On 29 January 2021, the Kemp Little team joined Deloitte Legal. Click here to view the press release.

As of 30 January 2021, Kemp Little LLP ceased to operate as a firm of solicitors and practice law and ceased to be regulated and authorised by the Solicitors Regulation Authority.

Kemp Little LLP has been re-named KL Heritage LLP.

If you are looking to contact a specific individual to seek legal advice or in respect of any other business relationship, please contact Deloitte Legal.

If you are seeking to contact the old Kemp Little LLP in relation to a previous business relationship or matter, please get in touch with KL Heritage LLP.

For enquiries relating to Kemp Little technology products and training portal, please email deloittelegal@deloitte.co.uk

 


 

Kemp Little is a trade name used under licence by KL Heritage LLP (formerly Kemp Little LLP, registered number OC300242 and VAT number 182 8854 65).

On 29 January 2021, the Kemp Little team joined Deloitte Legal.  As of 30 January 2021, Kemp Little ceased to operate as a firm of solicitors and practice law. From this date Kemp Little ceased to be authorised and regulated by the Solicitors Regulation Authority and is being re-named KL Heritage LLP.

All references to Kemp Little herein are references to KL Heritage LLP, which used to carry on business in that name.

KL Heritage LLP is not connected to or associated with Deloitte Legal or Deloitte LLP in any capacity.

 

Kemp Little
  • Looking for someone?
  • Email us
  • Search
MENU MENU
Insights overview

Data protection & privacy · 29 July 2020 · Judit Garrido Fontova

What to do when an audit highlights deficiency

Audit as part of the accountability principle.

Two years ago, thousands of organisations had to step on the gas pedal to adapt to the requirements of the General Data Protection Regulation, which sometimes led them to accept risks that they were not able to handle in an efficient manner. However, a data protection compliance program is a living process that is continuously evolving as organisations do so, and the accountability principle requires data controllers to perform an ongoing self-assessment and take steps to address any risks.

Moreover, the number of investigations by supervisory authorities has significantly increased over the past years. According to the last annual report issued by the Information Commissioner Officer (ICO), in the UK, throughout 2019/20, there were 236 instances of the ICO taking regulatory action in response to breaches of the applicable data protection legislation.

Therefore, in this fast-evolving business environment, the internal and external data protection auditing has acquired a main role within numerous organisations to meet the accountability principle requirements and avoid regulatory enforcement actions.

However, while most data protection audit processes cover the assessment and identification of weaknesses, many of them do not cover the next steps that must be taken, i.e. what to do after the audit deficiency results are obtained. This would make the audit process incomplete, as its main objective should not only be to identify gaps, but to address them. It is therefore important to clarify what a data protection audit process should cover once the results are obtained. An audit attached to an unread email identifying deficiencies may serve as a ticking time bomb in the event of a data breach that could have been prevented by addressing the inadequacies raised by the audit so acting on the audit is as important as conducting the audit.

What happens when the audit report presents gaps?

Once the audit has been completed and the audit report has been finalised, organisations should consider the questions below.

1. Identify findings and gaps

What are the issues? What needs to be improved? In case the report sets out a number of issues or particular aspects that need to be fixed, it will be necessary to proceed with the next stage to address the problems identified.

The first step would be to review the audit process and methodology and double check that it is comprehensive, covering all relevant data protection aspects, as well as all business areas that handle personal data within the organisation. Once this has been completed, a mitigation plan based on the recommendations coming from the report should be put in place in order to address the deficiencies in an efficient manner. Priorities and areas of high risk should also form part of any plan together with anticipated costs allocated – whether this is for technology, headcount or changes in processes.

2. Timing

When did the issue start taking place? When is the deadline to fix the issue? It is important to know for how long the organisation has been non-compliant and how long it will take to reach adequate levels according to the applicable data protection requirements. The mitigation plan needs to establish the deadline that the organisation must meet for each specific issue identified and will need sponsors within the organisation.

3. Reasons behind deficiencies

Why is the organisation non-compliant in terms of data protection? Some of the main areas that need to be checked are:

  • Are inadequate processes or workarounds causing the issues?
  • Are there privacy policies and procedures in place and being followed that help ensure compliance.
  • Whether personal data is obtained and processed accurately and whether there are technical and organisational measures in place to guarantee the confidentially and integrity of the information.
  • What mechanisms are in place in order to assist individuals with the data subject requests?
  • Whether training and awareness has been provided to those individuals within the organisation who are responsible for processing personal data that is both recent and relevant to their role?
  • Is data protection and information security adequately flowed down through your supply chain?
4. Affected areas

Which business functions are not doing things right? Are the identified shortcomings located in just one area which makes other areas not to be compliant? It is important that the audit helps identifying where the main risks are and whether these may affect other business functions and does not look to allocate blame.  Identifying an issue, collaborating and resolving will always be the best option for reducing the overall risk exposure of any organisation. All areas must be aware of how data protection legislation impacts them and what commitments they need to assume in order to reduce potential risks. Consistency across the whole organisation when implementing data protection standards is an essential requirement.

5. Mitigation actions

How can organisations address the findings? There are several actions to be taken that may help businesses not only to mitigate current deficiencies, but also to identify potential ones. Organisations should focus on risks that may appear when data protection principles and standards are not met.

As mentioned, it will be necessary to design and put in place a plan to implement the different recommendations included in the audit report. All the questions above should be considered, including resources, impacted areas, timing, as well as other aspects that may be relevant depending on the type of organisation. In order to undertake the implementation plan, it is necessary to establish a clear roadmap covering the key areas depending on the level of risk that has been identified and the potential impact that they may have from both a financial and reputational perspective.

In addition, periodic reviews of the plan will need to be conducted to confirm that mitigation actions are adequately implemented, that risks are reduced and that the organisation meets any agreed remediation deadline.

Lesson learnt

The audit process is an essential element of any privacy compliance program. If organisations do not act efficiently, the economic and reputational consequences may impact negatively on their business. In this regard, it is not only important to have a strong audit framework in place, but also learning from the deficiencies identified through an iterative process to solve the main structural problems of the organisation that lead to higher data protection risks.

For further information on how we could help you see our Data protection toolkit. 

  • Share this blog

  • Twitter
  • Facebook
  • Linkedin

Judit Garrido FontovaJudit Garrido Fontova is a data protection and privacy associate

Get in touch

View the team

Sign up for our newsletters

  • Share this Blog

  • Twitter
  • Facebook
  • Linkedin

Other stuff you might like

  1. How to… lawfully collect customer contact-tracing information | The Caterer
  2. What to do when an audit highlights deficiency
  3. Podcast | DPO Update: DPIAs, Schrems 2, e-privacy, CCPA & CPRA, mobile phone extraction by police, Smart TVs investigated and latest fines
The hottest topics in technology
  • Adtech & martech
  • Agile
  • Artificial intelligence
  • EBA outsourcing
  • Brexit
  • Cloud computing
  • Complex & sensitive investigations
  • Connectivity
  • Cryptocurrencies & blockchain
  • Cybersecurity
  • Data analytics & big data
  • Data breaches
  • Data rights
  • Digital commerce
  • Digital content risk
  • Digital health
  • Digital media
  • Digital infrastructure & telecoms
  • Emerging businesses
  • Financial services
  • Fintech
  • Gambling
  • GDPR
  • KLick DPO
  • KLick Trade Mark
  • Open banking
  • Retail
  • SMCR
  • Software & services
  • Sourcing
  • Travel
close
The hottest topics in technology
  • Adtech & martech
  • Agile
  • Artificial intelligence
  • EBA outsourcing
  • Brexit
  • Cloud computing
  • Complex & sensitive investigations
  • Connectivity
  • Cryptocurrencies & blockchain
  • Cybersecurity
  • Data analytics & big data
  • Data breaches
  • Data rights
  • Digital commerce
  • Digital content risk
  • Digital health
  • Digital media
  • Digital infrastructure & telecoms
  • Emerging businesses
  • Financial services
  • Fintech
  • Gambling
  • GDPR
  • KLick DPO
  • KLick Trade Mark
  • Open banking
  • Retail
  • SMCR
  • Software & services
  • Sourcing
  • Travel
Kemp Little

Lawyers
and thought leaders who are passionate about technology

Expand footer

Kemp Little

138 Cheapside
City of London
EC2V 6BJ

020 7600 8080

hello@kemplittle.com

Services

  • Commercial technology
  • Consulting
  • Disputes
  • Intellectual property
  • Employment
  • Immigration

 

  • Sourcing
  • Corporate
  • Data protection & privacy
  • Financial regulation
  • Private equity & venture capital
  • Tax

Sitemap

  • Our people
  • Insights
  • Events
  • About us
  • Contact us
  • Cookies
  • Privacy
  • Terms of use
  • Complaints
  • Debt recovery charges

Follow us

  • Twitter
  • LinkedIn
  • FlightDeck
  • Sign up for our newsletters

Kemp Little LLP is a limited liability partnership registered in England and Wales (registered number OC300242) and is authorised and regulated by the Solicitors Regulation Authority. Its registered office is 138 Cheapside, London EC2V 6BJ. The SRA Standards and Regulations can be accessed by clicking here.

  • Cyber Essentials logo
  • LORCA logo
  • ABTA Partner+ logo
  • Make Your Ask logo
  • FT Innovative Lawyers 2019 winners logo
  • Law Society Excellence Awards shortlisted
  • Legal Business Awards = highly commended
  • Home
  • Our people
  • Services
    • Business restructuring and reorganisation
    • Commercial technology
    • Consulting
    • Corporate
    • Data protection & privacy
    • Digital content & reputation risk
    • Disputes
    • Employment
    • Financial regulation
    • Immigration
    • Innovation
    • Intellectual property
    • Private equity & venture capital
    • Sourcing
    • Tax
    • Travel
  • Resources
  • Insights
  • Covid 19: Your Business Continuity
  • Events
  • About us
    • Who we are
    • Our social responsibilities
    • Our partnerships
    • Join us
  • Contact us
  • FlightDeck
  • Sign up for our newsletters
  • Follow us
    • Twitter
    • LinkedIn
close
close
close

Send us a message

Fill in your details and we'll be in touch soon

[contact-form-7 id="4941" title="General contact form"]
close

Sign up for our newsletter

I would like to receive updates and related news from Kemp Little *

Please select below any publications that you would like to receive:

Newsletters

close

Register for future event information

[contact-form-7 id="4943" title="Subscribe to future events"]
close
close
Generic filters
Exact matches only

Can't remember their name? View everyone

  • Home
  • Our people
  • Services
    • Business restructuring and reorganisation
    • Commercial technology
    • Consulting
    • Corporate
    • Data protection & privacy
    • Digital content & reputation risk
    • Disputes
    • Employment
    • Financial regulation
    • Immigration
    • Innovation
    • Intellectual property
    • Private equity & venture capital
    • Sourcing
    • Tax
    • Travel
  • Resources
  • Insights
  • Covid 19: Your Business Continuity
  • Events
  • About us
    • Who we are
    • Our social responsibilities
    • Our partnerships
    • Join us
  • Contact us
  • FlightDeck
  • Sign up for our newsletters
  • Follow us
    • Twitter
    • LinkedIn