computer law training new logo

Training and consultancy
in data protection and GDPR

t. 01506 324468
e. info@computerlaw.org.uk

Tag

// Compliance
NOV
05
2018

Article 32 – GDPR

At some point in most of my GDPR training sessions I point out that Article 32 is my favourite article of the Regulation.  Why do I do this?  Partly because I like to see the reaction on people’s faces and … well … partly because it is my favourite article! Article 32 Explained
OCT
24
2018

They’re all asking for Certificates!

Employers – that is…. So you’re thinking of applying for a job as a: Data Protection Officer Data Protection Manager Data Protection and Information Asset Advisor Data Protection Project Lead;   and you need a certificate to prove your experience. Or,
SEP
07
2018

Why Use Data Protection Consultants?

How Can Data Protection Consultancy Services Reduce your Overhead? Why would you use a data protection consultant?  The simple answer is because you want to comply with the legislation but don’t know where to start.  Let’s explore this a bit further. You probably know that recent
AUG
21
2018

What about photography at events?

What are the GDPR consent issues for photographers and event managers? There’s a few … and these are particularly relevant for photographers, journalists and event managers. Let’s look at an example.  I recently attended a business networking event where the
AUG
13
2018

Is the GDPR being enforced?

After all the noise about massive GDPR penalties it might look as if the GDPR isn’t being enforced in the UK. All the fines currently issued by the ICO are still based on the old legislation – the Data Protection Act 1998 and the Privacy and Electronic Communications
MAR
19
2016

Ransomware – taking your data hostage

What is ransomware? Recently there has been a huge increase in the number of organisations which have suffered a ransomware attack. It is malware which encrypts all files on your computer and any network drives it can access, so that these files cannot be used: this may well be
JUL
28
2014

We’re a small firm, no-one will hack us…

We’ve been hacked… …but it is only a list of names and email addresses, nothing too sensitive. How many times have I heard this? Let’s think for a moment about how phishing works. You receive an email apparently from a well-known bank, asking you to update