Cybersecurity & cybercrime

View Practice Compliance by content type:

Latest Practice Compliance News

Featured Practice Compliance content

Practice notes
AML and counter-terrorist financing—source of funds and source of wealthSource of funds and wealth was a key focus of the SRA’s Preventing Money...
Read More >
19th May
Practice notes
IP COMPLETION DAY: 11pm (GMT) on 31 December 2020 marks the end of the Brexit transition/implementation period entered into following the UK’s...
Read More >
19th May
Practice notes
Compliance officer for legal practice—COLP—title and duties 2011 [Archived]The compliance officer for legal practice (COLP) sits at the heart of the...
Read More >
19th May
Practice notes
Brexit—exiting the EU under Article 50 [Archived]ARCHIVED: This Practice Note has been archived and is not maintained.This Practice Note contains...
Read More >
Produced in partnership with Adam Cygan of University of Leicester 19th May
Practice notes
SRA Accounts Rules 2019This Practice Note sets out the requirements of the SRA Accounts Rules 2019 (the 2019 Rules), in force from 25 November 2019,...
Read More >
19th May
Precedents
1DefinitionsModern Slavery Policy•means the Customer's anti-slavery and human trafficking policy as set out in Schedule [insert] as updated by the...
Read More >
19th May
Practice notes
High-risk third countries trackerOrganisations caught by the Money Laundering, Terrorist Financing and Transfer of Funds (Information on the Payer)...
Read More >
19th May
Practice notes
Active bribery, passive bribery and bribing foreign public officialsThe purpose of this Practice Note is to provide a general understanding of the...
Read More >
Produced in partnership with Joanne Kane of Carmelite Chambers 19th May
Precedents
In briefThis precedent links to: •a template created by the UK Information Commissioner’s Office (ICO) of the ‘Set II’ or ‘2004’ EU Standard...
Read More >
19th May
Practice notes
Introduction to retained EU lawThis Practice Note provides an introduction to retained EU law. It provides an overview of the key definitions and...
Read More >
Produced in partnership with Dr. Kieran Laird of Gowling WLG 19th May
Practice notes
Safeguards and information barriersProtection of confidential information is fundamental to your relationship with clients, both as a matter of law...
Read More >
19th May
Practice notes
Undertakings and the SRA 2019What is an undertaking?An undertaking is:•a statement, given orally or in writing, whether or not it includes the word...
Read More >
19th May
Practice notes
Duties of confidentiality and disclosure 2019The protection of confidential information is a fundamental feature of the solicitor-client relationship...
Read More >
19th May
Practice notes
SRA Handbook 2011 [Archived]The SRA Handbook 2011 sets out standards and requirements that individual lawyers and firms are expected to achieve and...
Read More >
19th May
Precedents
1IntroductionThis financial sanctions policy is designed to ensure we comply with applicable financial sanctions laws made under the UK sanctions...
Read More >
19th May
Practice notes
Working with European lawyers—the Registered European Lawyer (REL) regimeAt 11 pm (GMT) on 31 December 2020, the Brexit transition/implementation...
Read More >
19th May

Most recent Cybersecurity & cybercrime content

Practice notes
Cybercrime hot-spot: corporate financeCorporate finance transactions are a prime target for cyber criminals due to the:•number of people...
Read More >
5th Jun
Precedents
Website—cybercrime—monitoring form1ReviewName of person(s) conducting review[Insert name(s)]Date of review[Insert date]Number of files/pages added in...
Read More >
5th Jun
Practice notes
Cybercrime preventionCybercrime is a fast-moving, ever-evolving unpredictable risk to all commercial organisations which must be managed properly.It's...
Read More >
5th Jun
Precedents
Clear desk and clear screen policy—law firms1Responsibility1.1[Insert name and/or job title eg, The Risk manager] is responsible for this...
Read More >
5th Jun
Precedents
Cybercrime risk assessment1Introduction1.1We have performed an organisation-wide assessment of the risk of our systems and/or services falling victim...
Read More >
5th Jun
Precedents
Cybersecurity and cybercrime—annual review1General informationDate of annual review[Insert date]Person(s) conducting annual review[Insert name of...
Read More >
5th Jun
Precedents
Business continuity plan—BCP1IntroductionIt is our policy to ensure that if our business is interrupted, we can become fully operational as quickly as...
Read More >
Produced in partnership with David Gilmore of DG Legal 5th Jun
Precedents
Remote working and removable media policy—law firms1Introduction1.1While remote working (whether at home or on the go) and removable media offer our...
Read More >
5th Jun
Precedents
Information and cybersecurity—supplier questionnaireIP COMPLETION DAY: 11pm (GMT) on 31 December 2020 marks the end of the Brexit...
Read More >
5th Jun
Precedents
Cybercrime prevention strategy and incident management plan1Introduction1.1This strategy and plan builds on and supplements our other data management...
Read More >
5th Jun
Precedents
How to spot a phishing email in under 15 secondsPhishing is where someone initiates an electronic communication such as an email which is designed to...
Read More >
5th Jun
Precedents
Password policy1Introduction1.1Passwords are a critical aspect of our information and cyber security measures. They are our first line of...
Read More >
5th Jun
Precedents
Training materials—cybercrime and cybersecurityThis Precedent presentation has been designed as an aid to train your staff on...
Read More >
5th Jun
Precedents
Social media activity monitoring formA: ReviewName of person(s) conducting review[Insert name(s)]Date of review [insert date]List of approved social...
Read More >
5th Jun
Precedents
Cybersecurity IT update logThis Precedent log can help you maintain information on the IT equipment your organisation has, if it is being used...
Read More >
5th Jun
Precedents
Policy—bring your own device (BYOD)From IP completion day (11pm on 31 December 2020), Retained Regulation (EU) 2016/679, UK General Data Protection...
Read More >
5th Jun
Precedents
ICT plan1Introduction1.1This plan outlines the [firm’s OR company’s OR current use of information and communication technology (ICT), future goals...
Read More >
5th Jun
Precedents
A-Z of cyberthreats—for staffThreatWhat is it?Our defensive measuresBotnetCollection of infected computers remotely controlled by a hacker.The hacker...
Read More >
5th Jun
Precedents
Cybercrime awareness campaignQuarter 1—Confidential informationThe tips and reminders for this quarter relate to confidential information. You can...
Read More >
5th Jun

Popular documents