Category: Blog

DATE March 8, 2021 11:12 am POSTED BY CATEGORY Blog

GDPR Radio – News & Views

GDPR Radio is a new series of events for the DPP. It is a place for Data Protection practitioners to come together and discuss recent happenings in the world of Data Protection. Click the link below and tune in to Phil Brining, David Holmes and Oliver Rear as they have...
View Article »
DATE March 8, 2021 9:24 am POSTED BY CATEGORY Blog

We are Hiring!

Job Title:                 Business Development Executive Job Purpose:          A business development role to focus on making outbound calls to new and existing prospects, developing and maintaining strong business relationships, regularly communicating with key business executives and working to grow the existing client base. Reporting to:          Sales and Marketing Director...
View Article »
DATE March 2, 2021 1:44 pm POSTED BY CATEGORY Blog

Data Breaches – Lessons Learnt From Recent Breaches

What are Data Breaches and how can we prevent them? Companies must ensure that data is adequately protected to prevent loss or theft. Where a breach has taken place, companies may need to notify individuals as well as face a negative impact on the company’s brand and customer loyalty. Under...
View Article »
DATE February 23, 2021 4:17 pm POSTED BY CATEGORY Blog

Is “Data Spill” The Latest Buzz Word In The World Of Data Protection

A story today in the BBC reports that social app Clubhouse suffered a “data spill” over the weekend  The article quotes both Clubhouse’s chief technology officer David Thiel and Australian cyber-security researcher Robert Potter arguing a differentiation between a data spill and a data breach.  Robert Potter determines that...
View Article »
DATE February 23, 2021 9:59 am POSTED BY CATEGORY Blog

Data Protection Compliance Audits

In last week’s Lunchtime Takeaway Session we discussed Data Protection Compliance Audits. A compliance audit is a review performed to ascertain an enterprise’s adherence to regulatory guidelines. Audit reports evaluate the strength and comprehensiveness of an organization’s compliance preparations, security policies, user access controls, and risk management procedures. In the...
View Article »
DATE February 18, 2021 12:20 pm POSTED BY CATEGORY Blog

Upcoming Events

Our Lunchtime Takeaway Sessions take place every Friday from 12:30 to 13:30, during these sessions our top consultants come together to speak about various topics related to Data Protection. We are working closely with our clients to find common struggles so we can create the best possible list of events...
View Article »
DATE February 9, 2021 2:00 pm POSTED BY CATEGORY Blog

Lunchtime Takeaway Session – Accountability

There are seven basic data protection principles under EU data protection law. The principles lie at the heart of the law and, although they don’t give hard and fast rules, they embody the spirit of the regulatory framework. Therefore, compliance with the principles is a fundamental building block to any...
View Article »
DATE February 3, 2021 11:00 am POSTED BY CATEGORY Blog

Safer Internet Day

Next Tuesday is the 18th Safer Internet Day, a day which calls upon all stakeholders to join together to make the internet a safer and better place for all and especially for children and young people. At the very least, Safer Internet Day is a good hook on which to...
View Article »
DATE January 29, 2021 1:59 pm POSTED BY CATEGORY Blog

The SAR Bureau – 7 Ways To Simplify SARS

In the recording below, Phil Brining, David Holmes, Kathy Midgley and Oliver Rear speak about all things Subject Access Requests. Tune in and listen to them discuss 7 different ways to simplify SARs and how to avoid the common pitfalls that come along with handling them. The list of upcoming...
View Article »
DATE January 27, 2021 12:41 pm POSTED BY CATEGORY Blog

New Data Breach Guidelines Issued

The European Data Protection Board published some great new guidelines about data breaches last week.  What makes the guidance great is that it essentially works through 18 use-cases including examples such as mailing things to the wrong person,  exfiltration of data by a former employee, the accidental transmission of data,...
View Article »