If you provide guest WiFi at your business you need to be compliant with the legislation that is in place. Unfortunately, this is something that a lot of companies overlook, and they are putting themselves at serious risk of large fines and reputational damage. Luckily, when you choose the Retail Secure solution this is something you do not need to worry about, as full compliance is guaranteed. So, let’s take a look at the laws that you need to adhere to…
The Data Retention Act 2009 states that all businesses most keep a hold of WiFi communications for a minimum of 12 months. It also outlines the manner in which you must retain data, as it is essential to label it correctly, including the likes of data type and destination. This ensures that all data can be traced effectively.
The next piece of legislation you need to be concerned with is the Data Protection Act 1998. This is important in terms of the way you use and store data. It outlines the security measures that you need to take while also stating that you must provide an individual with the information you have about them if they request it. If you do not comply with the Data Protection Act 1998, you could find yourself facing fines as high as £500,000.
The Digital Economy Act 2010 is the next piece of legislation that needs to be taken into account. This relates to the use of copyright material. If someone uses your WiFi network to download a copyright film, you will find yourself in trouble if you have not taken the necessary steps outlined in the Digital Economy Act. This includes notifying the subscriber if there has been a copyright infringement. It is vital that all communication is traceable so you can easily find out who has been using your WiFi network for things they shouldn’t. This is something that is really being clamped down on at the moment, with punishment ranging from £5,000 to a maximum of ten years in prison.
Last but not least, while the use of WiFi networks for illegal activity is not as common, it does still happen and is, therefore, something you need to take very seriously. If someone has used your network to access the likes of child pornography or websites relating to terrorism, you need to make sure they can be traced on your network.