Piyo ๐Ÿฃ: "I'm filming a construction site with my drone. Can I see into the neighbor's garden in the background? Is that legal?"

1. UK GDPR (Data Protection)

Applies if your drone captures:
  • People's faces (identifiable)
  • Vehicle registration numbers (tracked back to owner)
  • Property details (identifying private land)
  • License plates (personal data)

Your responsibility: Process data lawfully, transparently, securely.

2. Privacy Act 2020 (Right to Privacy)

Protects: Reasonable expectation of privacy in own home/property Consequence: Filming into someone's garden/bedroom without consent = breach of privacy (civil action possible)

3. CAA Regulations

What is "Personal Data" in Drone Context?

Captured Personal Data Examples

Data Is It Personal Data? Why
Face of person โœ… YES Directly identifies individual
License plate (readable) โœ… YES Links to vehicle owner (traceable)
Registration address (visible) โœ… YES Identifies residential location
Garden/private property โš ๏ธ MAYBE Depends on identifying features
Crowd in public space โš ๏ธ MAYBE Identifiable faces = personal data
Empty landscape/buildings โŒ NO No individuals identifiable
Thermal image of person โœ… YES Can identify heat patterns unique to person

Key Rule

You Need One of Six Legal Bases to Process Personal Data

Legal Basis Applies to Drones? Example
Consent โœ… YES "I filmed this event with participants' signed consent"
Contract โœ… YES "Client hired me to film their property; contract includes data processing"
Legal obligation โœ… YES "Police drone operation under warrant"
Vital interests โŒ RARELY Emergency rescue (very narrow)
Public task โœ… YES "Local authority environmental monitoring"
Legitimate interests โš ๏ธ MAYBE Balancing test required (difficult for drones)

For Commercial Drone Work: Typical Legal Bases

Consent (most common):

`` "I filmed this wedding with the bride & groom's written consent, plus guest consent forms signed at venue entry." `

Contract (second most common):

` "Client contracted me to survey their commercial property. Data processing clause in contract covers this." `

Legitimate interests (difficult):

` "I filmed the building exterior for asset management. My interest (conducting survey) balances against privacy risk." โ†’ NOT recommended without consent backup

Practical Compliance: Step-by-Step

Before Filming

1. Identify what personal data you'll capture
  • [ ] Will drone see into neighbors' gardens? (NO = start drone at higher altitude)
  • [ ] Will people's faces be identifiable? (YES = get consent or blur)
  • [ ] Will license plates be readable? (YES = blur before storing)

2. Establish legal basis
  • [ ] Client consent? (Get written consent agreement)
  • [ ] Contract? (Include data processing clause)
  • [ ] Public task exemption? (Rare; government agencies only)

3. Prepare privacy notice
  • [ ] Inform anyone being filmed (notice board at venue, email, signed consent)
  • [ ] Explain: what data, how it's used, how long it's kept, who can access

4. Plan data security
  • [ ] Where will footage be stored? (encrypted cloud, external drive)
  • [ ] Who has access? (client, contractor, operators only)
  • [ ] How will it be deleted? (shredding, secure erasure software)

During Filming

  • [ ] Avoid unnecessary faces (pan away from unrelated people)
  • [ ] Avoid filming into private properties (gardens, windows)
  • [ ] Avoid zooming into license plates (unless essential for job)
  • [ ] Stop if someone objects (legal right to refuse being filmed)

After Filming

  • [ ] Store securely (encrypted cloud, password protection)
  • [ ] Restrict access (client only, not shared publicly)
  • [ ] Blur faces (if footage will be published/shown publicly)
  • [ ] Retain only as long as needed (delete after project completion + 1 month)
  • Written Consent Template (for events)

    ` CONSENT FORM - DRONE FILMING Event: [Wedding/Sports Event/Corporate/etc] Date: [date] Operator: [your company name] I consent to drone filming of this event including my likeness, and understand:

    1. Footage will be used for [specific purpose]
    2. Footage will be stored securely and accessed only by [who]
    3. Footage will be retained for [timeframe]
    4. I have the right to request deletion of my image
    5. I have been informed of my data protection rights
    Signed: ________________ Name: __________________ Date: ___________________
    `

    Data Protection Clause (for contracts)

    ` DATA PROTECTION The Operator (filmmaker) will process personal data captured in drone footage as a Data Processor on behalf of the Client.

    1. Legal Basis: Client has obtained consents from all identifiable people
    2. Data Security: Footage stored in [encrypted cloud/secure drive]
    3. Access: Only Client and Operator personnel may access
    4. Retention: Footage deleted [30 days after delivery]
    5. Breach Response: Notified within 24 hours
    Client acknowledges GDPR responsibility for obtaining consent.

    Surveillance: Enhanced Restrictions

    What is "Surveillance Drone Operation"?

    Surveillance = Continuous/systematic monitoring of people/property Examples:
    • Long-term monitoring of building (hours, days)
    • Tracking specific individuals
    • Repeated flights to same location (monitoring)

    ICO (Information Commissioner's Office) Guidance

    For surveillance operations:
    1. Data Protection Impact Assessment (DPIA) Required

    • Document: what data, why collected, risks, mitigations
    • Timeline: 2โ€“3 weeks to complete
    • Cost: ยฃ500โ€“ยฃ2,000 (if consulting support)

    1. Enhanced Legal Basis Justification

    • Consent usually insufficient (may feel coerced)
    • Contract or legitimate interests must be justified
    • Must pass "balancing test" (benefit vs. privacy impact)

    1. Transparency Obligation

    • Clear signage at monitored location
    • Privacy notice published (website, email notification)
    • Individuals can request data deletion

    Example: Building Security Surveillance

    โŒ Not compliant: "We fly a drone daily to monitor the building perimeter because we feel it's a good idea." โœ… Compliant:

    Face Blurring & Data Minimization

    When Must You Blur Faces?

    Scenario Blur Required? Why
    Video for client's internal use only โŒ NO Not public; client consented
    Footage on company website โœ… YES Public; consent doesn't extend to strangers
    Event film (wedding, sports) โš ๏ธ MAYBE If only participants filmed (consent). If public bystanders (YES blur)
    Thermal image (people visible as heat) โœ… YES Identifiable heat patterns = personal data
    Crowd shot with hundreds of people โš ๏ธ MAYBE If faces not individually identifiable, may be exempt

    Tools for Face Blurring

    • DaVinci Resolve (free, professional)
    • Adobe Premiere (paid, industry-standard)
    • iMovie (free, basic blurring)
    • Blur.by (cloud tool, batch processing)

    Data Breach: Incident Response

    If Your Footage is Stolen/Leaked

    Step 1: Secure (Immediate)
    • [ ] Identify what data was exposed
    • [ ] Contain the breach (remove leaked files, change passwords)
    • [ ] Document the incident (when, how, what data)

    Step 2: Notify Individuals (Within 30 Days)
    • [ ] Email/letter to everyone in footage
    • [ ] Explain: what happened, what data exposed, what you're doing
    • [ ] Provide ICO contact details

    Step 3: Notify ICO (Within 72 Hours)
    • [ ] Report to ICO online (ico.org.uk)
    • [ ] Include: breach description, data types, number of people affected
    • [ ] Describe: mitigations, notification plan

    Step 4: Investigation & Follow-up
    • [ ] ICO may request detailed assessment
    • [ ] May result in fine (up to ยฃ17.5m or 4% global revenue)
    • [ ] Most minor breaches = investigation without fine

    Breach Notification Template

    ` INCIDENT REPORT - DATA BREACH Date of breach: [when discovered] Date of disclosure: [when told to public] Description: [what happened] Data affected:

    • 47 individuals
    • Data types: [faces, license plates, etc]
    • Sensitivity: [High/Medium/Low]
    Mitigations taken:

    • Secured remaining data
    • Deleted exposed files
    • Notified individuals
    • Implemented [security measure] to prevent recurrence

    FAQ (Schema.org FAQPage)