Wildy Logo
(020) 7242 5778
enquiries@wildy.com

Book of the Month

Cover of Borderlines in Private Law

Borderlines in Private Law

Edited by: William Day, Julius Grower
Price: £90.00

Lord Denning: Life, Law and Legacy



  


Welcome to Wildys

Watch


NEW EDITION
The Law of Rights of Light 2nd ed



 Jonathan Karas


Offers for Newly Called Barristers & Students

Special Discounts for Newly Called & Students

Read More ...


Secondhand & Out of Print

Browse Secondhand Online

Read More...


This book is now Out of Print.
A new edition has been published, the details can be seen here:
Data Protection Toolkit 2nd ed isbn 9781784460884

Data Protection Toolkit


ISBN13: 9781907698927
New Edition ISBN: 9781784460884
Published: June 2014
Publisher: Law Society Publishing
Country of Publication: UK
Format: Paperback & CD-ROM
Price: Out of print



All solicitors are processing the personal data of clients, which they and their staff must keep secure to observe the duty of confidentiality. Outcome (7.5) of the SRA Code of Conduct requires firms to comply with data protection legislation.

Failure to comply with the statutory and regulatory requirements leaves practices open to disciplinary sanction from the SRA/SDT and enforcement action, including fines up to £500,000 from the Information Commissioner.

Data Protection Toolkit comprehensively looks at the impact of data protection requirements on all staff, including COLPs and COFAs. It provides a number of easy-to-adapt precedents and templates to ensure that practices meet all of the legal and regulatory requirements to protect personal data.

The toolkit takes a holistic approach to data protection obligations in a legal firm and includes information on:-

  • systems and processes
  • managing risk
  • managing client information
  • data security and encryption
  • monitoring and auditing compliance.

Subjects:
Data Protection, Legal Practice Management
Contents:
Part 1: Setting the scene
1. Setting up systems
2. Assessing the risk to the legal practice

Part 2: Client interface
3. Client inception
4. Ongoing monitoring
5. Data security
6. DPA and third parties
7. Subject access requests
8. Complaints handling
9. Documentation retention and destruction

Part 3: Making sure it all works
10. Training
11. Monitoring and auditing compliance.