About

Data Protection Procedures: From Collection to Deletion

Data Protection Procedures: From Collection to Deletion
Published on 1/23/2026

Most organisations can point to a privacy policy. Fewer can show the day-to-day data protection procedures that make that policy real, across every team, system, and spreadsheet.

In Jamaica, where the Data Protection Act has pushed privacy from “good practice” into a board-level compliance topic, procedures are the difference between:

  • A privacy programme you can evidence during an audit, investigation, vendor review, or incident.

  • A set of documents that look good until something goes wrong.

This guide walks through practical, end-to-end procedures across the data lifecycle, from collection to deletion, with a focus on what Jamaican organisations need to do, document, and prove.

Start with the lifecycle (so procedures match reality)

Data rarely sits in one place. It moves from web forms to email inboxes, from HR folders to payroll systems, from call recordings to customer support platforms, and into vendor environments. Good procedures follow that movement.

A simple way to structure your operating model is to define procedures for each lifecycle stage and assign clear ownership.

Lifecycle stage

What can go wrong

What a good procedure produces (evidence)

Collection

Over-collection, unclear purpose, weak notices

Approved form fields, privacy notice, consent records (if used), collection logs

Use (internal processing)

Unauthorised access, function creep

Access rules, training records, system logs, change approvals

Sharing (external disclosure)

Vendor misuse, uncontrolled onward transfers

Due diligence records, signed agreements, transfer assessments

Storage & security

Breach, ransomware, lost devices

Security baseline, asset register, patching and backup evidence

Rights handling

Missed deadlines, inconsistent responses

Request workflow, identity verification, decision records

Retention

Data kept “just in case”

Retention schedule, legal hold process, periodic reviews

Deletion & disposal

Data recoverable, backups ignored

Deletion tickets, disposal certificates, exceptions register

A simple data lifecycle diagram showing seven stages in a circular flow: collect, use, share, store and secure, handle rights, retain, delete and dispose. Each stage has a small icon (form, gears, handshake, lock, document, calendar, trash).

Procedure 1: Collection, get it right at the door

Collection is where many compliance issues begin, especially with online forms, onboarding packs, CCTV, and ad hoc “send me your ID” email requests.

1) Define the purpose before you build the form

Your collection procedure should require a short purpose statement that answers:

  • Why are we collecting this data?

  • Which business process uses it?

  • Who will access it?

  • How long will we keep it?

This prevents scope creep later (for example, using onboarding documents for unrelated analytics).

2) Minimise fields and set “must have” rules

Operationally, minimisation means you do not ask for fields unless someone can justify them.

Common high-risk collection points in Jamaica include:

  • Job application forms and CV intake (IDs, TRN, references)

  • Customer onboarding and KYC (IDs, proof of address)

  • Schools and youth programmes (children’s data)

  • Health-related information for workplace fitness, sick leave, or insurance administration

A strong procedure includes a review gate: if a team wants to add a new data field, they submit a change request and get approval from the appropriate privacy or compliance owner.

3) Standardise your notice wording

Your privacy notice does not need to be “legalese”, but it must be consistent. A collection procedure should point staff to approved notice templates for:

  • Websites and apps

  • Paper forms

  • Call centre scripts

  • CCTV signage

If different departments write their own mini-notices, transparency becomes inconsistent and difficult to defend.

4) Treat consent as a controlled tool, not a default

Many organisations overuse consent when another lawful basis would be more appropriate for routine operations. Your procedure should spell out when consent is permitted, who approves it, and how withdrawal is handled.

If you do use consent, build it like a system:

  • Record what the person was told at the time

  • Record the choice and timestamp

  • Make withdrawal as easy as opt-in

Procedure 2: Internal use, control access and prevent “function creep”

Once data is collected, the biggest risk is usually internal: too many people can see too much, for too long.

Access control procedure (minimum standard)

A practical access procedure is often the fastest risk reducer because it is measurable.

Include these elements:

  • Role-based access: access granted by job role, not by individual preference.

  • Joiner, mover, leaver steps: access granted at onboarding, reviewed on role change, removed immediately on exit.

  • Periodic access reviews: managers re-certify access for their teams.

  • Logging and monitoring: key systems retain access logs for investigation and accountability.

If you are aligning with recognised frameworks, the NIST Privacy Framework can help structure privacy controls alongside security and risk management.

Staff procedure for “reasonable use” of personal data

Even with good system controls, staff behaviour matters. Your internal use procedure should be backed by training and simple rules that reduce everyday exposure:

  • Do not export customer lists unless there is an approved business need.

  • Do not move personal data into WhatsApp groups for convenience.

  • Do not store IDs, TRNs, or health data in personal inboxes.

  • Use approved collaboration tools with controlled access.

Procedure 3: Sharing and vendors, make disclosure defensible

Third-party processing is one of the hardest areas to evidence because the risk lives outside your walls.

A share-and-disclose procedure should cover both:

  • Controller-to-controller sharing (you disclose to another organisation).

  • Controller-to-processor arrangements (a vendor processes on your instructions).

Build a “no contract, no data” rule

A practical standard is: no personal data is shared with a vendor until minimum contractual and due diligence requirements are met.

Vendor scenario

Typical example

Minimum procedural requirements

Cloud hosting or SaaS

HR system, CRM, call centre platform

Due diligence, contract terms, access controls, retention and deletion commitments

Outsourced operations

Payroll processing, customer support

Written instructions, confidentiality, sub-processor controls, audit rights (where feasible)

Professional services

Legal, accounting, consultants

Confidentiality obligations, secure transfer method, retention expectations

Marketing partners

Email campaigns, ad platforms

Approved lawful basis, opt-out handling, suppression lists, clear roles

If you operate across borders or use cloud services, build a transfer checkpoint into the procedure: document where data is stored, who can access it, and what safeguards apply.

For organisations building a broader governance approach, PLMC’s resources on compliance planning can complement this, for example the Data Protection Jamaica: Compliance Roadmap for 2026.

Procedure 4: Storage and security, make protection repeatable

Security controls fail when they depend on individual heroics. Procedures convert security into repeatable operations.

Create a simple classification and handling rule

You do not need an overly complex scheme. Many organisations do well with three tiers:

  • Public

  • Internal

  • Confidential (personal data and sensitive information)

Then map each tier to handling requirements such as encryption, sharing methods, and approval gates.

Minimum security procedure elements (privacy-relevant)

Your storage and security procedure should at least define:

  • Device security (screen locks, encryption, lost device reporting)

  • MFA requirements for remote access and admin accounts

  • Patch management and vulnerability handling

  • Backup standards and restoration testing

  • Physical security for paper files and office storage

  • Secure configuration for email forwarding and shared mailboxes

If you want a privacy-focused extension to an ISO security programme, ISO/IEC 27701 is widely used as a privacy information management standard layered on ISO/IEC 27001.

Procedure 5: Rights requests, build a workflow you can run under pressure

Individuals’ rights are where many organisations struggle because the work cuts across systems, teams, and vendors.

A good rights-handling procedure should be designed so it still works when:

  • The request arrives through an unusual channel (social media message, call centre, branch office).

  • The request is unclear or overly broad.

  • The data is spread across multiple systems and vendors.

Rights handling workflow (operational version)

Define a consistent internal flow:

  • Intake and logging: capture the request, channel, date, and case owner.

  • Identity verification: confirm the requester is the data subject (or authorised agent).

  • Scoping: identify systems, departments, and vendors that may hold the data.

  • Search and collection: retrieve records in a controlled way.

  • Review and decision: apply any legal limits or exemptions, document reasoning.

  • Response: provide the response securely and consistently.

  • Close-out: record what was provided, when, and any follow-up actions.

The core principle is consistency and auditability. You want to be able to show that two similar requests were handled in the same way, regardless of who received them.

If you need a broader baseline of privacy obligations and terminology for staff, PLMC’s guide Jamaica Data Protection Act Explained for Businesses can support internal awareness.

Procedure 6: Retention and deletion, turn “storage limitation” into a schedule

Most organisations do not intentionally hoard data. It happens because nobody owns retention decisions and deletion is inconvenient.

A defensible retention and deletion programme needs two linked components:

  • A retention schedule (what to keep, why, and for how long)

  • A deletion and disposal procedure (how data is actually removed)

Retention schedule procedure

Retention must reflect real drivers, including:

  • Legal and regulatory requirements

  • Contractual requirements

  • Limitation periods and dispute risk

  • Operational needs (for example, warranty claims)

Instead of arguing about exact time periods in a vacuum, structure the discussion around record categories and triggers.

Record category

Examples

Common retention drivers to document

Employment records

Contracts, disciplinary files, leave records

Employment law obligations, dispute resolution needs, audit readiness

Finance and tax records

Invoices, receipts, payroll summaries

Tax and accounting requirements, statutory audits

Customer service records

Complaints, call notes, tickets

Service quality, dispute resolution, regulatory complaint handling

Security and access logs

Door access, system logs

Investigation needs, security monitoring, incident response

Marketing lists

Mailing lists, preferences

Consent or opt-out evidence, suppression list management

Your retention procedure should also include a legal hold step: when litigation, investigation, or regulatory review is reasonably expected, deletion pauses for relevant records, with approvals documented.

Deletion and disposal procedure (what “done” looks like)

Deletion is not one action. It differs by system type.

Your procedure should define how you handle:

  • Business systems: delete or anonymise records, capture a deletion ticket or log.

  • Shared drives: enforce retention folders, periodic clean-ups, access restrictions.

  • Email: mailbox retention rules, limits on forwarding, controlled archiving.

  • Backups: define what you do and do not delete from backups, and how long backups are kept.

  • Paper records: shredding, secure bins, disposal certificates from service providers.

An office secure-disposal scene with a locked shredding console, sealed disposal bins, and labelled file boxes awaiting destruction. No visible personal data on documents.

A practical deletion procedure also includes an exceptions register. If data cannot be deleted immediately (for example, due to system limitations), document the reason, compensating controls, and the plan to fix it.

Procedure 7: Breaches and incidents, prepare for the worst day

Incidents are not only hacking. They include misdirected emails, lost laptops, unauthorised database access, and public disclosures.

A breach procedure should be tested, not just written. At minimum, it should define:

  • What counts as a privacy incident (with examples relevant to your operations)

  • Who staff must notify immediately

  • Triage steps (containment, recovery, evidence preservation)

  • Risk assessment steps (what data, how many people, likely harm)

  • Notification decision-making and approvals (including regulator and affected individuals where required)

  • Post-incident corrective actions and training

This is also where privacy and cyber security must meet. If you handle both through a single response playbook, you move faster and document better.

Assign ownership, otherwise procedures do not operate

Procedures fail most often because accountability is unclear. Even small organisations can assign clear roles, even if one person wears multiple hats.

A lightweight RACI model helps teams act without delay.

Activity

Business owner

IT/security

HR

Compliance/privacy lead

Vendor manager

Approve new collection fields

R

C

C

A

C

Access provisioning and reviews

C

R

C

A

C

Vendor onboarding and contracts

C

C

C

A

R

Rights request handling

C

C

C

R/A

C

Retention schedule review

R

C

R

A

C

Deletion and disposal execution

R

R

R

A

C

(As a reminder: Responsible does the work, Accountable owns the outcome, Consulted provides input.)

Measure what matters, so you can prove improvement

If you want your procedures to hold up under scrutiny, pick a small set of metrics that show control maturity over time.

Examples that are practical in 2026:

  • Percentage of systems and key spreadsheets included in the data inventory

  • Percentage of vendors with completed due diligence and signed data protection clauses

  • Time to close rights requests (tracked against your internal target and legal requirements)

  • Access review completion rate for high-risk systems

  • Percentage of staff completing privacy training by role

  • Number of overdue deletion actions and documented exceptions

Metrics are also useful for boards and senior leadership because they translate “privacy risk” into operational visibility.

Put it into action with templates and a realistic rollout

If you already have high-level compliance guidance, convert it into a procedure pack that teams can actually use:

  • Collection and notice procedure (with approved templates)

  • Access control and internal use procedure

  • Vendor and sharing procedure

  • Rights request workflow

  • Retention schedule and deletion procedure

  • Incident response procedure (privacy integrated)

For a practical baseline you can align to, PLMC’s Privacy and Data Protection: A Practical Checklist is a useful companion, then this article helps you turn that checklist into operational steps.

Need help building data protection procedures that stand up to scrutiny?

PLMC supports Jamaican organisations with data protection implementation, GRC integration, risk assessment tools, and training that turns requirements into repeatable operations. If you want to map your data lifecycle and build procedures from collection to deletion, you can start with a free consultation via Privacy & Legal Management Consultants Ltd..