Across
- 2. Clear permission given for personal data to be used.
- 3. Safe disposal of confidential paper records.
- 4. The theme: data protection embedded into everything we do.
- 5. Core principle ensuring information is handled with respect and protection.
- 7. Building data protection in from the very start, not as an afterthought.
- 9. Protecting data so only authorised parties can read it.
- 11. A deceptive attempt to trick staff into revealing sensitive information.
- 14. Protects your device when you step away from your desk.
- 15. A security or data breach that must be reported quickly.
- 16. Access rights based on job responsibilities.
Down
- 1. Collecting only the data that is necessary for the task.
- 6. DESK Good office behaviour to prevent unauthorised access to data.
- 7. Understanding how information moves through systems and teams.
- 8. How staff learn to handle personal data safely.
- 10. A basic but vital security control that should never be shared.
- 12. Only giving systems and data to those who genuinely need them.
- 13. Choices staff make every day that affect data security.
