Get a good background to data protection law and view practical guidance focused on data protection matters for commercial transactions. See also our UK GDPR compliant pro-party clauses for use in commercial agreements.
Protect trade secrets and know-how using the law of confidentiality. Get information and a set of pro-party confidentiality agreements here.
View a range of trackers to enable horizon scanning and monitoring of key developments. The trackers are maintained - making them useful for keeping up-to-date and for business development.
It’s our online practical guidance product for contentious and non-contentious lawyers dealing with Data Protection, Confidential Information, Privacy, Cybersecurity and Freedom of Information issues.
This week’s edition of Information Law weekly highlights includes a hand-picked summary of news analysis, updates and new content related to laws...
The Department for Science, Innovation and Technology (DSIT) has invited organisations to adopt a voluntary Cyber Resilience Pledge aimed at...
The European Union Agency for Cybersecurity (ENISA) has published version 2.0 of its national capabilities assessment framework (NCAF), designed to...
The National Cyber Security Centre (NCSC) has published guidance on cross-domain approaches and architecture, explaining how organisations can safely...
Public Law analysis: Ecotricity, a green energy company, made two Freedom of Information Act requests to the Animal and Plant Health Agency (APHA) for...
This Practice Note sets out the protection available for trade secrets and confidential information in a commercial context, in particular in cases...
This Practice Note provides practical guidance on the execution of documents by unincorporated charities.For information on the execution of documents...
This Practice Note provides practical guidance on the proper execution of simple contracts and deeds for administrators.An administrator can be...
This Practice Note considers exclusion and limitation of liability in business-to-business (B2B) contracts. It provides guidance on the common law and...
This guide sets out how e-signatures are used in various international jurisdictions. The table provides a quick-reference summary of whether...
1In this [clause], UK Addendum means the International Data Transfer Addendum to the EU Commission Standard Contractual Clauses (version B.1.0) issued...
1In this clause 1, UK Addendum means the International Data Transfer Addendum to the EU Commission Standard Contractual Clauses (version B.1.0) issued...
1In this clause 1, UK Addendum means the International Data Transfer Addendum to the EU Commission Standard Contractual Clauses (version B.1.0) issued...
1In this clause 1, UK Addendum means the International Data Transfer Addendum to the EU Commission Standard Contractual Clauses (version B.1.0) issued...
Stop press: The Data (Use and Access) Act 2025 (Commencement No 6 and Transitional and Saving Provisions) Regulations 2026, SI 2026/82 bring into...
The UK General Data Protection Regulation (UK GDPR)—NavigatorThis Practice Note serves as a reference guide to the Retained Regulation (EU) 2016/679...
Privacy law—misuse of private informationThe tort of misuse of private information is focused on ‘the protection of human autonomy and dignity—the...
Confidentiality agreement—mutualThis Agreement is made on [date]Parties1[insert name of party] [of [insert details ] OR a company incorporated in...
The Information Commissioner’s Office (ICO)The Information Commissioner’s Office (ICO) is the UK’s independent regulator designed to uphold...
The UK General Data Protection Regulation (UK GDPR)This Practice Note provides a summary of the UK GDPR regime. For a higher-level introduction to UK...
Letter of claim—breach of confidence[Insert name and address of recipient]Dear [insert organisation name],[Name of client] and confidential...
Trade secrets and confidential information—protection and enforcementThis Practice Note sets out the protection available for trade secrets and...
Introduction to the EU GDPR and UK GDPRThis Practice Note provides a high-level introduction to the EU’s General Data Protection Regulation,...
Data protection, privacy and confidential information case law trackerThis Practice Note tracks noteworthy High Court, Court of Appeal and Supreme...
Commercial use of photographs—data protection and privacy issuesThis Practice Note addresses issues affecting professional photographers taking...
Letter of claim—breach of data protection law[Insert name and address of recipient]Dear [insert organisation name],[Name of client] and breach of data...
What does IP completion day mean for Information Law? [Archived]ARCHIVED: This Practice Note has been archived and is not maintained.11 pm (GMT) on 31...
Confidential information, privacy and injunctionsThis Practice Note deals with the general principles of obtaining an injunction relating to...
The Data Protection Act 2018This Practice Note introduces the UK’s Data Protection Act 2018 (DPA 2018).For higher-level introductions to data...
Under Article 17 of the NIS Directive, each EU Member State is required to designate one or more national competent authorities on the security of network and information systems. In the UK, the government decided that a multiple Competent Authorities approach, with each Competent Authority having a detailed understanding of the individual sectors and their associated challenges, was the most appropriate approach, and this approach continues post-Brexit. NIS Regulations, Sch 1 lists the Competent Authorities that have been designated for each sector or subsector.
“Entity data” means any data which— (a) is about— (i) an entity, (ii) an association between a telecommunications service and an entity, or (iii) an association between any part of a telecommunication system and an entity, (b) consists of, or includes, data which identifies or describes the entity (whether or not by reference to the entity's location), and (c) is not events data.
If a service allows the placement of cookies by third parties, they should be named and information should be given about the purposes for which those cookies will be used As explained in Clear and comprehensive information, third parties given access to any cookies must also be appropriately identified.