Information assets & management

View Risk & Compliance by content type:

Latest Risk & Compliance News

Featured Risk & Compliance content

Practice notes
Dawn raid—who can raid my organisation and why?IP COMPLETION DAY: 11pm (GMT) on 31 December 2020 marks the end of the Brexit transition/implementation...
Read More >
Produced in partnership with Michael Potts of PCB Byrne 19th May
Practice notes
Conflicts of interest, confidentiality and disclosure 2019—in-house lawyersThe SRA Code of Conduct for Solicitors, RELs and RFLs (Code for Solicitors)...
Read More >
19th May
Practice notes
Brexit—exiting the EU under Article 50 [Archived]ARCHIVED: This Practice Note has been archived and is not maintained.This Practice Note contains...
Read More >
Produced in partnership with Adam Cygan of University of Leicester 19th May
Precedents
1DefinitionsModern Slavery Policy•means the Customer's anti-slavery and human trafficking policy as set out in Schedule [insert] as updated by the...
Read More >
19th May
Practice notes
High-risk third countries trackerOrganisations caught by the Money Laundering, Terrorist Financing and Transfer of Funds (Information on the Payer)...
Read More >
19th May
Practice notes
Active bribery, passive bribery and bribing foreign public officialsThe purpose of this Practice Note is to provide a general understanding of the...
Read More >
Produced in partnership with Joanne Kane of Carmelite Chambers 19th May
Practice notes
Money Laundering Regulations 2017—simplified due diligenceYou may apply simplified customer due diligence (SDD) measures in relation to particular...
Read More >
19th May
Practice notes
Proceeds of Crime Act 2002—key information for businessesThe Proceeds of Crime Act 2002 (POCA 2002) came into force on 24 February 2003. It applies to...
Read More >
19th May
Practice notes
Brexit legislation trackerThis Practice Note tracks the progress of UK legislation introduced as part of the legislative project associated with the...
Read More >
19th May
Practice notes
Tipping-off and prejudicing an investigationThere are several offences of tipping-off and prejudicing an investigation that apply to the regulated...
Read More >
19th May
Precedents
In briefThis precedent links to: •a template created by the UK Information Commissioner’s Office (ICO) of the ‘Set II’ or ‘2004’ EU Standard...
Read More >
19th May
Practice notes
Introduction to retained EU lawThis Practice Note provides an introduction to retained EU law. It provides an overview of the key definitions and...
Read More >
Produced in partnership with Dr. Kieran Laird of Gowling WLG 19th May
Practice notes
SRA Code of Conduct for Solicitors, RELs and RFLs—for in-house lawyersThis Practice Note provides guidance for in-house solicitors on the SRA Code of...
Read More >
19th May
Precedents
1IntroductionThis financial sanctions policy is designed to ensure we comply with applicable financial sanctions laws made under the UK sanctions...
Read More >
19th May
Practice notes
Getting the Deal Through: Merger Control 2021Jurisdictions coveredThe following jurisdictions are covered in this report:Albania; Australia; Austria;...
Read More >
19th May
Practice notes
Working with European lawyers—the Registered European Lawyer (REL) regimeAt 11 pm (GMT) on 31 December 2020, the Brexit transition/implementation...
Read More >
19th May

Most recent Information assets & management content

Practice notes
The Chartered Governance Institute guidance on cyber riskThis guidance, dated June 2013, produced by The Chartered Governance Institute (formerly...
Read More >
4th Aug
Practice notes
Websites—compliance requirementsThis Practice Note provides guidance on the key legal and compliance requirements that a website operator should...
Read More >
3rd Aug
Precedents
IP audit questionnaire—trademarks1Background informationYour name and role[insert name and role of person being interviewed or completing a...
Read More >
1st Aug
Precedents
Records retention schedule1Introduction1.1This Record retention schedule accompanies and is incorporated into [insert organisation’s name]’s Records...
Read More >
1st Aug
Precedents
IP audit questionnaire—copyright and database rights1Background informationYour name and role[insert name and role of person being interviewed or...
Read More >
1st Aug
Precedents
Sample data processing map1Identify and document why the organisation processes personal dataRather than trawling the organisation for personal data...
Read More >
1st Aug
Precedents
IP audit questionnaire—domain names1Background informationYour name and role[insert name and role of person being interviewed or completing a...
Read More >
1st Aug
Precedents
Passwords—quick guide to getting it rightThis quick guide can help you to create a strong password (that you won’t forget) and maintain the best...
Read More >
1st Aug
Practice notes
Formulating an information management and security policyThis Practice Note is intended to help you to draft a robust information management and...
Read More >
1st Aug
Practice notes
Bring your own device (BYOD)What is BYOD?'Bring your own device' (BYOD) refers to arrangements where an organisation allows designated employees to...
Read More >
1st Aug
Precedents
Data protection risk assessment—short form1Background informationAssessment for:[state whether the assessment relates to the whole firm or a specific...
Read More >
1st Aug
Precedents
Data mapping—internal questionnaireIt is important that we understand what personal data we hold, so we can take steps to protect that data, as...
Read More >
1st Aug
Precedents
Patch registerThis Precedent Patch register is designed to help you keep track of the software patches applied in your organisation, and to log any...
Read More >
1st Aug
Precedents
Clear desk and clear screen policy1Purpose and application1.1This policy sets out the measures you are expected to take to protect personal data and...
Read More >
1st Aug
Practice notes
Information security risk management guideWhy you need to manage this riskInformation is an asset. Preserving and protecting that asset is critical to...
Read More >
1st Aug
Practice notes
Information security—data protection complianceYou must have appropriate security in place to prevent personal data being accidentally or deliberately...
Read More >
1st Aug
Precedents
Trade secret and confidential information—assessment1Background informationCompany name[insert organisation’s name]Date[insert date]2Physical security...
Read More >
1st Aug
Practice notes
Information security—passwordsPasswords are a widely available method of protecting access to personal data and the systems used to process it. They...
Read More >
1st Aug
Q&As
How can I ensure my organisation and staff stay safe while using video-conferencing during the coronavirus (COVID-19) pandemic?With the urgent move to...
Read More >
1st Aug
Practice notes
Managing trade secrets and confidential informationEvery organisation holds a body of information which it considers would, if disclosed, damage its...
Read More >
1st Aug

Popular documents