Information management & security

View Practice Compliance by content type:

Latest Practice Compliance News

Featured Practice Compliance content

Practice notes
AML and counter-terrorist financing—source of funds and source of wealthSource of funds and wealth was a key focus of the SRA’s Preventing Money...
Read More >
19th May
Practice notes
IP COMPLETION DAY: 11pm (GMT) on 31 December 2020 marks the end of the Brexit transition/implementation period entered into following the UK’s...
Read More >
19th May
Practice notes
Compliance officer for legal practice—COLP—title and duties 2011 [Archived]The compliance officer for legal practice (COLP) sits at the heart of the...
Read More >
19th May
Practice notes
Brexit—exiting the EU under Article 50 [Archived]ARCHIVED: This Practice Note has been archived and is not maintained.This Practice Note contains...
Read More >
Produced in partnership with Adam Cygan of University of Leicester 19th May
Practice notes
SRA Accounts Rules 2019This Practice Note sets out the requirements of the SRA Accounts Rules 2019 (the 2019 Rules), in force from 25 November 2019,...
Read More >
19th May
Precedents
1DefinitionsModern Slavery Policy•means the Customer's anti-slavery and human trafficking policy as set out in Schedule [insert] as updated by the...
Read More >
19th May
Practice notes
High-risk third countries trackerOrganisations caught by the Money Laundering, Terrorist Financing and Transfer of Funds (Information on the Payer)...
Read More >
19th May
Practice notes
Active bribery, passive bribery and bribing foreign public officialsThe purpose of this Practice Note is to provide a general understanding of the...
Read More >
Produced in partnership with Joanne Kane of Carmelite Chambers 19th May
Precedents
In briefThis precedent links to: •a template created by the UK Information Commissioner’s Office (ICO) of the ‘Set II’ or ‘2004’ EU Standard...
Read More >
19th May
Practice notes
Introduction to retained EU lawThis Practice Note provides an introduction to retained EU law. It provides an overview of the key definitions and...
Read More >
Produced in partnership with Dr. Kieran Laird of Gowling WLG 19th May
Practice notes
Safeguards and information barriersProtection of confidential information is fundamental to your relationship with clients, both as a matter of law...
Read More >
19th May
Practice notes
Undertakings and the SRA 2019What is an undertaking?An undertaking is:•a statement, given orally or in writing, whether or not it includes the word...
Read More >
19th May
Practice notes
Duties of confidentiality and disclosure 2019The protection of confidential information is a fundamental feature of the solicitor-client relationship...
Read More >
19th May
Practice notes
SRA Handbook 2011 [Archived]The SRA Handbook 2011 sets out standards and requirements that individual lawyers and firms are expected to achieve and...
Read More >
19th May
Precedents
1IntroductionThis financial sanctions policy is designed to ensure we comply with applicable financial sanctions laws made under the UK sanctions...
Read More >
19th May
Practice notes
Working with European lawyers—the Registered European Lawyer (REL) regimeAt 11 pm (GMT) on 31 December 2020, the Brexit transition/implementation...
Read More >
19th May

Most recent Information management & security content

Precedents
Records retention schedule1Introduction1.1This Record retention schedule accompanies and is incorporated into [insert organisation’s name]’s Records...
Read More >
1st Aug
Precedents
Passwords—quick guide to getting it rightThis quick guide can help you to create a strong password (that you won’t forget) and maintain the best...
Read More >
1st Aug
Practice notes
Bring your own device (BYOD)What is BYOD?'Bring your own device' (BYOD) refers to arrangements where an organisation allows designated employees to...
Read More >
1st Aug
Precedents
Data protection risk assessment—short form1Background informationAssessment for:[state whether the assessment relates to the whole firm or a specific...
Read More >
1st Aug
Precedents
Clear desk and clear screen policy1Purpose and application1.1This policy sets out the measures you are expected to take to protect personal data and...
Read More >
1st Aug
Practice notes
Information security—data protection complianceYou must have appropriate security in place to prevent personal data being accidentally or deliberately...
Read More >
1st Aug
Q&As
How can I ensure my organisation and staff stay safe while using video-conferencing during the coronavirus (COVID-19) pandemic?With the urgent move to...
Read More >
1st Aug
Practice notes
Pandemic management—information and cybersecurity—challenges and practical responsesPandemics are exceptional events which present organisations with...
Read More >
1st Aug
Practice notes
Managing personal data breachesData security is a cornerstone of the UK General Data Protection Regulation (UK GDPR). The sixth data protection...
Read More >
1st Aug
Q&As
What cybercrime risks do I need to consider during a pandemic (eg coronavirus (COVID-19))?This Q&A sets out cybercrime threats which are relevant to...
Read More >
1st Aug
Practice notes
Information security—encryptionEncryption is a widely-available information security solution. It is relatively affordable and simple to implement, so...
Read More >
1st Aug
Q&As
What technology risks are associated with temporary homeworking?This Q&A explains the main technology risks associated with temporary homeworking and...
Read More >
1st Aug
Precedents
Data processing registerThis Precedent Data processing register will enable you to keep a record of the personal data you process and how it is...
Read More >
1st Aug
Q&As
How can I protect my firm from new cyber threats to our client account?Law firms are increasingly falling prey to scams that either take money from...
Read More >
31st Jul
Practice notes
Cybersecurity—Austria—Q&A guideThis Practice Note contains a jurisdiction-specific Q&A guide to cybersecurity in Austria published as part of the...
Read More >
31st Jul
Q&As
What can I do to protect confidential information in the workplace?What counts as confidential information?Confidential information is information...
Read More >
31st Jul
Q&As
Is my cybersecurity under threat and how can I protect myself?How are law firms vulnerable to attack?Cyber-attacks are indiscriminate, affecting both...
Read More >
31st Jul
Q&As
Do you have wording for an email footer regarding cybersecurity especially bank account fraud?Practice Note: Email disclaimers provides sample wording...
Read More >
31st Jul
Q&As
What does Brexit mean for cybercrime and cybersecurity?The UK has left the EU on the basis of the Withdrawal Agreement as implemented in the European...
Read More >
31st Jul

Popular documents