Get a good background to data protection law and view practical guidance focused on data protection matters for commercial transactions. See also our UK GDPR compliant pro-party clauses for use in commercial agreements.
Protect trade secrets and know-how using the law of confidentiality. Get information and a set of pro-party confidentiality agreements here.
View a range of trackers to enable horizon scanning and monitoring of key developments. The trackers are maintained - making them useful for keeping up-to-date and for business development.
It’s our online practical guidance product for contentious and non-contentious lawyers dealing with Data Protection, Confidential Information, Privacy, Cybersecurity and Freedom of Information issues.
Welcome to this week’s edition of the Information Law weekly highlights: a hand-picked summary of news analysis, updates and new content related to...
The European Commission has adopted an implementing decision confirming that Brazil ensures an adequate level of protection for personal data...
Information Law analysis: This News Analysis provides a round-up of key developments in the field of Information Law in England & Wales and at...
The European Data Protection Board (EDPB) has published updated guidance on the EU–US Data Privacy Framework (DPF), including revised frequently asked...
Welcome to this week’s edition of the Information Law weekly highlights: a hand-picked summary of news analysis, updates and new content related to...
Boilerplate clauses in business-to-consumer contracts—general principlesThis Practice Note sets out the law on the use of boilerplate provisions in...
Boilerplate clauses in business-to-consumer contracts—specific clausesFORTHCOMING CHANGE: On 24 May 2024, the Digital Markets, Competition and...
Hague Convention on Choice of Court Agreements—scopeThis Practice Note considers the Hague Convention on Choice of Court Agreements which applies to...
Hague Convention on Choice of Court Agreements—jurisdictionThis Practice Note considers the application of the Hague Convention on Choice of Court...
Hague Convention on Choice of Court Agreements—enforcementThis Practice Note considers the Hague Convention on Choice of Court Agreements and its...
Consent to process personal data—sample wording1Consent to terms and conditions—not data processing consent[Insert Terms and conditions you are...
Key terms for insertion into a services contract for the appointment of a data protection representative in the UKNote: This precedent includes...
Standard contractual clauses for international transfers—2010—controller to processor—ICO templates [Archived]ARCHIVED: This Precedent has been...
UK GDPR—2022 standard contractual clauses (SCCs) for the transfer of personal data outside the UK—International Data Transfer Agreement (IDTA) In...
Personal data sharing schedule—controller to controller—pro-disclosing partyDefined terms: This precedent schedule uses the additional defined terms...
The UK General Data Protection Regulation (UK GDPR)—NavigatorThis Practice Note serves as a reference guide to the Retained Regulation (EU) 2016/679...
Privacy law—misuse of private informationThe tort of misuse of private information is focused on ‘the protection of human autonomy and dignity—the...
Confidentiality agreement—mutualThis Agreement is made on [date]Parties1[insert name of party] [of [insert details ] OR a company incorporated in...
The Information Commissioner’s Office (ICO)The Information Commissioner’s Office (ICO) is the UK’s independent regulator designed to uphold...
The UK General Data Protection Regulation (UK GDPR)This Practice Note provides a summary of the UK GDPR regime. For a higher-level introduction to UK...
Letter of claim—breach of confidence[Insert name and address of recipient]Dear [insert organisation name],[Name of client] and confidential...
Trade secrets and confidential information—protection and enforcementThis Practice Note sets out the protection available for trade secrets and...
Introduction to the EU GDPR and UK GDPRThis Practice Note provides a high-level introduction to the EU’s General Data Protection Regulation,...
Data protection, privacy and confidential information case law trackerThis Practice Note tracks noteworthy High Court, Court of Appeal and Supreme...
Commercial use of photographs—data protection and privacy issuesThis Practice Note addresses issues affecting professional photographers taking...
Letter of claim—breach of data protection law[Insert name and address of recipient]Dear [insert organisation name],[Name of client] and breach of data...
What does IP completion day mean for Information Law? [Archived]ARCHIVED: This Practice Note has been archived and is not maintained.11 pm (GMT) on 31...
Confidential information, privacy and injunctionsThis Practice Note deals with the general principles of obtaining an injunction relating to...
The Data Protection Act 2018This Practice Note introduces the UK’s Data Protection Act 2018 (DPA 2018).For higher-level introductions to data...
sending someone to another court (for example, from a magistrates' court to the Crown Court to be sentenced), or sending someone to be detained (for example, in prison);
in relation to a genetically modified organism, means any other organism whose genes or other genetic material is derived, through any number of generations, from that organism by any process of reproduction
Device fingerprinting involves the collection of various information elements to produce a unique pattern for identification. Online users can be tracked by combining a number of features including: • data derived from the configuration of a device • data exposed by the use of particular network protocols • cascading style sheet information • JavaScript objects • HTTP header information • clock information • transmission control protocol stack variation • installed fonts • installed plugins within the browser • use of application programming interfaces Fingerprinting can be used as an alternative to cookies and can be passive, without any obvious querying of the machine, or active, which involves more invasive querying.