Data breaches

View Practice Compliance by content type:

Latest Practice Compliance News

Featured Practice Compliance content

Practice notes
AML and counter-terrorist financing—source of funds and source of wealthSource of funds and wealth was a key focus of the SRA’s Preventing Money...
Read More >
19th May
Practice notes
IP COMPLETION DAY: 11pm (GMT) on 31 December 2020 marks the end of the Brexit transition/implementation period entered into following the UK’s...
Read More >
19th May
Practice notes
Compliance officer for legal practice—COLP—title and duties 2011 [Archived]The compliance officer for legal practice (COLP) sits at the heart of the...
Read More >
19th May
Practice notes
Brexit—exiting the EU under Article 50 [Archived]ARCHIVED: This Practice Note has been archived and is not maintained.This Practice Note contains...
Read More >
Produced in partnership with Adam Cygan of University of Leicester 19th May
Practice notes
SRA Accounts Rules 2019This Practice Note sets out the requirements of the SRA Accounts Rules 2019 (the 2019 Rules), in force from 25 November 2019,...
Read More >
19th May
Precedents
1DefinitionsModern Slavery Policy•means the Customer's anti-slavery and human trafficking policy as set out in Schedule [insert] as updated by the...
Read More >
19th May
Practice notes
High-risk third countries trackerOrganisations caught by the Money Laundering, Terrorist Financing and Transfer of Funds (Information on the Payer)...
Read More >
19th May
Practice notes
Active bribery, passive bribery and bribing foreign public officialsThe purpose of this Practice Note is to provide a general understanding of the...
Read More >
Produced in partnership with Joanne Kane of Carmelite Chambers 19th May
Precedents
In briefThis precedent links to: •a template created by the UK Information Commissioner’s Office (ICO) of the ‘Set II’ or ‘2004’ EU Standard...
Read More >
19th May
Practice notes
Introduction to retained EU lawThis Practice Note provides an introduction to retained EU law. It provides an overview of the key definitions and...
Read More >
Produced in partnership with Dr. Kieran Laird of Gowling WLG 19th May
Practice notes
Safeguards and information barriersProtection of confidential information is fundamental to your relationship with clients, both as a matter of law...
Read More >
19th May
Practice notes
Undertakings and the SRA 2019What is an undertaking?An undertaking is:•a statement, given orally or in writing, whether or not it includes the word...
Read More >
19th May
Practice notes
Duties of confidentiality and disclosure 2019The protection of confidential information is a fundamental feature of the solicitor-client relationship...
Read More >
19th May
Precedents
1IntroductionThis financial sanctions policy is designed to ensure we comply with applicable financial sanctions laws made under the UK sanctions...
Read More >
19th May
Practice notes
SRA Handbook 2011 [Archived]The SRA Handbook 2011 sets out standards and requirements that individual lawyers and firms are expected to achieve and...
Read More >
19th May
Practice notes
Working with European lawyers—the Registered European Lawyer (REL) regimeAt 11 pm (GMT) on 31 December 2020, the Brexit transition/implementation...
Read More >
19th May

Most recent Data breaches content

Practice notes
Managing personal data breachesData security is a cornerstone of the UK General Data Protection Regulation (UK GDPR). The sixth data protection...
Read More >
17th Sep
Precedents
Privacy risk registerPlease click for an Excel version of this register. The register consists of three tabs:•sample Privacy risk register—this has...
Read More >
22nd Aug
Precedents
Personal data breach plan1Introduction1.1This personal data breach plan:1.1.1places obligations on staff to report actual or suspected personal data...
Read More >
22nd Aug
Precedents
Letter notifying data breach to insurerLetter notifying data breach to insurers[Data insurer’s name and address][Date]Dear [insert organisation...
Read More >
22nd Aug
Precedents
Data breach report form—internalIf you know or suspect a personal data breach has occurred, please:•complete this form, and•email or deliver it to the...
Read More >
22nd Aug
Precedents
Data breach registerThis Precedent reflects reporting and recording requirements under the UK General Data Protection Regulation (UK GDPR). It can be...
Read More >
22nd Aug
Precedents
Data breach assessment and action plan1Data breach teamThe first step is to assemble a team to manage and respond to the breach.Data breach team...
Read More >
22nd Aug
Precedents
Information audit formInformationWhy is it processed?How is it stored?How is it used?How long is it needed?[Personnel files][To record employment...
Read More >
22nd Aug
Precedents
Letter notifying data subject of data breachOn [insert date] we became aware that [describe what has happened, ie how the breach occurred]. The data...
Read More >
22nd Aug
Precedents
Data breach monitoring record1General informationDate of monitoring review[insert date of monitoring review]Person conducting monitoring review[insert...
Read More >
13th Aug
Precedents
Public statement on data breachStatement by [insert name of organisation] concerning a significant [cyber attack OR data protection breach] on [insert...
Read More >
1st Aug
Q&As
When does the 72–hour time limit for notifying the ICO of a data breach come into force and start to run?Article 33 of the General Data Protection...
Read More >
1st Aug
Precedents
Data breach—panic sheet1. Data breach teamDamage limitation is a priority immediately following a security breach. You will need a team of people to...
Read More >
1st Aug
Q&As
Do I need to report a data breach to the ICO during the coronavirus (COVID-19) epidemic?This Q&A considers whether commercial organisations are...
Read More >
1st Aug
Practice notes
Managing a personal data breach—process flowchartThis Practice Note illustrates how to manage a data protection breach under the UK General Data...
Read More >
1st Aug
Practice notes
Reportable data breach—regulatory examplesThis Practice Note contains a spreadsheet, collating detailed data breach examples provided by UK and...
Read More >
1st Aug

Popular documents