Information assets & management

Information assets & management guidance:

This Practice Note is intended as a quick guide which outlines the main cyber threats commercial organisations face, and identifies some top tips for firms in defending...

Practice Note

ThreatWhat is it?Our defensive measures BotnetCollection of infected computers remotely controlled by a hacker.The hacker can share or sell access to the computers to...

Precedents

Brexit: As of exit day (31 January 2020), the UK is no longer an EU Member State, but it has entered an implementation period during which it continues to be treated by...

Practice Note

Produced in partnership with David Gilmore of DG Legal 1 Introduction It is our policy to ensure that if our business is interrupted, we can become fully operational as...

Precedents

1 Responsibility 1.1 [Insert name and/or job title eg, The Risk manager] is responsible for this policy. 1.2 They are responsible for communicating the contents of this...

Precedents

Confidentiality and disclosure policy 1 Policy statement 1.1 It is the policy of [firm name] (‘the firm’) to conduct its business in compliance with the highest...

Precedents

This Practice Note summarises key points from the first legal threat report published by the National Cyber Security Centre (NCSC). The report has been compiled with the...

Practice Note

Quarter 1—Confidential information The tips and reminders for this quarter relate to confidential information. You can find more specific information in the following...

Precedents

Corporate finance transactions are a prime target for cyber criminals due to the: • number of people involved • large volume of information being shared • extent to which...

Practice Note

Brexit: As of exit day (31 January 2020), the UK is no longer an EU Member State, but it has entered an implementation period during which it continues to be treated by...

Practice Note

Cybercrime is a fast-moving, ever-evolving unpredictable risk to all commercial organisations which must be managed properly. It's estimated that up to 80 per cent of...

Practice Note

1 Introduction 1.1 This strategy and plan builds on and supplements our other data management and security policies and procedures, namely our: 1.1.1 [[Data protection...

Precedents

1. Introduction We have performed an organisation-wide assessment of the risk of our systems and/or services falling victim to cybercrime. The review included...

Precedents

The rapid growth of the internet has transformed the way we work. Indeed, the UK has one of the most internet-based economies in the world, with the UK internet market...

Practice Note

Brexit: As of exit day (31 January 2020), the UK is no longer an EU Member State, but it has entered an implementation period during which it continues to be treated by...

Practice Note

A: General information Date of annual review[Insert date] Person(s) conducting annual review[Insert name of person conducting annual review] B: Review and findings Are...

Precedents

This Practice Note provides information on formulating, drafting and implementing a strategic (information and communication technology) ICT plan. What is ICT?...

Practice Note

Brexit: As of exit day (31 January 2020), the UK is no longer an EU Member State, but it has entered an implementation period during which it continues to be treated by...

Practice Note

Brexit: As of exit day (31 January 2020), the UK is no longer an EU Member State, but it has entered an implementation period during which it continues to be treated by...

Practice Note

Brexit: As of exit day (31 January 2020), the UK is no longer an EU Member State, but it has entered an implementation period during which it continues to be treated by...

Practice Note

Click here to download the latest Cybersecurity 2019 report, published by Getting the Deal Through. Jurisdictions covered The following jurisdictions are covered in this...

Practice Note

Click here to download the latest Cybersecurity 2020 report, published by Getting the Deal Through. Jurisdictions covered The following jurisdictions are covered in this...

Practice Note

Phishing is where someone initiates an electronic communication such as an email which is designed to trick the user for the purpose of stealing sensitive information...

Precedents

A: General information Date of review Person(s) conducting review B: Review and findings Have any of your [firm OR organisation’s] key business objectives changed in such...

Precedents

1 Introduction 1.1 This plan outlines the [firm’s OR company’s OR current use of information and communication technology (ICT), future goals for the use of ICT and key...

Precedents

A: General information Date of review Person(s) conducting review B: Review and findings Have any of your [firm’s OR organisation’s] key business objectives changed in a...

Precedents
Trending Topics
In-House COVID-19