The General Data Protection Regulation (GDPR) came into force on 25 May 2018. It applies to everyone trading within the EEA (including UK individuals and organisations).
Find out why Brexit could impact data protection and how you can prepare. Updated January 2020.
Getting to grips with the General Data Protection Regulation
Protecting the information assets of an organisation.
Features and articles
This page presents an overview of instructions and guidance for small practices to prepare during the transition period following Brexit.
Paula Smith examines how a strong ethical approach can help financial services firms cope with the changing world of data management
George Quigley explains how smaller firms can assess cyber risk in their supply chain.
Insurance companies need to put their best foot forward to make the most of big data in providing better services for customers, says Peter Wilson
Webinars and recordings
The GDPR came into force in the UK on May 25 2018. Many organisations put a lot of effort into preparing for that day.
Gain practical advice on how to be aware of vulnerabilities and threats, securing your data and recovering from a data breach.
Dr Jane Berney, Business Law manager at the ICAEW and Professor Jim Gee, Head of the Forensic and Counter Fraud Services Team discuss cybercrime and GDPR in the manufacturing sector
New and emerging developments of cyber security in the manufacturing sector. Hear from Dr Jane Berney Business Law Manager, ICAEW and Professor Jim Gee, Head of Forensic, cybercrime and counter fraud services, Crowe Clark Whitehill.
Legal Alert is a monthly checklist from Atom Content Marketing highlighting new and pending laws, regulations, codes of practice and rulings that could have an impact on your business. Find out more about Atom Content Marketing
Individuals who secretly film and post videos on YouTube and similar sites may be able to rely on an exemption for ‘journalistic activities’ to justify what would otherwise be a breach of data protection rules. This follows a new, wider definition of the exemption put forward in a recent Court of Justice of the European Union ruling.
Organisations considering how to respond to a ‘subject access request’ will benefit from court guidance given in a recent ruling.
Employees tempted to access their employer or ex-employer's data without authorisation could face a prison sentence if the ICO decided to prosecute for hacking instead of obtaining data without consent, following a recent case.
Disclaimer: These publications from Atom Content Marketing are for general guidance only, for businesses in the United Kingdom governed by the laws of England. Atom Content Marketing, expert contributors and ICAEW (as distributor) disclaim all liability for any errors or omissions.
The Library & Information Service provides a hand-picked collection of industry press articles as a benefit of membership. If you are unable to access an article, please see our Help and support or contact firstname.lastname@example.org
The article discusses several ways to protect corporate and personal data in the cloud. These ways include ensuring that the network perimeter is appropriately configured, setting guidelines for staff and upskilling them, and carefully choosing cloud software. It notes that hackers are getting more sophisticated and it can be hard to detect attacks.
The article offers information regarding the use of personal data by various companies that they gathered through certain devices and platform to promote income. It mentions various technologies which gathers user's personal information that were used by certain companies to advertise or discriminate individuals for income which include fingerprinting browsers, mobile web traffic, and software development kits (SDKs).
The article offers information on risk and compliance challenges faced by companies with the European Union's General Data Protection Regulation (GDPR). Topics discussed include dedicated implementation of corporate information technology systems such as web services or application programming interfaces; software-as-a-service for governance, risk management and compliance; and Information technology spending.