The UKs #1 Data Protection Consultancy

Data Protection & Information Security Experts

Data Protection Made Easy.

GDPR Support Cyber Security Support
Join our extensive list of clients who have their data privacy under control

Accelerate Your Data Protection Compliance

Save Time, Save Money and Relax: You’re In Safe Hands

Discover the comprehensive range of data protection services at Data Protection People. Tailored to meet the unique needs of your organisation, our expert team has successfully handled every challenge imaginable. Whether you’re navigating compliance complexities or enhancing data security, trust DPP to be your partner in safeguarding information.

GDPR Training

Data Protection People have a wide range of training services catering for every need. Whether its general training for operational or admin staff or specific training for specialist roles, we have something for you. watch the short video below to meet the team and find out more about our training services.

Contact Us

Information Management Software

DataWise is the original privacy tech platform designed to simplify GDPR compliance management. Since its inception in 2011, DataWise has continuously evolved, solidifying its reputation as the pioneering "privacy tech" solution.

Contact Us

Data Protection Consultancy

Unlock Compliance Excellence with Our GDPR Consultancy Services. Navigating the intricate realm of data protection laws and standards demands expert guidance.

Contact Us

Outsourced DPO

A data protection officer doesn't have to be a full time employee and in many respects it's better to have a company like DPP take on the role. Watch the video below to find out more about our outsourced DPO and privacy officer services or reach out and get in touch with us.

Contact Us
View All

Need Help With Cyber Security Compliance?

We Have You Covered!

At Data Protection People, our cyber security services are designed to fortify your digital defences. With a proven track record spanning diverse sectors in the UK, our seasoned team brings a wealth of experience in handling a wide array of cybersecurity challenges. Reach out to us and explore how DPP can enhance your organisation’s cyber resilience.

PCI DSS Compliance Services for Merchants

A PCI assessment is an audit for validating compliance with the Payment Card Industry Data Security Standard (PCI DSS), a set of security standards for merchants who accept, process, store or transmit credit card information.

Contact Us

PCI DSS Compliance Services for Service Providers

A PCI assessment is an audit for validating compliance with the Payment Card Industry Data Security Standard (PCI DSS), a set of security standards for merchants who accept, process, store or transmit credit card information.

Contact Us

External Attack Surface Management

Our experts can support you with Dark Web Monitoring - Data Protection People offer a free dark web scan for your organisation.

Contact Us

ISO 27001

Our tailored program, guided by industry-certified experts, supports your ISO 27001 compliance journey. Whether you need advice on certification scope, assistance with remediation work, or comprehensive ISO 27001 consultancy, we’re here to guide you every step of the way.

Contact Us
View All
Rofi Hendra Support Desk Data Protection People

Supporting DPOs

Flexible Support When You Need It

At Data Protection People, we recognise the dynamic challenges and unique responsibilities of the Data Protection Officer (DPO) role. Beyond offering standard support, we provide a comprehensive suite of services crafted to empower DPOs at every step.

Collaborative Community: Navigating the intricate landscape of data protection can be isolating. That’s why we’ve fostered a collaborative community of privacy professionals. As a DPO with us, you’re never alone. Our network serves as a forum for insightful discussions, sharing solutions, and building a sense of camaraderie.

Expert Guidance and Advice: The journey of a DPO is often filled with complex decisions. Our seasoned team of experts is your reliable resource, offering timely advice and strategic guidance. We’re not just a service provider; we’re your dedicated partners in overcoming challenges and making informed decisions.

Advanced Training for Continuous Growth: Stay ahead in your role with our advanced training programs. Tailored for DPOs, our courses delve into intricate aspects of data protection, providing you with a competitive edge. It’s not just about meeting the present challenges but ensuring your continuous growth and excellence in your role.

Audits, Assessments, and Document Reviews: Our services extend beyond conventional boundaries. From comprehensive audits and assessments to meticulous document reviews, we ensure that your data protection strategies are not only compliant but also optimised for efficiency.

Simplifying Complexity for Future Ease: Beyond addressing current challenges, our mission is to simplify the complexities inherent in data protection. By partnering with Data Protection People, you’re not just solving problems – you’re ensuring a smoother, more efficient role in the future. We streamline processes, making your responsibilities more manageable and your decisions more impactful.

Diverse Sector Experience

Access to a Team of Industry Experts

At Data Protection People, our expertise spans across diverse sectors, ensuring that businesses of all sizes and orientations receive tailored Data Protection and Cyber Security solutions. From the dynamic commercial sector and agile SMEs to the impactful third sector and expansive multi-nationals, we extend our services to fortify the digital defences of every business entity.

Commercial Sector

Elevate your data protection and cybersecurity standards in the bustling landscape of the Commercial Sector. We offer tailored solutions designed to safeguard your sensitive information, ensuring compliance and resilience against evolving threats. Partner with us to fortify your digital assets and foster a secure environment for sustained growth.

SMEs

Small and Medium Enterprises (SMEs) form the backbone of innovation. Our data protection and cybersecurity services are crafted to match the agility of SMEs. Navigate the digital landscape securely, optimize your operations, and scale confidently with our tailored solutions that prioritize your unique business needs.

Third Sector

Third Sector

For organisations in the Third Sector driven by purpose, our data protection and cybersecurity expertise align with your mission. Safeguard sensitive data, build stakeholder trust, and amplify your positive impact. Let our solutions be the backbone of your technology infrastructure, ensuring that your focus remains on making a difference.

Multi Nationals

For the global footprint of Multi Nationals, our data protection and cybersecurity services provide a comprehensive shield. Navigate the complexities of international regulations with confidence. From compliance strategies to threat intelligence, we've got your data security needs covered, empowering your multinational endeavors with resilience.

Public Sector

In the Public Sector, trust and accountability are paramount. Our data protection and cybersecurity consultancy ensures that your operations align seamlessly with regulatory requirements. From confidential citizen data to streamlined governance, our solutions empower public entities to serve with integrity and technological excellence.

Why Use Our Outsourced DPO Services?

Save Time, Money and Guarantee Compliance

Navigating the intricate landscape of data protection demands more than just a DPO — it requires a dedicated team committed to excellence. Our Outsourced DPO Services extend beyond the traditional role, offering a comprehensive approach to legal compliance and pragmatic solutions.

Why Choose Outsourcing?

An outsourced DPO brings a wealth of experience, not just in the law but also in crafting workable solutions. Their impartiality is fortified by a team of privacy practitioners, ensuring that your organization benefits from a spectrum of expertise. Should the need arise, seamless coverage during absences is guaranteed, eliminating the vulnerability associated with a single in-house DPO.

Staying Headache-Free

Concerned about the disruption if your DPO moves on? With an outsourced model, transitions are smooth, and you won’t experience the sudden headache of a critical role vacancy. The continuity provided by a team ensures that your data protection responsibilities are seamlessly handled.

Compliance Tailored to You

Our Outsourced DPO Services align seamlessly with your legal obligations, whether you’re mandated to appoint a DPO or choose to do so voluntarily. We understand that compliance is not just about ticking boxes but about ensuring a robust, practical approach to data protection. Choose Data Protection People for a worry-free, compliance-driven outsourced DPO solution — because your data protection journey should be as smooth as it is secure.

“I cant recommend Data Protection People enough, they have helped me in so many different areas, no matter how complex the challenge or how large the obstacle, DPP always has the answer.

I can call the team at any time and have built an amazing relationship with them, in times of frustration they are here to calm me down and create a plan, they are a pleasure to work with.”

Mark Leete
Eastlight Community Homes
TDC_logo

‘I found the FOI training session to be highly informative and well-structured. It covered all the key areas comprehensively and provided clear, practical guidance throughout. The content was easy to follow, and the delivery by Gary was engaging, making complex topics accessible and understandable’. 

‘The training session has really helped me to understand the IG rep role a bit more and what I need to be thinking about when receiving a request for information’. 

Charlene Haynes & Team
Tendring District Council
dyslexia-action-logo-2023

“I have worked with the Data Protection People for some time now. Their expertise has been drawn upon to assist us with our GDPR compliance gap analysis project, ROPA design and production through to conducting objective reviews and surveys. They are always available to help us out and their advice and guidance is excellent and delivered in a timely way. Special mentions to Kathy Midgley, Phil Brining, and David Hendry. A great, reliable and dependable service!”

Judy Barker
Dyslexia Action
Veritau

“A great service and peace of mind. Data Protection People provides a well-rounded service to ensure customers are fully supported in their approach to GDPR compliance. My interaction has largely been with the following people: Kathy Midgley – another great asset to the organisation. Always approachable, always helpful and consistently supportive to the team and customers.

Julie Ferguson
Veritau
Woodgate & Clark

“We have been working with the Data Protection People for many years now, and have found them to be insightful, helpful, and knowledgeable in all areas of Data Protection Compliance. Data Protection People have taken the time to understand our business, the regulatory environment we sit under, and the unique challenges we face in the industry. They have supported us in all areas of Information and Data Security, assisting in assessments of our policies and changes to our processes. They are always willing to go the extra mile and prioritise support where required.”

Nia Roberts
Woodgate & Clarke

Data Protection People Blogs & Podcasts

Data Privacy Learning & Guidance

Data Protection People have the UK’s #1 Data Protection Podcast with over 150 episodes available across all audio streaming platforms, we also post regular content designed to simplify complex areas of data protection and cyber security, check out some of the podcasts and articles below and make data protection easy today.

Business Development Manager – Cyber Security Services

Join Our Growing Team at Data Protection People

Data Protection People is expanding at a pace we have never seen before. Our team is the largest it has ever been and with our biggest year ahead, we are now looking for an ambitious Business Development Manager to help drive the continued growth of our Cyber Security Services division. If you are passionate about Cyber Security, enjoy building relationships, and thrive in a target driven environment, we would love to hear from you.

About the Role

We are recruiting a Business Development Manager focused on Cyber Security Services. This role is central to our growth strategy and involves generating new business across key service areas including PCI DSS, ISO 27001, Cyber Essentials, SOC 2, penetration testing and wider security consultancy. You will play a key part in helping organisations strengthen their security posture and navigate complex compliance requirements.

Key Responsibilities

Lead Generation
Identify and pursue new business opportunities using cold outreach, networking, events and market research. You will be proactive in building your own pipeline and opening doors with organisations that need support with cybersecurity.

Sales Presentations and Proposals
Prepare and deliver tailored proposals that clearly communicate the value of our cybersecurity solutions, and how they align with client objectives.

Negotiation and Closing
Negotiate confidently and secure new business agreements that help you meet or exceed your sales targets.

Market Insight
Stay informed on industry trends, compliance changes and competitor offerings to help identify new opportunities and position our services effectively.

Collaboration
Work closely with our Cyber Security and Consultancy teams to ensure proposals are accurate, solutions meet client needs, and handovers are smooth.

Reporting and CRM Management
Maintain accurate records of all sales activities, meetings and opportunities using Salesforce CRM.

Strategy and Campaign Development
Support the wider sales and marketing function by contributing ideas, supporting campaigns and helping shape how we reach new clients.

What We Are Looking For

We are seeking someone who is driven, confident and ready to take ownership of their pipeline.

Experience
A proven track record in business development or sales is essential, ideally within cybersecurity or technology.

Skills

  • Strong communication and interpersonal skills
  • Excellent negotiation and closing ability
  • Confident presenting to stakeholders at all levels
  • Ability to work independently and manage time effectively
  • Comfortable with Salesforce and Microsoft Office
  • Understanding of cybersecurity standards such as PCI DSS, ISO 27001, Cyber Essentials and SOC 2

Attributes

  • Self motivated with a proactive, opportunity-seeking mindset
  • Able to explain complex cybersecurity services clearly
  • Resilient, adaptable and comfortable in a fast paced environment
  • Enthusiastic, outgoing and confident

Benefits of Working With Us

Joining Data Protection People means becoming part of a friendly, fast growing and highly respected organisation.

Our benefits include:

  • Competitive salary with strong commission structure
  • Up to 30 days holiday, with an extra day added each year
  • Pension scheme
  • HR Bright and wellbeing support
  • Excellent opportunities for professional development and career progression
  • Supportive, collaborative work culture with a strong focus on employee wellbeing

How to Apply

If you are excited by this opportunity and want to join us on our next stage of growth, we would love to hear from you. Please submit your CV along with a cover letter explaining why you are the right fit for this role.

Once your CV has been reviewed, we will send an application form and arrange an introductory meeting.

Apply via Email

Equal Opportunity Statement

Data Protection People is proud to be an equal opportunity employer. We welcome applicants from all backgrounds and are committed to creating an inclusive workplace where everyone can thrive.

Navigating the Digital Omnibus: A UK GDPR Briefing for Busy Data Teams

Navigating the Digital Omnibus: A UK GDPR Briefing for Busy Data Teams

On 19 November 2025, the European Commission published its Digital Omnibus package. This set of proposals would update several major EU digital laws, including the GDPR, ePrivacy framework, AI Act, Data Act and Data Governance Act. The goal is to simplify compliance and support innovation while maintaining the fundamental rights and protections established in EU law.

For UK organisations with customers in the EU or who transfer EU personal data, these proposals are strategically important. Although the Omnibus is an EU initiative, it will shape expectations in the wider regulatory environment. It may also influence the UK’s own reforms, including the Data Use and Access Act 2025.

Key Elements of the Digital Omnibus

The Digital Omnibus contains two draft regulations. One amends the AI Act and the other makes cross cutting updates across digital and data laws. The proposals focus on three core areas: data protection, cybersecurity and breach reporting, and artificial intelligence.

AI Act Adjustments

The Omnibus introduces several changes intended to reduce the early compliance burden on organisations developing or deploying high risk AI systems.

  • A one year extension to some high risk AI compliance deadlines.
  • Expansion of SME friendly regimes to larger mid sized organisations.
  • Removal of some obligations, such as AI literacy requirements, for certain providers.

For example, deadlines linked to training and validation obligations would shift to late 2027 rather than 2026. This gives businesses more time to meet new technical standards and reduces early compliance pressure for AI developers working within EU markets.

A Narrower Definition of Personal Data

One of the most significant proposals is a revised definition of personal data. Under the current GDPR, any information that could directly or indirectly identify an individual is treated as personal. This includes names, emails, IP addresses, device IDs and pseudonymous data.

The Omnibus moves to a controller centred test. Data will only be personal if the organisation processing it has the means that are reasonably likely to be used to identify a person.

In practice this means:

  • Highly pseudonymised data or indirect identifiers may fall outside scope if the controller cannot realistically link them to a person.
  • Direct identifiers or data that the organisation could reasonably use to single someone out will remain personal.
  • Judging identifiability becomes relative to each controller’s realistic capabilities.

This approach aligns with recent case law, including SRB v Edenred. It may reduce compliance obligations for analytics and telemetry datasets, but introduces subjectivity. Organisations will need strong documentation to justify how they assess identifiability.

Special Category Data: Direct Versus Inferred

The Omnibus narrows what is considered special category data under Article 9. Only data that directly reveals sensitive characteristics, such as health, religion or political opinions, would fall under the enhanced protections.

Inferences or predictions about sensitive traits, such as deducing health conditions through profiling, would not automatically count as special category data.

The proposals also allow limited exceptions for processing special category data to train or operate AI systems and for biometric data processed on user devices under strict conditions.

Right of Access (DSAR) Reform

The Omnibus provides controllers with stronger grounds to refuse or charge for requests that are abusive or manifestly excessive. This aims to reduce the burden of DSARs used strategically in litigation or to disrupt operations.

Although “abusive” is not tightly defined, the approach mirrors changes already seen in the UK under the Data Use and Access Act. UK organisations will still need clear internal criteria to avoid rejecting legitimate requests.

Breach Reporting Thresholds and Timescales

Under the existing GDPR, controllers must report any breach that risks individuals’ rights within 72 hours. The Omnibus proposes raising this threshold so that only high risk breaches must be reported, and extends the reporting window to 96 hours.

The proposals also introduce an EU wide incident reporting portal operated by ENISA. This would consolidate reporting under GDPR, NIS2, DORA and other frameworks.

UK breach reporting rules remain unchanged. Notifications must still be made without undue delay and within 72 hours unless UK legislation is updated in future.

DPIAs, Automated Decisions and Cookies

The Omnibus includes further measures intended to simplify and standardise compliance:

  • Harmonised DPIA and breach notification templates to be published by the EDPB.
  • Relaxation of restrictions on automated decision making when contractually necessary.
  • Broader exemptions under ePrivacy rules for analytics and security cookies.
  • Requirement for browsers and operating systems to respect user privacy preference signals once standards are established.

These measures would reduce the volume of consent banners and bring greater technical consistency to DPIAs and cookie compliance. This direction is similar to recent UK guidance on consent and preference management.

Opportunities and Risks

The Omnibus aims to create clearer legal grounds for AI development and reduce administrative burden for organisations. Many businesses welcome the potential for fewer overlapping obligations and more predictable compliance requirements.

There are also trade offs:

  • Narrowing the definition of personal data could create inconsistent protections across sectors.
  • Higher thresholds for breach reporting may reduce visibility of lower impact incidents.
  • DSAR reforms risk uncertainty without robust internal guidance.

For UK organisations, divergence between EU and UK regimes is likely to increase. This will require more precise policy alignment, updated data sharing contracts and consistent governance.

What UK GDPR Teams Should Do Now

  • Review data protection policies and contracts to reflect upcoming EU changes.
  • Update data maps and inventories to assess whether datasets may fall outside scope under the new definition.
  • Refine DSAR triage processes to identify abusive or excessive requests.
  • Monitor breach handling procedures to ensure EU and UK requirements remain aligned.
  • Keep track of regulatory developments from both the EU and UK.

Looking Ahead

The Digital Omnibus is still under negotiation by the European Parliament and Council. If adopted, it will represent a substantial shift in the EU digital regulatory landscape and highlight growing divergence from UK law following the DUAA.

Whether or not the UK adopts similar measures, any organisation operating across both jurisdictions will need to adjust its practices. Preparing early will reduce risk, support innovation and maintain compliance.

The Omnibus signals a wider regulatory trend. Policymakers are recalibrating privacy and digital governance for an AI driven economy. While some protections may narrow, many proposals aim to reduce friction and bring clarity for businesses. UK organisations should begin planning now to remain compliant and competitive.

Sources

What To Do If A Subject Access Request Uncovers a Data Breach

You’re handling a SAR and investigating the information requested by the data subject when you come across something more serious: a data breach.

In this article, we’ll discuss how SARs and data breaches interlink, which scenarios they might overlap, and what to do if this happens. 

How SARs and Data Breaches Overlap

A Subject Access Request is a right under GDPR that allows individuals to request their personal data from organisations. A data breach, on the other hand, is an incident that compromises the confidentiality, integrity or availability of personal data. 

SARs can reveal data breaches in two main ways:

  • The SARs response reveals unauthorised disclosure or access. 
  • The organisation fails to handle a SAR properly.

Common Scenarios Where SARs & Data Breaches Overlap

    1. Inadequate redaction of third-party data. This is a common and high-risk type of breach in which the organisation fails to properly redact or remove personal information from its records. This leads to the individual requesting their data receiving sensitive information about others, causing a breach.
    2. Failure to secure personal files. In the process of gathering data for a SAR, a company might discover that data from years earlier had been lost, but had never been reported. The SAR has revealed a data breach, forcing the company to confront the possibility that personal data may have been compromised. 
    3. Unauthorised access to emails. While investigating data for a SAR, a company might discover that an employee had previously fallen for a phishing attack, which compromised their email. The attacker could have stolen money, data or more.

Steps to Take If a Breach Is Discovered

If you’re investigating information and discover a breach, then there are a few steps you should immediately take. 

  1. Pause and assess: Don’t ignore the issue. Document everything.
  2. Contain the issue: Can the breach be stopped or mitigated?
  3. Conduct a quick impact assessment: Who is affected and how?
  4. Report internally to your DPO or data protection lead.

Ideally, keep SAR handling and breach investigations separate but coordinated. For more in-depth information, our guide “What Should You Do After a Data Breach? A Guide for Businesses” will touch on the steps you need to take in the event of a data breach. 

Legal and Regulatory Considerations

Reporting to the ICO

You should report a data breach to the ICO within 72 hours of becoming aware of it. Not all breaches are reportable – if you’re not sure, the ICO has a self-assessment tool to help you determine whether your organisation needs to report the breach. 

Informing the Data Subject

Similarly, if the data breach is likely to result in a high risk of adversely affecting their rights and freedoms, you should also inform the data subject and the ICO. 

Should You Pause the SAR Response?

Generally, you don’t need to pause the SAR response, but if the case is complex, you may be eligible for an extension.

Best Practices to Avoid Data Breaches & Handle SARs

A combination of strong technical security measures, staff training, clear policies and proper planning will put you in the best position for avoiding data breaches and handling SARs. This includes:

  • Data mapping and minimisation: Know what data you hold and why.
  • SAR simulation exercises: Test how your team would handle one.
  • Improve data hygiene: Routine audits and retention reviews.
  • Training: Ensure staff know how to spot and escalate issues.

Get SAR Support With Data Protection People

SARs can give you insights into your data ecosystem that you might never have discovered otherwise, and that includes data breaches. 

If SARs feel overwhelming – we can help. Whether you’re looking for someone to redact sensitive information or handle the SAR from start to finish, we offer the whole suite of SAR handling services. Talk to our data protection experts today.

Can You Charge for a Subject Access Request (SAR)?

SARs take up time and resources – but can you charge the individual requesting your effort? 

In this article, we’ll answer that question. We’ll discuss the exceptions where you can charge for a SAR and the rules and regulations governing those circumstances.

What the Law Says

GDPR law says that you must generally be provided free of charge. However, there are some exceptions where you can charge a “reasonable fee”. 

“Where requests are manifestly unfounded or excessive, in particular because of their repetitive character, the controller may either: (a) charge a reasonable fee taking into account the administrative costs of providing the information; or (b) refuse to act on the request.” – Article 12(5) UK GDPR

When Can You Charge for a SAR?

The two main circumstances where you can charge for a SAR are when the SAR is manifestly “unfounded” or “excessive”

“Unfounded” means that the individual clearly has no real intention of exercising their right, i.e. a request that’s made purely to cause disruption or harassment. This could be a former, disgruntled employee who makes a SAR every week to make as much work as possible for the company. 

An “excessive” SAR is one that is repetitive or requests a disproportionate volume of data with little value or justification. For example, you’re the owner of a small business, and a former worker requests all the information that you hold on them. An initial search results in 3,000 emails, which you may  consider burdensome on your resources to handle the request. 

What Does “Reasonable Fee” Mean?

The law says that you can charge a “reasonable fee” for these circumstances, if you choose to respond to the request (as opposed to refusing it outright). But what constitutes “reasonable”?

The fee should cover the administrative costs of dealing with the request, i.e.:

    • Staff time:
      • Assessing whether or not you’re processing the data
      • Locating, retrieving and extracting the data
      • Communicating the response to the individual, even if you’re not providing the data
    • Printing and postage
      • Or other associated costs of transferring the data
  • Cost of media (USB stick, CD, etc.)

You should charge fees in a proportionate and consistent way. It’s best practice to include a copy of the criteria you’re using to create the fee in your SAR policy, so you can justify the cost.

How to Handle SAR Fees

Best practice when handling subject access requests that might qualify for charging a fee:

    • Assess whether the request meets the criteria for a fee.
    • Inform the requester as soon as possible:
      • Explain why the request is excessive or unfounded.
      • Provide a fee estimate.
    • Document your decisions as you go along so you can provide reasoning to the ICO if necessary.
  • Pause the clock: the 1-month SAR response time doesn’t start until the fee is paid.

What Happens If You Get It Wrong?

You must be sure that charging for a SAR is justifiable – if you get it wrong, you could face punishment from the ICO or end up in court. An individual can complain to the ICO if they feel that you’re wrong to charge a fee, so it pays to be cautious.

One key example of a company getting it wrong is the case of Dawson-Damer v Taylor Wessing LLP, where the company withheld information and implied a fee should be charged. The court ruled that Taylor Wessing had not proven that the request was disproportionate, confirming that it is up to the data controller to demonstrate the request’s difficulty, not the other way around.

Need Help Reviewing a SAR?

Our experts can help with the full SAR lifecycle, from consulting on your processes to reviewing and redacting data to responding to the requests themselves. Get in touch today.

GDPR Radio – Digital Omnibus, Personal Data and SAR Reform

Digital Omnibus, Personal Data Changes and What They Mean for You

Episode 227 of the Data Protection Made Easy Podcast hosted by experts at Data Protection People. This episode was hosted live via Microsoft Teams in front of a live audience of listeners.

What We Covered in This Session

A Catch Up from Caine and Catarina

The episode opens with a look at what the team have been working on. Catarina reflects on a very busy week supporting a major client project alongside her team. Caine shares updates on ongoing STAIRs sessions for social housing providers and hints at an in person STAIRs event coming soon.

Both hosts also discuss their guest appearance on another organisation’s podcast where they explored how users understand privacy information, how organisations communicate their obligations and why cross functional training is so important.

The Digital Omnibus Package Explained

The main focus of the episode is the European Commission’s Digital Omnibus package, announced on 19 November. The discussion highlights several of the most significant proposals, including:

1. A New Approach to Personal Data

The proposal introduces a major shift. Information would be classed as personal data only if the controller has means reasonably likely to identify the individual.
The team explore:

  • how this could narrow the scope of personal data
  • what this means for indirect identifiers and pseudonymised data
  • how case law from Europe is already pushing towards this direction
  • how this might affect UK organisations if mirrored in future reforms

2. Changes to Data Breach Reporting

Catarina outlines proposals that:

  • raise the threshold so only high risk breaches need regulator notification
  • extend the deadline from 72 to 96 hours

Caine questions whether reducing low risk reporting could hide patterns of poor practice and the group debate what this means for real world compliance.

3. Reforms to Cookie Rules

The Digital Omnibus seeks to simplify cookie requirements by reducing reliance on consent for low risk purposes such as security and aggregated analytics. The team draw comparisons with the UK DUA Act and consider how consent fatigue has shaped this direction.

Insights from Guest Contributor David Appleyard

David shares two important observations:

1. SAR Purpose Tests

Under the new proposals, organisations may reject or charge for a SAR if the purpose is not to access personal data, for example in an employment dispute. This could be a significant change for many organisations that currently process large volumes of tactical or grievance based SARs.

2. High Risk AI Processing

David explains that the EU is pushing back deadlines for identifying high risk AI processing due to a lack of clear guidance, with expectations now set for no later than December 2027.

CNIL Research on Selling Personal Data

Caine introduces a study from the CNIL which found that 65 percent of surveyed French citizens would sell their personal data for between 1 and 100 euros. The hosts explore:

  • why people undervalue their own data
  • how advertising, profiling and AI training increase the true value
  • the growing need for public awareness and transparent communication

Looking Ahead

The session closes with a reminder that the next podcast will explore data retention, followed by an update that the team are working on the new in house DPP studio.

About the Data Protection Made Easy Community

Our podcast community is one of the most active privacy networks in the UK with more than 150 regular live attendees and over 1,600 subscribers across all audio platforms. Joining the community gives you access to:

  • free weekly live sessions with the chance to ask questions
  • practical guidance from experienced consultants
  • early access to slides and resources
  • networking with other privacy and security professionals
  • invites to in person events, workshops and sector focused discussions
  • exclusive content only available to our community members

Attending live offers clear benefits. You can join the conversation, shape the discussion, raise real world challenges and take part in polls, chat and Q and A. Many listeners tell us they get far more value from attending live than listening back later.

We also have a strong line up of sessions taking us through to the end of the year, covering topics such as data retention, AI risk, international transfers, STAIRs, marketing compliance and more.

If you are not yet part of the Data Protection Made Easy community, you can join for free and get involved straight away.

Subject Access Requests in Practice, Community Q and A

Subject Access Requests in Practice, Community Q and A

After our first SARs session, we picked up the phone and asked our listeners what they struggle with most in real life. They shared questions, tricky scenarios and points of disagreement. In this follow up episode of the Data Protection Made Easy podcast, Caine Glancy and Oluwagbenga Onojobi work through those issues live with members of our community.

What we discussed

In this session we explore:

  • Where to draw the line on property information as personal data in social housing
  • How far to go when providing repair history and tenancy records
  • SARs linked to disrepair claims, when to push back and when to provide more to be helpful
  • Redacting staff names in emails and HR files, and what counts as excessive redaction
  • How different organisations approach employment SARs and grievances
  • Using the third party exemption to protect staff and witnesses
  • Applying a reasonable and proportionate search so you focus your effort where it matters most
  • The importance of documenting decisions and communicating clearly with data subjects

Listeners share how they handle these issues in housing and HR, which gives a rounded view of what is happening on the ground, not just what the legislation says.

Who this session is for

  • Data Protection Officers and privacy leads
  • SAR handlers and information governance teams
  • Housing providers dealing with disrepair and complaint driven SARs
  • HR professionals managing employment SARs and grievances

If you are trying to balance transparency with protecting third party rights, you will find this discussion especially useful.

Listen back and join the community

You can listen back to this episode now on Spotify and all major podcast platforms.

If you are not yet part of the Data Protection Made Easy community, complete our contact form and ask to join. Membership is free. You will receive a weekly invite to our live Friday sessions, access to visual materials, and ongoing support from over 1,500 like minded data protection practitioners.

Coming up next, GDPR Radio

This week our live Friday session is a GDPR Radio episode. Caine, Catarina and the team will be back to look at the latest news, enforcement action and real world challenges from across our community. If you would like to receive an invite, fill in our contact form and the team will add you to the mailing list.

Cookies in 2025 – Trick or Treat, Part Two

Cookies in 2025 – Trick or Treat, Part Two

This Halloween special of the Data Protection Made Easy Podcast dives into two hot topics, consent or pay and cookieless advertising. Watch or listen on demand below.

Recorded: Friday 7 November 2025

Hosts: Catarina Santos with guests Oluwagbenga Onojobi (Gbenga) and Holly Miller, cameo from Phil Brining

In this 30 minute session we focus on the implications of consent or pay under UK GDPR and what the move to cookieless advertising means in practice. We also touch on recent regulatory opinions and enforcement trends. The aim is simple, give you practical clarity that reduces risk without hurting conversions.

What we cover

  • The implications of consent or pay under UK GDPR and related data protection principles
  • How the transition to cookieless advertising affects the lawful use of personal data
  • Recent regulatory opinions and enforcement trends in the adtech space

Key takeaways

  • A clearer understanding of the data protection framework as it applies to modern advertising
  • Insights into compliance risks and regulator expectations
  • Discussion of the challenges organisations face when aligning commercial practices with data protection law

Your hosts

Catarina Santos with guests Oluwagbenga Onojobi (Gbenga) and Holly Miller, cameo from Phil Brining.

Join the Data Protection Made Easy community

One of the UK’s largest data protection communities, more than 1,500 subscribers, over 200 episodes on major audio platforms. Join for free, get weekly live invites, monthly newsletters, and first access to in person events.

Subscribe for free

Missed Part One

If you missed our first conversation on cookies, you can catch up on that episode, along with more than 200 others, on the Data Protection Made Easy Podcast.

Listen to Part One


UK Cookies in 2025

Data Protection Made Easy Podcast: Cookies in 2025, What Changes and What To Do Now

Hosts, Catarina Santos with guests Oluwagbenga Onojobi (Gbenga) and Holly Miller. A brief cameo from Phil Brining.

Episode overview

In this 30 minute session we explain what cookies are, how the main types work, and what the 2025 UK reforms mean in practice. We look at PECR and UK GDPR, rising enforcement in Europe, consent or pay models, fingerprinting, Google Topics API, and the differences between the UK and EU approaches. The goal is simple, give you clear next steps that reduce risk without killing conversions.

Listen now

Also available on all major platforms, Spotify, Apple Podcasts, Audible, and popular Android apps. Many DPOs tell us they listen back on walks, in the gym, or while cooking, so feel free to enjoy this one at your leisure.

What we cover

  • Cookies 101, first party, third party, strictly necessary, functionality, performance, and tracking.
  • Hot topics, Google Topics API, cookie less advertising, fingerprinting, consent or pay models.
  • Rules that matter, PECR and UK GDPR basics, lawful consent, transparency, and user choice.
  • 2025 UK changes, low risk cookie exemptions, higher fine levels, and the ICO consultation.
  • UK vs EU, where approaches differ, how to handle cross border users, and common pitfalls.

Practical takeaways

  • Give Reject all equal prominence, avoid pre ticked boxes, explain purposes in plain English.
  • Keep a cookie register, map scripts to purposes, owners, and retention.
  • Update your cookie policy and link it clearly in the footer, keep a separate document from the privacy notice.
  • Record consent events, banner version, time, and preferences, and honour withdrawal with no detriment.
  • If you operate in the EU, follow the stricter position where needed, and use geo logic carefully.

Stay connected

You can always get in touch via our website or on LinkedIn. If you enjoy the podcast, share it with a colleague who looks after cookies, consent, or analytics.

Data Protection Made Easy is one of the UK’s largest data protection communities, over 1,500 subscribers, with more than 200 episodes available on major audio platforms.

Our Events & Webinars

Industry Leading Discussions

We host events on a weekly basis for the community of data protection practitioners and have built up a network of over 1200 subscribers, who tune in each week to listen to discussions about the hot topics from the fast-paced and evolving world of data protection and cyber security. Check out our upcoming events and become part of our growing community.

View All
The Next Step Preparing For Stairs
05 February 26 9:00 - 1:00 pm

The Next Step: Preparing for STAIRs

GDPR RADIO

GDPR Radio- Episode 230

Get Support With Data Protection And Cyber Security

Our mission is to make data protection and cyber security easy: easy to understand and easy to do. We do that through the mantra of benchmark, improve, maintain.