuine concerns.
This policy is reviewed annually and updated to reflect
This policy should be read in conjunction with
This Data Protection Policy has been approved by the Managing Director.
Date [Date]
Review Date [Date + 1 year]
Data Protection Lead Email dataprotection@allservices4u.co.uk Phone [Phone number]
To Report a Breach Email dataprotection@allservices4u.co.uk Phone [Phone number] (24-hour)
Information Commissioner’s Office Website www.ico.org.uk Phone 0303 123 1113
Data Protection Lead Email dataprotection@allservices4u.co.uk Phone [Phone number]
Do not delay — even if you are not sure it is a breach, report it.
All Services 4U is committed to protecting personal data. This policy sets out how we comply with data protection law and the responsibilities of everyone in our organisation.