Information security

Information security has become a business-critical issue. It is not something you can tackle in isolation, as there are obvious overlaps with cyber security and data protection.

A logical process for reviewing and addressing your information security requirements is to:

  1. identify what information you hold, manage or are responsible for

  2. assess the risks to that information

  3. implement systems and controls to protect the information and mitigate risks so far as reasonably practicable

  4. train your staff to include ongoing awareness campaigns

  5. review your processes on a recurring basis, at least annually

Regulatory requirements

SRA

You must protect client money and assets.

You must also keep the affairs of clients confidential unless disclosure is required or permitted by law or the client consents.

Data protection

Integrity and confidentiality of personal data is a key principle of the Assimilated Regulation (EU) 2016/679, General Data Protection Regulation (UK GDPR). Personal data must be processed in a manner that ensures appropriate security, including protection against unauthorised or unlawful processing and against accidental loss, destruction or damage, using appropriate technical or organisational measures. This is

To view the latest version of this document and thousands of others like it, sign-in with LexisNexis or register for a free trial.

Powered by Lexis+®
Latest Practice Compliance News
View Practice Compliance by content type :

Popular documents