Personal Data Protection in the UAE – get ready to adjust your local operations to international standards
UK digital service providers: Post-Brexit incident reporting under NIS Regulations
by Graham Hann and Clare Reynolds
Digitisation in hospitals: Data protection as an obstacle or opportunity in Germany?
by Mareike Christine Gehrmann and Dr. Carolin Monsees, CIPP/E
China's new data security law
Our China team looks at the impact of China's latest data security law on international businesses
by multiple authors
The insider threat – rogue employees and data breaches
Helen Farr and Edward Spencer look at the risk of deliberate data breaches by employees and at how to mitigate them.
by Helen Farr and Edward Spencer
5 of 5 Insights
Practical Law - information security and cyber incident and data breach resources
Naming and shaming – how can an ICO investigation into a data breach damage your reputation?
Michael Yates looks at information likely to come into the public domain about an ICO investigation into a data breach and how to reduce the risk of reputational damage.
4 of 5 Insights
Data audits and avoiding serious breaches
Ed Hadcock looks at data audits and how they help reduce the risk of data breaches and regulator action.
1 of 5 Insights
IT forensics – an essential tool before, during, and after an IT security incident
Jo Joyce looks at the vital role forensics can play in minimising the impact of a data breach.
by Jo Joyce
3 of 5 Insights
Group litigation following a data breach
Edward Spencer and Michael Yates look at the potential consequences of a data breach which affects a large number of claimants.
by Edward Spencer and Michael Yates
2 of 5 Insights
Global Data Hub – UK and EU data policy
by Debbie Heywood and Mary Rendle