The Information Commissioner of the Isle of Man has issued guidance on “accountability” under GDPR. Being accountable means that all processing of personal data should be subject to overview, governance, and demonstrable compliance. Regular monitoring, review and revision is required to ensure that processes, procedures and documentation remain fit for purpose, reflect the realities of […]
This guide examines techniques for improving consumers’ understanding of contractual terms, conditions and privacy policies. The focus is on methods offering low-cost, practical and scalable solutions. The guidance draws on new research and includes a review of the existing academic literature.
Baker McKenzie is pleased to bring you our 2019 Global Data Privacy & Security Handbook which now combines and consolidates our renowned privacy related handbooks into one resource. Baker McKenziehave revised the content to make it more concise, comparable and practice-relevant while still providing detailed overviews of the increasingly complex and sophisticated data privacy and security standards […]
The GDPR gives people the right not to be subject to solely automated decisions, including profiling, which have a legal or similarly significant effect on them. These provisions restrict when you can carry out this type of processing and give individuals specific rights in those cases.
DataGuidance by OneTrust and Latham & Watkins hosted a webinar on employee monitoring and data protection. During this webinar, our panel of expert speakers discussed a comparative German v. UK employee monitoring case study, and gave practical guidance on how to find the right balance between effective employee monitoring and the strict legal requirements for […]
This guidance will help you to understand the importance of encryption as an appropriate technical measure to protect the personal data you hold. Whether you are a controller or a processor, encryption is a technique that you can use to protect personal data. The guidance outlines the concept of encryption in the context of the […]