Trump resort will not be charged for breaching data laws

Presidential hopeful's Scottish golf course failed to register under the Data Protection Act for four years

Donald Trump's Aberdeenshire golf resort will not be investigated or prosecuted, despite failing to register with the Information Commissioner's Office under the Data Protection Act.

Every company that handles personal information is required by law to register under the DPA, but Trump International Golf Links Scotland, established in 2012, failed to do so until Thursday, the ICO told IT Pro.

The hotel and golf course complex has now registered under the act, and the data privacy watchdog says that it has no intentions of prosecuting the organisation for its four-year lapse.

"Where data controllers respond to advice from the ICO that they need to notify and complete the registration process," a spokesperson said, "it generally would not be a proportionate response to then commence a prosecution.

"We treat those that we regulate in a consistent way and to pursue the golf course in these circumstances would be inconsistent to how we have dealt with others in similar circumstances."

However, an ICO spokesman pointed out to IT Pro that just because an organisation is registered under the Data Protection Act does not mean that it is automatically compliant with it. Trump's resort could still find itself in hot water if it does not take adequate steps to ensure the security of its' customers' data.

The company, which claims to have hosted tens of thousands of guests, told The Guardian that the lack of registration was a "clerical oversight".

"We take the security of our employees and guests' personal data very seriously," a statement read, "and comply with all aspects of the Data Protection Act."

Featured Resources

How to scale your organisation in the cloud

How to overcome common scaling challenges and choose the right scalable cloud service

Download now

The people factor: A critical ingredient for intelligent communications

How to improve communication within your business

Download now

Future of video conferencing

Optimising video conferencing features to achieve business goals

Download now

Improving cyber security for remote working

13 recommendations for security from any location

Download now

Recommended

Microsoft Exchange targeted by China-linked hackers
zero-day exploit

Microsoft Exchange targeted by China-linked hackers

3 Mar 2021
Malicious ‘dependency confusion’ packages are stealing password files
hacking

Malicious ‘dependency confusion’ packages are stealing password files

2 Mar 2021
What is the Computer Misuse Act?
Policy & legislation

What is the Computer Misuse Act?

2 Mar 2021
What is cloud-to-cloud backup?
cloud backup

What is cloud-to-cloud backup?

1 Mar 2021

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

26 Feb 2021
How to connect one, two or more monitors to your laptop
Laptops

How to connect one, two or more monitors to your laptop

25 Feb 2021
Ransomware operators are exploiting VMware ESXi flaws
ransomware

Ransomware operators are exploiting VMware ESXi flaws

1 Mar 2021