General Data Protection Regulation course

Key takeaways.

  1. GDPR starts with definitions and context: identifiability is not limited to names.

  2. “You can’t protect what you can’t map” is the practical foundation of the data lifecycle.

  3. Controllers own accountability even when processors and vendors do the work.

  4. Processing is an everyday activity; each flow needs a clear purpose and lawful basis.

  5. Data minimisation and purpose limitation reduce both risk and operational noise.

  6. Retention discipline matters: keeping data “just in case” is a liability without justification.

  7. Consent must be specific, unbundled, and reversible; dark patterns increase risk.

  8. Rights requests are operational: verify identity, respond consistently, and keep secure logs.

  9. Accountability is a system: policies, training, least privilege, vendor reviews, and change logs.

  10. Incidents require calm structure: contain first, preserve evidence, document decisions, then learn and harden controls.

 

In-depth breakdown.

sGeneral Data Protection Regulation [WC - C10] turns GDPR from a legal acronym into a working system. It starts with core definitions: personal data can identify someone directly or indirectly, and “sensitive data” increases risk and therefore control requirements. The course stresses that context matters, an identifier can be personal data even without a name, and that strong compliance begins with lifecycle mapping: what is collected, where it is stored, how it is used, who it is shared with, and when it is deleted.


Next, it clarifies roles: controllers decide purpose and means; processors act on behalf of controllers. Even with third-party tools, responsibility does not vanish, contracts, access control, and ownership of decisions become operational necessities. Processing activities are framed as the everyday flows teams actually run: forms, newsletters, analytics, support, and vendor handoffs, each needing a clear purpose, lawful basis, and retention rule.


The course then covers data protection principles and individual rights (access, rectification, erasure, restriction, portability), focusing on response discipline: verification, timelines, consistent templates, and secure logging. Finally, it addresses accountability, policies, training, vendor risk, least privilege, and retention automation, before moving into breaches and incident basics: containment first, preserve evidence, communicate with structure, and convert root causes into preventative controls.

 

Course itinerary.

    • Core definitions

    • Controller vs processor

    • Processing activities

    • Data protection principles

    • Individual rights

    • Responsibilities for compliance

    • Common myths debunked

    • Penalties for non-compliance

    • Practical steps for compliance

    • Lawful bases overview

    • Consent vs contract vs legitimate interests

    • Choosing appropriately

    • Documentation mindset

    • Consent handling basics

    • Cookie categories

    • Avoiding dark patterns

    • Practical implications of GDPR

    • Key takeaways

    • Rights overview

    • Portability and objection

    • Response discipline

    • Identity verification basics

    • Logging requests

    • Timelines and consistency

    • Understanding data subject rights

    • Compliance and governance

    • Tools for GDPR compliance

    • Organisational responsibilities

    • Practical accountability

    • Policies and training

    • Vendor management

    • Record-keeping mindset

    • Access control and least privilege

    • Retention discipline

    • Third-party tools and risk

    • Accountability and compliance

    • What constitutes an incident

    • Communication essentials

    • Common scenarios of data breaches

    • Containment mindset

    • Recovery and learning loop

    • When escalation matters

    • Documentation habits

    • Preventing repeats

    • Conclusion and next steps

 
View lectures
 

Course requirements.

The requirements necessary for this course include:

Technology

You need a computer/smart device with a decent internet.

Account

No account is required as the lectures are free to view.

Viewing

This course is taught via a blog article format.

Commitment

You will need to dedicate time and effort, at your own pace.

 

Frequently Asked Questions.

What counts as personal data under GDPR?

Any information that can identify a person directly or indirectly, including identifiers that become identifying in context.

Does GDPR only apply to companies in the EU?

No. It can apply globally if an organisation processes personal data relating to individuals in the EU/EEA in relevant contexts.

Are small businesses exempt from GDPR?

No. Obligations scale with risk and activity, but GDPR principles still apply.

Is GDPR just about consent?

No. Consent is one lawful basis; others include contract and legitimate interests, depending on purpose.

Do organisations need to delete all data on request?

Not always. Erasure depends on conditions and lawful grounds; some data must be retained for legal or contractual reasons.

What’s the difference between anonymised and pseudonymised data?

Anonymised data cannot be re-identified; pseudonymised data can be re-identified with additional information, so it remains regulated.

What should a basic processing record include?

Activity, data categories, purpose, lawful basis, retention, systems, vendors, access controls, and change history.

How should consent be implemented to avoid risk?

It must be an active opt-in, unbundled by purpose, clearly explained, and as easy to withdraw as to give.

How should teams handle data subject access/erasure requests efficiently?

Use a request register, identity verification proportional to risk, templates for consistent responses, internal deadlines, and a cross-system search process.

What is the first priority during a suspected personal data incident?

Containment: stop ongoing access (sessions, passwords, keys), remove exposed links, preserve evidence, assign an owner, and then assess scope before statements.

 
Luke Anthony Houghton

Founder & Digital Consultant

The digital Swiss Army knife | Squarespace | Knack | Replit | Node.JS | Make.com

Since 2019, I’ve helped founders and teams work smarter, move faster, and grow stronger with a blend of strategy, design, and AI-powered execution.

LinkedIn profile

https://www.projektid.co/luke-anthony-houghton/
Previous
Previous

Website Legal Arrangements course

Next
Next

General And Local Security course