Wildy Logo
(020) 7242 5778
enquiries@wildy.com

Book of the Month

Cover of Borderlines in Private Law

Borderlines in Private Law

Edited by: William Day, Julius Grower
Price: £90.00

Lord Denning: Life, Law and Legacy



  


Welcome to Wildys

Watch


NEW EDITION
The Law of Rights of Light 2nd ed



 Jonathan Karas


Offers for Newly Called Barristers & Students

Special Discounts for Newly Called & Students

Read More ...


Secondhand & Out of Print

Browse Secondhand Online

Read More...


Data Protection Implementation Guide: A Legal, Risk and Technology Framework for GDPR (eBook)


ISBN13: 9789403529011
Published: September 2021
Publisher: Kluwer Law International
Country of Publication: Netherlands
Format: eBook (ePub)
Price: £123.00
The amount of VAT charged may change depending on your location of use.


The sale of some eBooks are restricted to certain countries. To alert you to such restrictions, please select the country of the billing address of your credit or debit card you wish to use for payment.

Billing Country:


Sale prohibited in
Korea, [North] Democratic Peoples Republic Of

Due to publisher restrictions, international orders for ebooks may need to be confirmed by our staff during shop opening hours. Our trading hours are Monday to Friday, 8.30am to 5.00pm, London, UK time.


The device(s) you use to access the eBook content must be authorized with an Adobe ID before you download the product otherwise it will fail to register correctly.

For further information see https://www.wildy.com/ebook-formats


Once the order is confirmed an automated e-mail will be sent to you to allow you to download the eBook.

All eBooks are supplied firm sale and cannot be returned. If you believe there is a fault with your eBook then contact us on ebooks@wildy.com and we will help in resolving the issue. This does not affect your statutory rights.

This eBook is available in the following formats: ePub.

In stock.
Need help with ebook formats?




Also available as

Data Protection Implementation Guide is a renowned pragmatic guide to implementing the General Data Protection Regulation (GDPR) that provides a step-by-step project management approach to building a GDPR-compliant data protection system, assessing, and documenting the risks involved, and then carrying out these changes through processes at the operational level. The complexities of putting into action the GDPR continue to grow as it proceeds through new and ever-changing technologies, business models, codes of conduct, and decisions of the supervisory authorities and the courts. It has been written in an original, problem-solving style by a highly accomplished data protection expert proficient in both law and technology.

What’s in this book:

Delving deep into case law (Member State, ECJ, and ECHR), especially where affecting high-risk areas that have attracted scrutiny, the guidance advances systematically through the following topics and issues:

  • required documentation, policies, and procedures
  • risk assessment tools and analysis frameworks
  • children’s data
  • employee and health data
  • international transfers post-Schrems II
  • data subject rights including the right of access
  • data retention and erasure
  • tracking and surveillance, and
  • effects of technologies such as artificial intelligence, biometrics, and machine learning

How this will help you:

Building on the practical examples derived from the author’s experience in structuring GDPR-compliant software along with its in-depth analysis of case law and enforcement priorities, this one-of-a-kind guide empowers company data protection officers and compliance staff to advise on vital issues with full awareness of the legal and reputational risks and how to mitigate them. It will also be highly appreciated by concerned regulators and policymakers at all government levels.

Subjects:
Data Protection, eBooks
Contents:
1. Data Protection Projects: Building an Inventory
2. Gap Analysis – Identifying the Enterprise’s Gaps
3. Legal Bases for Processing
4. Article 30 Record Keeping
5. Breaches, Incident Response, Security and Controls
6. Data Protection Impact Assessments
7. Retention of Data and the Right to Erasure
8. Data Protection by Design and Default
9. Data Subject Rights
10. Automated Decision-Making and Profiling Technologies
11. Children’s Data under the GDPR
12. CCTV, Video, and IP Cameras
13. Facial Recognition and Biometrics
14. Third-Country Transfers outside the EEA
15. Data Protection of Employees in the Workplace
16. Processing Employee Health Data
17. Surveillance in the Workplace
table of cases