top of page
![data protection header image bg-06.jpg](https://static.wixstatic.com/media/11dde6_8f124ac4081a4a2db0a3edac4e782076~mv2.jpg/v1/fill/w_980,h_440,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/11dde6_8f124ac4081a4a2db0a3edac4e782076~mv2.jpg)
EXPERTISE
Our areas of expertise include the following:
![TICK ICON-06.png](https://static.wixstatic.com/media/11dde6_3c1c6eb64787441386ac2f0cfa689554~mv2.png/v1/fill/w_20,h_20,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/TICK%20ICON-06.png)
Personal Data Protection Compliance
![TICK ICON-06.png](https://static.wixstatic.com/media/11dde6_3c1c6eb64787441386ac2f0cfa689554~mv2.png/v1/fill/w_20,h_20,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/TICK%20ICON-06.png)
Data Breaches
![TICK ICON-06.png](https://static.wixstatic.com/media/11dde6_3c1c6eb64787441386ac2f0cfa689554~mv2.png/v1/fill/w_20,h_20,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/TICK%20ICON-06.png)
Data Privacy Training
![TICK ICON-06.png](https://static.wixstatic.com/media/11dde6_3c1c6eb64787441386ac2f0cfa689554~mv2.png/v1/fill/w_20,h_20,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/TICK%20ICON-06.png)
Data Privacy Statements
![TICK ICON-06.png](https://static.wixstatic.com/media/11dde6_3c1c6eb64787441386ac2f0cfa689554~mv2.png/v1/fill/w_20,h_20,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/TICK%20ICON-06.png)
Data Processing Agreements
EXPERTISE
Additional Lists:
![TICK ICON-06.png](https://static.wixstatic.com/media/11dde6_3c1c6eb64787441386ac2f0cfa689554~mv2.png/v1/fill/w_20,h_20,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/TICK%20ICON-06.png)
Compliance strategies that prevent and limit risk
![TICK ICON-06.png](https://static.wixstatic.com/media/11dde6_3c1c6eb64787441386ac2f0cfa689554~mv2.png/v1/fill/w_20,h_20,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/TICK%20ICON-06.png)
Managing risks through contracts with customers and suppliers
![TICK ICON-06.png](https://static.wixstatic.com/media/11dde6_3c1c6eb64787441386ac2f0cfa689554~mv2.png/v1/fill/w_20,h_20,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/TICK%20ICON-06.png)
Crisis management when a data breach occurs
![TICK ICON-06.png](https://static.wixstatic.com/media/11dde6_3c1c6eb64787441386ac2f0cfa689554~mv2.png/v1/fill/w_20,h_20,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/TICK%20ICON-06.png)
Data transfers abroad – advising on risks and issues
![TICK ICON-06.png](https://static.wixstatic.com/media/11dde6_3c1c6eb64787441386ac2f0cfa689554~mv2.png/v1/fill/w_20,h_20,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/TICK%20ICON-06.png)
Data protection and cyber risk due diligence in relation to acquisitions, dispositions and third party agreements
![TICK ICON-06.png](https://static.wixstatic.com/media/11dde6_3c1c6eb64787441386ac2f0cfa689554~mv2.png/v1/fill/w_20,h_20,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/TICK%20ICON-06.png)
Investigations management – when faced with regulatory action for data security breaches
![](https://static.wixstatic.com/media/11dde6_3ee2462ccc3f498ab057eb90d9caa5b2~mv2.jpg/v1/fill/w_1469,h_686,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/11dde6_3ee2462ccc3f498ab057eb90d9caa5b2~mv2.jpg)
bottom of page