Get a good background to data protection law and view practical guidance focused on data protection matters for commercial transactions. See also our UK GDPR compliant pro-party clauses for use in commercial agreements.
Protect trade secrets and know-how using the law of confidentiality. Get information and a set of pro-party confidentiality agreements here.
View a range of trackers to enable horizon scanning and monitoring of key developments. The trackers are maintained - making them useful for keeping up-to-date and for business development.
It’s our online practical guidance product for contentious and non-contentious lawyers dealing with Data Protection, Confidential Information, Privacy, Cybersecurity and Freedom of Information issues.
The Department for Science, Innovation and Technology (DSIT) has welcomed the Data (Use and Access) Bill (DUA Bill) receiving Royal Assent on 19 June...
Welcome to this week’s edition of the Information Law weekly highlights: a hand-picked summary of news analysis, updates and new content related to...
The Information Commissioner's Office has published several guidance documents and a working plan following the Data (Use and Access) Bill receiving...
The Data (Use and Access) Bill (DUA) received Royal Assent and became an Act of Parliament on Thursday 19 June 2025. This followed its parliamentary...
The Council of the EU and the European Parliament have reached a provisional agreement on a new regulation to improve cross-border enforcement of the...
Data protection and the creative industriesThis Practice Note contains practical guidance on how the UK film and photography industry has adapted in...
Data protection law—new starter guideThis new starter guide provides an introduction to data protection law for those who are not familiar with data...
UK GDPR—the public sectorThis Practice Note provides a summary of how the application of the United Kingdom General Data Protection Regulation,...
Commercial use of photographs—data protection and privacy issuesThis Practice Note addresses issues affecting professional photographers taking...
The Data Protection Act 2018 before 1 January 2021 [Archived]ARCHIVED: This archived Practice Note provides information on the Data Protection Act...
Personal data processing schedule—pro-supplier—UK GDPR and EU GDPRThis precedent uses the additional defined terms ‘Agreement’, ‘Business Day’,...
Transparency and privacy policies and notices—list of further precedentsIn addition to the Precedents listed in this Transparency and privacy policies...
Accountability, governance and compliance—list of further risk and compliance precedentsIn addition to the Precedents referred to in this...
International transfers—transfer impact assessment precedentsIn addition to the Precedents listed in this International transfers subtopic, the...
Personal data processing schedule—controller and processor—intra-groupDefined terms: In addition to the definitions below, this precedent also uses...
The UK General Data Protection Regulation (UK GDPR)—NavigatorThis Practice Note serves as a reference guide to the Retained Regulation (EU) 2016/679...
Privacy law—misuse of private informationThe tort of misuse of private information is focused on ‘the protection of human autonomy and dignity—the...
Confidentiality agreement—mutualThis Agreement is made on [date]Parties1[insert name of party] [of [insert details ] OR a company incorporated in...
The Information Commissioner’s Office (ICO)The Information Commissioner’s Office (ICO) is the UK’s independent regulator designed to uphold...
The UK General Data Protection Regulation (UK GDPR)This Practice Note provides a summary of the UK GDPR regime. For a higher-level introduction to UK...
Letter of claim—breach of confidence[Insert name and address of recipient]Dear [insert organisation name],[Name of client] and confidential...
Trade secrets and confidential information—protection and enforcementThis Practice Note sets out the protection available for trade secrets and...
Introduction to the EU GDPR and UK GDPRThis Practice Note provides a high-level introduction to the EU’s General Data Protection Regulation,...
Data protection, privacy and confidential information case law trackerThis Practice Note tracks noteworthy High Court, Court of Appeal and Supreme...
Commercial use of photographs—data protection and privacy issuesThis Practice Note addresses issues affecting professional photographers taking...
Letter of claim—breach of data protection law[Insert name and address of recipient]Dear [insert organisation name],[Name of client] and breach of data...
What does IP completion day mean for Information Law? [Archived]ARCHIVED: This Practice Note has been archived and is not maintained.11 pm (GMT) on 31...
Confidential information, privacy and injunctionsThis Practice Note deals with the general principles of obtaining an injunction relating to...
The Data Protection Act 2018This Practice Note introduces the UK’s Data Protection Act 2018 (DPA 2018).For higher-level introductions to data...
Under the EU GDPR or UK GDPR, generally defined as the natural or legal person, authority'>public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data. Legislation specifies the controller in certain limited situations.
property which can be sold for money.
Tracking pixels (also known as single-pixel gifs, web beacons and web bugs) are small-graphics files incorporated into a website or an email. They display an image, usually the size of a single pixel, that is invisible to the user. When a user’s browser reads the code of the website it communicates with the operator’s server in order to display the image and, through this process, the operator is able to acquire information such as technical specifications of the device, operating systems and settings being used. It can also track a user’s activities during a session. Tracking pixels can be particularly useful for analysing direct marketing campaigns by email by providing data on how recipients opened an email. For the same reason, they can also be used by spammers to ascertain whether an email address is valid.