02 April 2018

In a business to business transaction, Company A obtains the contact details of a representative of Company B, and places those details (such as name, e-mail, telephone) in to its CRM. This information is only to be used to connect to the other company. However, Company A takes the decision…

01 April 2018

It has been said that implementation of the GDPR means a business process redesign. What this means on a practical level – given the scarcity of existing privacy experts in contrast to the number of organisations within the UK alone who need to implement such a plan – is not…

31 March 2018

GDPR requires a multi-disciplinary approach involving: Culture is to be implemented and engrained in staff training and awareness Processes should be implemented to ensure policies are adhered to Legal advice is necessary for the interpretation of developing laws Technology should help to bring it all together and add a layer…

30 March 2018

1953 - First legal protections for personal information codified in Article 8 European Convention of Human Rights (ECHR) 1981 – Council of Europe established standards (the Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data) ensured the free flow of information throughout EU-Member States without…

30 March 2018

For businesses which rely on B2B marketing, GDPR and the e-Privacy Regulations will certainly give food for thought. For initial contact, there may be a reliance on Legitimate Interest grounds, on basis that the business is an SME who is only processing basic B2B business information and does not carry…

24 March 2018

High tech companies are impacting and innovating every industry, from healthcare and manufacturing to consumer goods and travel. The very nature of the high tech industry makes it particularly vulnerable to many of the advanced threats that exist in the modern landscape. Threats originate from inside and outside the organization…

24 March 2018

WHAT IS DPI? Deep packet inspection, which is also known as DPI, information extraction, IX, or complete packet inspection, is a type of network packet filtering. Deep packet inspection evaluates the data part and the header of a packet that is transmitted through an inspection point, weeding out any non-compliance…

24 March 2018

FBDo not shed any tears for Facebook. The company, which finds itself at the center of yet another controversy over data mining and privacy, is currently taking a lot of hits on the PR front and some lawmakers are asking uncomfortable questions, but soon enough this will blow over and…

23 March 2018

Learn about the difference between structured data and unstructured data and how to best protect it in Data Protection 101, our series on the fundamentals of information security. When organizations prepare to collect, analyze and secure data, they need to understand there two kinds of data: structured and unstructured data…

21 March 2018

Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aenean commodo ligula eget dolor. Aenean massa. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Donec quam felis, ultricies nec, pellentesque eu, pretium quis, sem. Nulla consequat massa quis enim. Donec pede justo, fringilla vel, aliquet nec, vulputate…


How can we help you?

To find how our friendly and knowledgeable solicitors can help you, contact us today.

Make a free enquiry - Call now - 0151 659 1070