Course:
GDPR Module 3: Key Changes, Concepts and Processing Conditions
Arrow back

How does the GDPR differ from the Data Protection Act (1998)?

GDPR Module 3: Key Changes, Concepts and Processing Conditions

How does the GDPR differ from the Data Protection Act (1998)?

GCHQ Certified
Included in…
Bob's CultureBob's Compliance
You’ll be able to…

Recognise the differences between the Data Protection Act (1998) and the GDPR.

Understand the concept of “legitimate interest”.

Course overview

About the course

Many of the GDPR’s concepts are not far from those outlined in the Data Protection Act (1998). However, there are a number of key changes and concepts you need to be aware of as they affect the way your organisation holds and processes personal data. This module helps your team understand those crucial differences.

GDPR Module 3 eLearning Course
GDPR Module 3

Our GDPR Suite is a collection of 9 courses, designed to teach your workforce about the principles of GDPR, their responsibilities within it and more - all with our signature approachable style.

GDPR Module 3 eLearning Course
GDPR Module 3

Our GDPR Suite is a collection of 9 courses, designed to teach your workforce about the principles of GDPR, their responsibilities within it and more - all with our signature approachable style.

Versions available

  • UK
  • EU
  • EU Combination UK/EU

What’s covered

  • What the changes the GDPR makes to data protection regulation.
  • Legitimate interests.
  • Data minimisation.
  • What data protection by design and default means.
  • Processing conditions.

Learning outcomes

By the time you complete the GDPR Module 3: Key Changes, Concepts and Processing Conditions, you should be able to:

Identify

  • The key changes that the GDPR makes.
  • What legitimate interest and data minimisation mean in relation to the GDPR.

Understand

  • Correct processing conditions.
Recognised excellence

Course accreditations

In association with National Cyber Security Center

The GDPR Module 3: Key Changes, Concepts and Processing Conditions course is accredited by the National Cyber Security Centre.

Our learning methodology

The Bob’s Business way

Bob’s Business courses are built on the twin principles of behavioural science and psychology to deliver truly exceptional results to organisations of all sizes, across the public and private sectors.

Simple, actionable advice
Simple, actionable advice

We choose to use clear language and simple, actionable advice in our courses to help lock in positive behaviours.

Simple, actionable advice
Simple, actionable advice

We choose to use clear language and simple, actionable advice in our courses to help lock in positive behaviours.

High-quality course design
High-quality course design

Our courses are built in house by our dedicated team and use animations, storytelling and a cast of unique characters for training people actually want to take.

Online learning
Online learning

Every Bob’s Business course is powered by online learning and hosted on an included LMS, which enables users to take our courses at any time, on any device.

Included reinforcement
Included reinforcement

Each course comes with a dedicated Reinforcement Pack, with up-to 18 included materials like screensavers, blog posts, email footers and more to drive home the key messages of each course and help make new behaviours permanent.

Ready to build your cybersecurity culture?

Whether you’re looking for complete culture change, phishing simulations or compliance training, we have solutions that are tailor-made to fit for your organisation.

Girl with laptop
Boy with laptop
man and woman with laptops
ISO27001
ISO9001
Global Cyber Alliance