Cyber & Data Protection
The substantial increase in data breaches and the changing landscape in reporting regulations have led to a heightened awareness of the need for network security and data protection. The potential financial and reputational implications of a cyber incident are becoming a board level concern across all organisations.
Our lawyers recognise that clients face different challenges when it comes to cyber security and insurance. Whether advising insurers or their policyholders we ensure we understand the client’s objectives and provide advice tailored to meet those individual needs.
With the upcoming implementation of the General Data Protection Regulation (“GDPR”) we are advising our clients on how the new legislation will impact them to enable them to achieve compliance before May 2018.
We advise clients on their compliance with EU and international data protection regulations. We provide advice on the effect of the implementation of the new GDPR and the associated EU Directive on data protection. In particular we consider how they will affect a client’s organisation and what our clients can do now to ensure they will be compliant when the legislation comes into force.
Whether as a result of “silent cyber” or out-dated terminology, determining whether a loss is covered is not always a straightforward exercise. Our lawyers understand the technical aspects of cyber covers in the marketplace and are able to advise whether there is coverage within the terms of a policy.
We advise on policy wordings and the development of products to respond to market demands.
Our lawyers have drawn on their contacts across the insurance market to put together a team of experts that specialise in every stage of cyber security.
From preventative risk management to post-breach instant response we are able to connect our clients with an expert in the required discipline. We offer advice to ensure clients obtain policies that suit their specific requirements. If the worst occurs, we can assemble a team of technical experts to locate the source of the breach. Whatever happens, we and our contacts are on hand to minimise interruption to the business and contain the extent of any prospective loss.