Latest News

Piers Clayden joins GDPR Advisory Board

The GDPR Advisory Board launched on 7th December is an easily-accessible, authoritative platform for organisations baffled by the implications of the forthcoming General Data Protection Regulation (GDPR).  Expert advice from the new ‘...

PWC Global State of Information Security Survey Report - what you need to know

“Massive cybersecurity breaches have become almost commonplace, regularly grabbing headlines that alarm consumers and leaders. But for all of the attention such incidents have attracted in recent years, many organizations worldwide still struggle to...

Website privacy notices "too vague and generally inadequate"

A review of 30 UK websites, by the Information Commissioner’s Office, has found that the majority of data protection and privacy notices were inadequate. The study looked at organisations across the retail, banking, lending, travel and finance price...

What challenges does GDPR pose to the marketing list industry

Even without the advent of GDPR in May 2018, it is clear that the marketing list industry, which for many years had operated without much in the way of regulatory scrutiny, had caught the information commissioner’s attention. In 2016, the ICO handed...

Cybersecurity: Risk Assessment & Data Privacy

The GDPR introduces additional responsibilities onto organisations, to both evaluate any risks to the personal data they hold and then take action based upon such an assessment.  Where holding data is considered “ high risk ” a “...

Cybersecurity: Encryption as a privacy tool

Encryption is an excellent security tool… even if it wasn’t, the UK Information Commissioners’ Office (ICO) sees it as a basic precaution, meaning that is should be on the radar of all data-handling organisations. All security measures...

Cybersecurity: Understanding passwords

If implementing enough cybersecurity to adhere to privacy law is so complex, and massive breaches and software vulnerabilities seem to be reported in the press on a weekly basis, then why are experts quite so preoccupied by the handfuls of jumbled...

Cybersecurity: Understanding the recent Krack vulnerability

A couple of weeks ago we woke up to the news that the technology most of our laptops, smartphones and tablets use to connect to WiFi networks has a major cybersecurity vulnerability [1] . This isn’t something that anyone could have predicted,...

GDPR and employment law - If employees cannot consent, how can you process their data?

In a previous blog , we looked at the impact of the General Data Protection Regulation (GDPR) on employee consent as a valid processing ground, and how it is, in effect, nullified under the new rules at least so far as the employment relationship is...
  • Page 3 of 7