1. man writing on paper and computers conduction some type of assessment

    GDPR Audits

    GDPR Audits: Your Essential Guide Following the UK’s withdrawal from the European Union, the General Data Protection Regulation (GDPR) has been adopted by the UK as its own law. This means organisations operating within the UK or handling the data of UK citizens still have a vital responsibility to comply with its regulations. This Guide…

  2. GDPR Breach

    Is Your Breach Response a Black Hole?

    Is Your Breach Response a Black Hole? UK DPOs Face Shocking Delays (and Fines) With UK GDPR regulations placing data protection at the forefront, organisations are facing a new reality: data breaches can be not just a security risk, but a significant financial one and the consequences for organisations can be severe. But a new…

  3. GDPR Breaches: What You Need to Know

    GDPR Breaches: What You Need to Know With the rise of online activity, businesses of all sizes collect and store vast amounts of personal data. This data, ranging from names and email addresses to financial information and health records, must be protected. To ensure this critical protection, the UK General Data Protection Regulation (UK GDPR),…

  4. computer displaying login screen for password

    World Password Day: A Guide to Bulletproof Passwords

    World Password Day: A Guide to Bulletproof Passwords Strong password practices are essential for ensuring the security of our online identities and data. Weak passwords leave sensitive information vulnerable to data breaches and cyberattacks.  This guide equips you with the knowledge and tools to transform from a password punching bag into a champion of online…

  5. Exploring Individual Rights

    Exploring Individual Rights The ever-evolving field of data protection law can be a minefield for businesses of all sizes. Balancing the rights of individuals with the operational needs of your organisation is a constant challenge, especially when it comes to fulfilling individual rights requests. During this week’s episode of the Data Protection Made Easy podcast we…

  6. Grindr Faces UK Lawsuit Over Alleged Sharing of HIV Data: Hear what our experts have to say about this breach.

    Grindr Faces UK Lawsuit

    Grindr Faces UK Lawsuit Over Alleged Sharing of HIV Data Grindr, the popular dating app for gay, bi, trans, and queer people, is under fire for its data protection practices. Hundreds of users in the UK have filed a lawsuit against the company, alleging that their private information, including HIV status, was shared with third…

  7. AI Facial Recognition

    Can AI be Racist?

    Technology continues to reshape our world, offering solutions that streamline daily tasks and enhance security. However, with every innovation comes a responsibility to acknowledge its potential downsides. This blog post dives into the question can AI be Racist? and focuses two key areas where the ethical use of technology is paramount: facial recognition and data…

  8. Cyber Security Support

    How to Successfully Communicate Between Privacy and IT Teams

    Data protection regulations like the UK GDPR and CCPA are constantly evolving, placing immense pressure on organisations to ensure compliance. But achieving a robust data security posture isn’t solely the responsibility of the legal or compliance teams. In today’s data-driven world, engineers play a pivotal role in safeguarding sensitive information. This blog explores how to…

  9. Woman on a laptop

    GDPR for Small Business: Data Protection Explained

    In March, our Data Protection Made Easy podcast hosts, Jasmine Harrison, Joe Kirk and Phil Brining, discussed the challenges small and large businesses face when complying with GDPR.  Data protection is considered a significant burden for small businesses. Resource constraints, compliance hurdles and a general lack of awareness make GDPR compliance seem like a distant…

  10. Data Protection Consultancy

    How To Complete A ROPA

    Record of Processing Activities (ROPA): Ensure Compliance and Build Trust Experts at Data Protection People host a training program designed to show you How To Complete A ROPA and more importantly how to maintain one. Uncertain about navigating the complexities of Records of Processing Activities (ROPA)? Our comprehensive ROPA training program empowers you to create…

1 2 3 28

Subscribe to Our Newsletter

Our mission is to make data protection easy: easy to understand and easy to do. We do that through the mantra of benchmark, improve, maintain.

Hidden
This field is for validation purposes and should be left unchanged.