Publications

FDO

Data Portability under the GDPR
24 May, 2017

The General Data Protection Regulation (“GDPR”) introduces the new right of data portability which provides for data subjects to receive personal data provided by them to a data controller in a structured, commonly used machine-readable format and to transmit those data to another data controller without hindrance. For example, if a customer wants to change […]

Read more
Enforcement of the GDPR
24 May, 2017

The most headline grabbing aspect of the GDPR is the massive fines that breaching it will attract. In the most serious cases these fines may be up to 4% of an organisation’s worldwide revenue or €20 Million, whichever is the greater. Your understanding of how the GDPR will be enforced is vital to avoiding such […]

Read more
Security. Compliance. Enforcement. Are you GDPR ready?
10 May, 2017

The laws relating to the processing of personal data will change in Europe on 25th May 2018. The General Data Protection Regulation (EU) 2016/679 (GDPR) will govern the processing of personal data with direct effect from 25th May 2018 replacing the existing legislative framework. A welcome and long-awaited change, the GPDR seeks to modernise and […]

Read more
NOWHERE TO HIDE – The New Beneficial Ownership Register Nine things you need to know
24 March, 2017

Corporate group structures are often utilised by companies in an effort to maintain the privacy of their owners. However, recent events, such as the ‘Panama Papers’ scandal, have brought the topic of corporate transparency to the forefront of both political and legal agendas. As a result of this, there has been an increased focus by […]

Read more
Cybersecurity Breaches The Risks and How to Mitigate Them
17 March, 2017

TIn the last 12 months, the number of cybersecurity attacks has grown significantly. The Central Bank of Ireland has also recently released its guidance paper on cybersecurity risk. Groups However, it is not just large institutions that need to be aware of this threat. Businesses of all sizes are potential targets to a cybersecurity attack. […]

Read more