Practicalities of managing the controller-processor relationship

The General Data Protection Regulation (GDPR) places data processors under direct regulatory responsibility for the first time, recognising their importance in the data supply chain. This will have a significant impact on the data controller-data processor relationship relating to the content of data processing contracts. Under the GDPR, any data processing contracts that run beyond […]

The Non-Petya cyber-attack and how to protect yourself from others like it

What is ransomware, and how does it differ from malware? Ransomware is malware. The term ‘malware’ is short for malicious software, and applies to a broader group of software tools which all aim at harming and infecting the end user’s system. Malware includes viruses, worms, trojan horses, spyware, adware and ransomware. Ransomware is a particularly […]

How to manage a GDPR project

The EU’s General Data Protection Regulation (“GDPR”) will take effect in a little over ten months. Compliance with the GDPR is likely to be a key project for many companies, especially the far reaching nature of the requirements under the GDPR and potential fines for non-compliance of up to 4% of annual worldwide turnover. At […]