We understand that data protection and cyber-security regulation can be intimidating. Our lawyers are skilled in making complex data issues simple to understand. We work closely with our clients to identify their needs and deliver practical, commercial and straightforward advice. We deliver training on both data protection and cyber security compliance, and work with clients to develop and deliver bespoke crisis management training to mitigate the risks in the event of a cyber security incident or data protection breach.
Our data protection lawyers are well-versed in providing a crisis management service in respect of data protection and cyber security breaches, as well as advising on responses to subject access requests, investigations by the ICO and full scale GDPR compliance audits.
Our data protection lawyers and cyber specialists can help with all aspects of data protection and cyber security regulation, from simple ad hoc queries and analysis to advice on risk mitigation and breach strategy.
Areas of focus:
Our data protection and cyber security team’s expertise includes:
- GDPR compliance including aspects of programmatic advertising and artificial intelligence (AI)
- NIS Regulations compliance
- EPrivacy and eMarketing issues
- Cross border data flows and EU-US privacy shield
- Structuring data protection audits including the development of questionnaires and project plans
- Developing and reviewing data protection and cyber security policies, procedures, statements and handbooks
- Complex data sharing arrangements
- Compliant international data transfers
- Producing impact assessments and monitoring employees using CCTV, email monitoring and private investigators
- Responses to subject access requests
- Compliant disclosure of sensitive or 'special category' information
- Advising public authorities and institutions on FOIA requests
- Data protection breach and cyber security incident handling
- Providing bespoke training on data protection and cyber security
- Thought leadership on data protection and cyber security issues in new and emerging technologies