Cybersecurity & cybercrime

Cybersecurity & cybercrime guidance:

This Practice Note is intended as a quick guide which outlines the main cyber threats commercial organisations face, and identifies some top tips for firms in defending...

Practice Note

ThreatWhat is it?Our defensive measures BotnetCollection of infected computers remotely controlled by a hacker.The hacker can share or sell access to the computers to...

Precedents

Produced in partnership with David Gilmore of DG Legal 1 Introduction It is our policy to ensure that if our business is interrupted, we can become fully operational as...

Precedents

1 Responsibility 1.1 [Insert name and/or job title eg, The Risk manager] is responsible for this policy. 1.2 They are responsible for communicating the contents of this...

Precedents

Confidentiality and disclosure policy 1 Policy statement 1.1 It is the policy of [firm name] (‘the firm’) to conduct its business in compliance with the highest...

Precedents

This Practice Note summarises key points from the first legal threat report published by the National Cyber Security Centre (NCSC). The report has been compiled with the...

Practice Note

Quarter 1—Confidential information The tips and reminders for this quarter relate to confidential information. You can find more specific information in the following...

Precedents

Corporate finance transactions are a prime target for cyber criminals due to the: • number of people involved • large volume of information being shared • extent to which...

Practice Note

Brexit: As of exit day (31 January 2020), the UK is no longer an EU Member State, but it has entered an implementation period during which it continues to be treated by...

Practice Note

Cybercrime is a fast-moving, ever-evolving unpredictable risk to all commercial organisations which must be managed properly. It's estimated that up to 80 per cent of...

Practice Note

1 Introduction 1.1 This strategy and plan builds on and supplements our other data management and security policies and procedures, namely our: 1.1.1 [[Data protection...

Precedents

1. Introduction We have performed an organisation-wide assessment of the risk of our systems and/or services falling victim to cybercrime. The review included...

Precedents

The rapid growth of the internet has transformed the way we work. Indeed, the UK has one of the most internet-based economies in the world, with the UK internet market...

Practice Note

Brexit: As of exit day (31 January 2020), the UK is no longer an EU Member State, but it has entered an implementation period during which it continues to be treated by...

Practice Note

A: General information Date of annual review[Insert date] Person(s) conducting annual review[Insert name of person conducting annual review] B: Review and findings Are...

Precedents

Brexit: As of exit day (31 January 2020), the UK is no longer an EU Member State, but it has entered an implementation period during which it continues to be treated by...

Practice Note

Click here to download the latest Cybersecurity 2019 report, published by Getting the Deal Through. Jurisdictions covered The following jurisdictions are covered in this...

Practice Note

Click here to download the latest Cybersecurity 2020 report, published by Getting the Deal Through. Jurisdictions covered The following jurisdictions are covered in this...

Practice Note

Phishing is where someone initiates an electronic communication such as an email which is designed to trick the user for the purpose of stealing sensitive information...

Precedents

1 Introduction 1.1 This plan outlines the [firm’s OR company’s OR current use of information and communication technology (ICT), future goals for the use of ICT and key...

Precedents

1 Background information Name of[ prospective] supplier[To be completed by customer] Address[To be completed by customer] Brief description of services[ to be]...

Precedents

Pandemics are exceptional events which present organisations with difficult business conditions, uncertainty and particularly challenging information and cybersecurity...

Practice Note

1 Introduction 1.1 Passwords are a critical aspect of our information and cyber security measures. They are our first line of defence. 1.2 This policy: 1.2.1 establishes...

Precedents

Produced in partnership with Bird & Bird LLP 1 Introduction 1.1 The Company is committed to the highest standards of information security and treats confidentiality and...

Precedents

1 Introduction 1.1 While remote working (whether at home or on the go) and removable media offer our business and clients great benefits, they can also expose us to risks...

Precedents

A: Review Name of person(s) conducting review[Insert name(s)] Date of review [insert date] List of approved social media sites[Insert details, or append current list to...

Precedents

Law firms make attractive targets for cyber criminals and are experiencing an increase in cyber attacks. Legal businesses hold sensitive, personal and confidential...

Practice Note

This Precedent presentation has been designed as an aid to train your staff on cybercrime/cybersecurity. This training presentation is not a technical guide, but rather...

Precedents
Trending Topics
In-House COVID-19