Get a good background to data protection law and view practical guidance focused on data protection matters for commercial transactions. See also our UK GDPR compliant pro-party clauses for use in commercial agreements.
Protect trade secrets and know-how using the law of confidentiality. Get information and a set of pro-party confidentiality agreements here.
View a range of trackers to enable horizon scanning and monitoring of key developments. The trackers are maintained - making them useful for keeping up-to-date and for business development.
It’s our online practical guidance product for contentious and non-contentious lawyers dealing with Data Protection, Confidential Information, Privacy, Cybersecurity and Freedom of Information issues.
The European Commission has fined Apple €500m and Meta €200m for breaching EU Digital Markets A...
The French Data Protection Authority (CNIL) has published recommendations on 18 April 2025 from...
Law360: The UK privacy watchdog, the Information Commissioners' Office (ICO) said on 16 April 2...
The Supreme Court unanimously dismissed the hospitals’ appeals in these cases concerning withdr...
Welcome to this week’s edition of the Information Law weekly highlights: a hand-picked summary ...
Direct marketingThis Practice Note analyses legal and commercial issues arising out of direct marketing activities. It covers the relevant provisions...
Data (Use and Access) Bill—trackerThis Practice Note tracks key developments in the progress of the Data (Use and Access) Bill (DUA Bill or the Bill),...
UK GDPR and EU GDPR—extra-territorial reachThis Practice Note provides a high-level overview of the provisions relating to extra-territorial reach and...
Differences between Environmental Information Regulations and Freedom of Information ActSimilarities between Freedom of Information Act and...
Determining roles under data protection law in commercial transactions between businesses (processor, independent controller or joint controller)This...
Hardship clauseHardship•means[, subject to clause [1.6 OR 1.7],] a [fundamental OR material] change in the balance of a party’s benefits and...
Mobile app privacy policy—genericpolicy version: [insert date of this policy][ — for previous versions of this policy see here][Insert name of mobile...
Confidentiality and personal data sharing agreement—one-way—pro-recipientThis Agreement is made on [date]Parties1[Insert name of party] [of [insert...
Confidentiality agreement—one-way—pro-discloserThis Agreement is made on [date]Parties1[Insert name of party][ of [insert details] OR a company...
Claim form (defamation)—the contentsThe purpose of the claim formThe claim form is the document used to start proceedings. It contains information...
The UK General Data Protection Regulation (UK GDPR)—NavigatorThis Practice Note serves as a reference guide to the Retained Regulation (EU) 2016/679...
Managing a breach of confidentiality or information securityMany companies and government bodies (such as HMRC) have been exposed to loss of...
The Information Commissioner’s Office (ICO)The Information Commissioner’s Office (ICO) is the UK’s independent regulator designed to uphold...
Privacy law—misuse of private informationThe tort of misuse of private information is focused on ‘the protection of human autonomy and dignity—the...
Data protection, privacy and confidential information case law trackerThis Practice Note tracks noteworthy High Court, Court of Appeal and Supreme...
Introduction to the EU GDPR and UK GDPRThis Practice Note provides a high-level introduction to the EU’s General Data Protection Regulation,...
Key definitions under data protection lawThis Practice Note provides further guidance on key definitions used in the EU’s General Data Protection...
UK GDPR—extra-territorial reachThis Practice Note discusses the territorial scope of the regime established by the United Kingdom General Data...
Letter of claim—breach of confidence[Insert name and address of recipient]Dear [insert organisation name],[Name of client] and confidential...
Confidential information, privacy and injunctionsThis Practice Note deals with the general principles of obtaining an injunction relating to...
What does IP completion day mean for Information Law? [Archived]ARCHIVED: This Practice Note has been archived and is not maintained.11 pm (GMT) on 31...
List of data protection clauses and agreements for commercial transactions and personal data processing and sharingThis Practice Note is a...
The UK General Data Protection Regulation (UK GDPR)This Practice Note provides a summary of the UK GDPR regime. For a higher-level introduction to UK...
Trade secrets and confidential information—protection and enforcementThis Practice Note sets out the protection available for trade secrets and...
“Confidential journalistic material” means— (a) in the case of material contained in a communication, journalistic material which the sender of the communication— (i) holds in confidence, or (ii) intends the recipient, or intended recipient, of the communication to hold in confidence; (b) in any other case, journalistic material which a person holds in confidence.
Device fingerprinting involves the collection of various information elements to produce a unique pattern for identification. Online users can be tracked by combining a number of features including: • data derived from the configuration of a device • data exposed by the use of particular network protocols • cascading style sheet information • JavaScript objects • HTTP header information • clock information • transmission control protocol stack variation • installed fonts • installed plugins within the browser • use of application programming interfaces Fingerprinting can be used as an alternative to cookies and can be passive, without any obvious querying of the machine, or active, which involves more invasive querying.
Organisations that provide a specific type of digital service: online marketplaces, online search engines or cloud computing services