Naming and shaming – how can an ICO investigation into a data breach damage your reputation?
Michael Yates looks at information likely to come into the public domain about an ICO investigation into a data breach and how to reduce the risk of reputational damage.
4 of 5 Insights
Data audits and avoiding serious breaches
Ed Hadcock looks at data audits and how they help reduce the risk of data breaches and regulator action.
1 of 5 Insights
IT forensics – an essential tool before, during, and after an IT security incident
Jo Joyce looks at the vital role forensics can play in minimising the impact of a data breach.
by Jo Joyce
3 of 5 Insights
Group litigation following a data breach
Edward Spencer and Michael Yates look at the potential consequences of a data breach which affects a large number of claimants.
by Edward Spencer and Michael Yates
2 of 5 Insights
Dealing with cross-border transfers and other data protection issues in M&A deals
How will the EU's regime on the supply of digital content and digital services to consumers differ from the UK's?
Debbie Heywood looks at the EC's incoming Digital Content and Digital Services Directive and how it differs from the UK's consumer protection regime under the Consumer Rights Act.
5 of 5 Insights
Product liability for an IoT data breach
Ed Spencer looks at potential claims for loss of IoT device personal data under product liability law.
3 of 5 Insights
Dealing with cross-border transfers and other data protection issues in M&A deals
Chris Jeffery looks at data transfers and other issues in the context of M&A deals.
2 of 6 Insights
How to keep clinical trial data flowing under GDPR and after Brexit
Debbie Heywood looks at cross-border transfers of clinical trial data in the UK and the EU.
4 of 6 Insights
Path paved for EU-UK adequacy decisions
5 of 6 Insights