{"id":103988,"date":"2025-04-29T10:14:16","date_gmt":"2025-04-29T10:14:16","guid":{"rendered":"https:\/\/my.legal500.com\/guides\/?post_type=comparative_guide&#038;p=103988"},"modified":"2025-08-19T10:21:15","modified_gmt":"2025-08-19T10:21:15","slug":"united-kingdom-data-protection-cybersecurity","status":"publish","type":"comparative_guide","link":"https:\/\/my.legal500.com\/guides\/chapter\/united-kingdom-data-protection-cybersecurity\/","title":{"rendered":"United Kingdom: Data Protection &amp; Cybersecurity"},"content":{"rendered":"","protected":false},"template":"","class_list":["post-103988","comparative_guide","type-comparative_guide","status-publish","hentry","guides-data-protection-cybersecurity","jurisdictions-united-kingdom"],"acf":[],"appp":{"post_list":{"below_title":"<div class=\"guide-author-details\"><span class=\"guide-author\">White &amp; Case<\/span><span class=\"guide-author-logo\"><img src=\"https:\/\/my.legal500.com\/guides\/wp-content\/uploads\/sites\/1\/2018\/11\/White_Case_logo_RGB-2.jpg\"\/><\/span><\/div>"},"post_detail":{"above_title":"<div class=\"guide-author-details\"><span class=\"guide-author\">White &amp; Case<\/span><span class=\"guide-author-logo\"><img src=\"https:\/\/my.legal500.com\/guides\/wp-content\/uploads\/sites\/1\/2018\/11\/White_Case_logo_RGB-2.jpg\"\/><\/span><\/div>","below_title":"<span class=\"guide-intro\">This country specific Q&amp;A provides an overview of Data Protection &amp; Cybersecurity laws and regulations applicable in United Kingdom<\/span><div class=\"guide-content\"><div class=\"filter\">\r\n\r\n\t\t\t\t<input type=\"text\" placeholder=\"Search questions and answers...\" class=\"filter-container__search-field\">\r\n\t\t\t<\/div>\r\n\r\n\t\t\t\r\n\r\n\r\n\t\t\t<ol class=\"custom-counter\">\r\n\r\n\t\t\t\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">Please provide an overview of the legal and regulatory framework governing data protection, privacy and cybersecurity in your jurisdiction (e.g., a summary of the key laws; who is covered; what sectors, activities or data do they regulate; and who enforces the relevant laws).<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p><u>Data protection and privacy<\/u><\/p>\n<p>UK data protection legislation is primarily made up of:<\/p>\n<ol style=\"padding-left: 0\">\n<li>Regulation (EU) 2016\/679 (the \u201c<strong>GDPR<\/strong>\u201d) as incorporated into the domestic law of the UK pursuant to section 3 of the European Union (Withdrawal) Act 2018 (the \u201c<strong>UK GDPR<\/strong>\u201d);<\/li>\n<li>The Data Protection Act 2018 (the \u201c<strong>DPA 2018<\/strong>\u201d),<sup>1<\/sup>\u00a0which tailors the application of the UK GDPR within the UK; and<\/li>\n<li>The Privacy and Electronic Communications (EC Directive) Regulations 2003 (as amended from time to time) (\u201c<strong>PECR<\/strong>\u201d), which implements the requirements of the e-Privacy Directive 2002\/58\/EC (as amended by Directive 2009\/136\/EU).<\/li>\n<\/ol>\n<p>There are other related areas of law, such as the common law duty of confidentiality and the tort of misuse of private information which may also be relevant in the context of processing personal data.<\/p>\n<p>The UK GDPR regulates the <em>processing<\/em> of <em>personal data<\/em> in the UK:<\/p>\n<ul style=\"padding-left: 0\">\n<li>Information is generally considered as being personal if it relates to an identified or identifiable natural person (Article 4(1) UK GDPR) (see the answer to question [4] for further detail).<\/li>\n<li>The term \u201c<em>processing<\/em>\u201d is defined broadly and covers any operation or set of operations performed on personal data or on sets of personal data, whether or not by automated means, such as collection, recording, organisation, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction.<\/li>\n<\/ul>\n<p>The UK GDPR applies to:<\/p>\n<ul style=\"padding-left: 0\">\n<li>Businesses that are established in the UK, and that process personal data (either as a controller or processor, and regardless of whether or not the processing takes place in the UK) in the context of that establishment;<\/li>\n<li>A business that is not established in the UK, but is subject to the laws of the UK by virtue of public international law; and<\/li>\n<li>Businesses outside the UK if they (either as controller or processor) process the personal data of individuals in the UK in relation to: (i) offering of goods or services (whether or not in return for payment) to individuals in the UK; or (ii) monitoring the behaviour of individuals in the UK (to the extent that such behaviour takes place in the UK).<\/li>\n<\/ul>\n<p>PECR sets out specific rules on marketing calls, emails, texts, faxes, and the use of cookies and similar technologies, and includes security and breach notification requirements for providers of public electronic communications services.<\/p>\n<p><u>Cybersecurity<\/u><\/p>\n<p>The legal framework that regulates cybersecurity in the UK is made up of a number of different laws, including but not limited to:<\/p>\n<ul style=\"padding-left: 0\">\n<li><strong>Data protection legislation<\/strong> \u2013 The UK GDPR specifies obligations (including security obligations) that are applicable to organisations before processing personal data.<\/li>\n<li><strong>The Network and Information Systems Regulations 2018 (SI 2018\/506) (\u201cNIS Regulations\u201d)<\/strong> \u2013 Sets out cybersecurity obligations applicable to digital service providers, as well as providers of services deemed critical to the UK economy.<\/li>\n<li><strong>Computer Misuse Act 1990 (\u201cCMA 1990\u201d) <\/strong>\u2013 Specifies the criminal offences applicable to misuse of computer equipment.<\/li>\n<li><strong>PECR<\/strong> &#8211; Specifies security obligations of public electronic communications network providers and public electronic communications service providers.<\/li>\n<li><strong>Communications Act 2003 (\u201cCA 2003\u201d)<\/strong> \u2013 Outlines security obligations of public electronic communications network providers and public electronic communications service providers.<\/li>\n<li><strong>Telecommunications (Security) Act 2021 (\u201cSecurity Act\u201d)<\/strong> \u2013 Outlines security obligations of public electronic communications network providers and public electronic communications service providers.<\/li>\n<li><strong>The Electronic Communications (Security Measures) Regulations 2022 (\u201cSecurity Regulations\u201d) <\/strong>\u2013 Specifies detailed requirements applicable to public electronic communications network providers and public electronic communications service providers which complement the requirements of the Security Act.<\/li>\n<li><strong>Product Security and Telecommunications Infrastructure Act 2022 (\u201cPSTI 2022\u201d)<\/strong> \u2013 Specifies obligations applicable to manufacturers, importers, and distributors of relevant connectable consumer product-types to protect such products against cyber-attacks.<\/li>\n<li><strong>Product Security and Telecommunications Infrastructure (Security Requirements for Relevant Connectable Products) Regulations 2023\/1007 (\u201cPSTI Regulations\u201d)<\/strong> \u2013 Specifies relevant product security requirements building on the obligations set out in PSTI 2022.<\/li>\n<li><strong>Investigatory Powers Act 2016<\/strong> \u2013 Specifies obligations for the interception of communications such as emails and telephone calls.<\/li>\n<\/ul>\n<p>This is not an exhaustive list, and organisations doing business in the UK should be aware of the impact of the common law and laws imposing indirect obligations relating to cybersecurity (such as the Companies Act 2006).<\/p>\n<p>Finally, the UK is not required to implement Directive (EU) 2022\/2555 (known as \u201c<em>NIS 2<\/em>\u201d) following its departure from the EU. However, the UK government has announced its intention to introduce the \u201cCyber Security and Resilience Bill\u201d to Parliament in 2025, which is designed to enhance the UK\u2019s existing cybersecurity framework.<\/p>\n<p><u>Regulatory authorities<\/u><\/p>\n<ul style=\"padding-left: 0\">\n<li><strong>Information Commissioner\u2019s Office (\u201cICO\u201d) <\/strong>\u2013 The ICO oversees compliance with data protection law and the law relating to privacy and electronic communications. The ICO also occasionally issues guidance relating to cybersecurity.<\/li>\n<li><strong>The Office of Communications (\u201cOfcom\u201d) <\/strong>\u2013 Ofcom is the UK\u2019s communications regulator and has jurisdiction over telecommunications service providers. Ofcom is also responsible for overseeing compliance with the CA 2003 and the Security Act, and the relevant requirements on security (including cybersecurity) of telecommunications service providers.<\/li>\n<li><strong>The Office for Product Safety and Standards (\u201cOPSS\u201d)<\/strong> \u2013 The OPSS is responsible for overseeing compliance with the PSTI 2022 and PSTI Regulations.<\/li>\n<\/ul>\n<p>Other regulators and government departments issue cybersecurity guidance from time-to-time (such as the National Cyber Security Centre), and businesses operating within the remit of such regulators should be aware of, and familiar with, the latest guidance issued.<\/p>\n<p><u>Footnote(s):<\/u><\/p>\n<p><sup style=\"font-size: 9px\">1<\/sup> <span style=\"font-size: 12px\"> References to \u201cUK GDPR\u201d used throughout this guide should be read to include \u201cDPA 2018\u201d.<\/span><\/p>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">Are there any expected changes in the data protection, privacy or cybersecurity landscape in 2025 - 2026 (e.g., new laws or regulations coming into effect, enforcement of such laws and regulations, expected regulations or amendments)?<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>Several draft laws have been proposed to update the UK\u2019s existing data protection, privacy and cybersecurity laws, aligning them with international standards. For example:<\/p>\n<ul style=\"padding-left: 0\">\n<li>The Data (Use and Access) Bill (expected to enter into force in 2026); and<\/li>\n<li>The Cyber Security and Resilience Bill (expected to be introduced to Parliament in 2025).<\/li>\n<\/ul>\n<p>The UK Government has also published legislative proposals for tackling the issue of ransomware in the UK. The UK Government is currently assessing public feedback to the proposals.<\/p>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">Are there any registration or licensing requirements for entities covered by these data protection and cybersecurity laws, and if so what are the requirements? Are there any exemptions? What are the implications of failing to register \/ obtain a licence?<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p><u>Data Protection<\/u><\/p>\n<p>Under the Data Protection (Charges and Information) Regulations 2018, any UK entity that processes personal data as a controller (i.e., determines the purposes and means of the processing of personal data, per Article 4(7) UK GDPR) must register with the ICO and pay a fee, unless they are exempt.<\/p>\n<p>There are three tiers for the level of fee payable, ranging from \u00a340 to \u00a32,900. The relevant tier that an entity falls in depends on a number of factors, such as number of staff and annual turnover. A controller is exempt from the requirement to pay fees if it only processes personal data for certain limited purposes, such as for the purposes of staff administration, advertising, marketing and public relations, or keeping accounts and records of transactions.<\/p>\n<p>The maximum fine for failing to pay the annual ICO data protection fee, or failing to pay the correct fee, is \u00a34,350 per entity.<\/p>\n<p><u>NIS<\/u><\/p>\n<p>Organisations that are required to comply with the NIS Regulations (e.g., online search engines, online marketplaces and cloud computing services) with a head office in the UK and that are not a micro or small enterprise, must register with the ICO as a relevant digital service provider. There is no fee for registration, but it is a separate process from registering with the ICO under data protection legislation. Failure to register can result in regulatory enforcement, including fines for non-compliance with the NIS Regulations.<\/p>\n<p><u>Consumer connectable products<\/u><\/p>\n<p>There is no general licensing or registration requirement under PSTI or the PSTI Regulations. However, certain in-scope businesses must ensure compliance with security requirements and maintain technical documentation. For example, manufacturers may be required to issue a statement of compliance (or a summary of a statement of compliance), in accordance with Schedule 4 of the PSTI Regulations.<\/p>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">How do the data protection laws in your jurisdiction define \u201cpersonal data,\u201d \u201cpersonal information,\u201d \u201cpersonally identifiable information\u201d or any equivalent term in such legislation (collectively, \u201cpersonal data\u201d)? Do such laws include a specific definition for special category or sensitive personal data? What other key definitions are set forth in the data protection laws in your jurisdiction (e.g., \u201ccontroller\u201d, \u201cprocessor\u201d, \u201cdata subject\u201d, etc.)?<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>The UK GDPR uses the terms \u201c<em>personal data<\/em>\u201d and \u201c<em>special categories of personal data<\/em>\u201d.<\/p>\n<p>\u201c<em>Personal data<\/em>\u201d means \u201c<em><u>any information<\/u> <u>relating to<\/u> an <u>identified or identifiable<\/u> <u>natural person<\/u><\/em>\u201d (Article 4(1) UK GDPR). Taking each of these elements in turn:<\/p>\n<ul style=\"padding-left: 0\">\n<li>\u201c<em>any information<\/em>\u201d is a very broad category, including any type of data or information irrespective of whether it is objective or subjective, accurate or inaccurate;<\/li>\n<li>\u201c<em>relating to<\/em>\u201d means that the data must relate to or in some way connect with the relevant individual (ICO guidance clarifies that a range of factors need to be considered here, including the content of the information, the purpose(s) of processing and the likely impact of effect of that processing on the individual);<\/li>\n<li>\u201c<em>identified or identifiable<\/em>\u201d means that an individual can be identified, directly or indirectly, either: (i) from the relevant data alone; or (ii) in combination with any other available information; and<\/li>\n<li>\u201c<em>natural person<\/em>\u201d means an individual.<\/li>\n<\/ul>\n<p>For the avoidance of doubt, the UK GDPR does not apply to data that are entirely anonymous (i.e., data from which no individuals can be identified, whether directly or indirectly). However, data that has been \u201c<em>pseudonymized<\/em>\u201d (i.e., all identifying information has been stripped out and replaced with a unique code, but that code can be used to re-identify individuals if needed) continue to be \u201c<em>personal data<\/em>\u201d, even if such re-identification is extremely unlikely.<\/p>\n<p>\u201c<em><u>Special categories of personal<\/u><\/em><u> <em>data<\/em><\/u>\u201d are types of personal data that the UK GDPR identifies as requiring a higher level of protection (Article 9(1) UK GDPR). These include:<\/p>\n<ul style=\"padding-left: 0\">\n<li>personal data revealing racial or ethnic origin;<\/li>\n<li>personal data revealing political opinions;<\/li>\n<li>personal data revealing religious or philosophical beliefs;<\/li>\n<li>personal data revealing trade union membership;<\/li>\n<li>genetic data;<\/li>\n<li>biometric data (where used for the purpose of uniquely identifying a natural person);<\/li>\n<li>data concerning health;<\/li>\n<li>data concerning a natural person\u2019s sex life; and<\/li>\n<li>data concerning a natural person\u2019s sexual orientation.<\/li>\n<\/ul>\n<p>Additional rules also apply to the processing of personal data relating to criminal convictions and offences or related security measures (Article 10 UK GDPR).<\/p>\n<p>Other key definitions include the following:<\/p>\n<ul style=\"padding-left: 0\">\n<li>\u201c<em>Controller<\/em>\u201d means \u201c<em>the natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data<\/em>\u201d (Article 4(7) UK GDPR).<\/li>\n<li>\u201c<em>Processor<\/em>\u201d means \u201c<em>a natural or legal person, public authority, agency or other body who processes personal data on behalf of the controller<\/em><em>\u201d <\/em>(Article 4(8) UK GDPR)<em>.<\/em><\/li>\n<li>\u201c<em>Processing<\/em>\u201d means \u201c<em>any operation or set of operations which is performed on personal data or on sets of personal data, whether or not by automated means, such as collection, recording, organisation, structuring, storage, adaptation or alteration, retrieval,<\/em> <em>consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction<\/em>\u201d (Article 4(2) UK GDPR).<\/li>\n<li>\u201c<em>Data subject<\/em>\u201d means an identified or identifiable natural person to whom personal data relates (Article 4(1) UK GDPR).<\/li>\n<li>\u201c<em>Personal data breach<\/em>\u201d means \u201c<em>a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored or otherwise processed<\/em>\u201d (Article 4(12) UK GDPR).<\/li>\n<li>\u201c<em>Profiling<\/em>\u201d means \u201c<em>any form of automated processing of personal data consisting of the use of personal data to evaluate certain personal aspects relating to a natural person, in particular to analyse or predict aspects concerning that natural person\u2019s performance at work, economic situation, health, personal preferences, interests, reliability, behaviour, location or movements<\/em>\u201d (Article 4(4) UK GDPR).<\/li>\n<\/ul>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">What principles apply to the processing of personal data in your jurisdiction? For example: is it necessary to establish a \u201clegal basis\u201d for processing personal data?; are there specific transparency requirements?; must personal data only be kept for a certain period? Please provide details of such principles.<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>Under the UK GDPR, the following key principles apply to the processing of personal data:<\/p>\n<ul style=\"padding-left: 0\">\n<li><strong>Transparency <\/strong>\u2013 Personal data must be processed lawfully, fairly and in a transparent manner. Controllers must provide certain minimum information to data subjects regarding the collection and further processing of their personal data. Such information must be provided in a concise, transparent, intelligible, and easily accessible form, using clear and plain language.<\/li>\n<li><strong>Lawful basis for processing<\/strong> \u2013 Processing of personal data is lawful only if, and to the extent that, it is permitted under UK data protection law. The UK GDPR provides an exhaustive list of legal bases on which personal data may be processed, of which the following are the most relevant for businesses:\n<ul style=\"padding-left: 5\">\n<li>prior, freely given, speci\ufb01c, informed and unambiguous consent of the data subject;<\/li>\n<li>contractual necessity (i.e., the processing is necessary for the performance of a contract to which the data subject is a party, or for the purposes of pre-contractual measures taken at the data subject\u2019s request);<\/li>\n<li>compliance with legal obligations (i.e., the controller has a legal obligation, under the laws of the UK, to perform the relevant processing); or<\/li>\n<li>legitimate interests (i.e., the processing is necessary for the purposes of legitimate interests pursued by the controller, except where the controller\u2019s interests are overridden by the interests, fundamental rights or freedoms of the affected data subjects).<\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: none\">Please note that businesses require stronger grounds to process special categories of personal data. The processing of special categories of personal data is only permitted under certain conditions, of which the most relevant for businesses are:\n<ul style=\"padding-left: 5\">\n<li>explicit consent of the affected data subject;<\/li>\n<li>the processing is necessary in the context of employment law; or<\/li>\n<li>the processing is necessary for the establishment, exercise or defence of legal claims.<\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: none\">The processing of personal data relating to criminal convictions and offences is only permitted where it takes place under the control of official authority, or is authorised by applicable law in the UK.<\/li>\n<li><strong>Purpose limitation <\/strong>\u2013 Personal data may only be collected for speci\ufb01ed, explicit, and legitimate purposes and must not be further processed in a manner that is incompatible with those purposes. If a controller wishes to use the relevant personal data in a manner that is incompatible with the purposes for which they were initially collected, it must: (i) inform the data subject of such new processing; and (ii) be able to rely on a lawful basis as set out above.<\/li>\n<li><strong>Data minimisation <\/strong>\u2013 Personal data must be adequate, relevant and limited to what is necessary in relation to the purposes for which those data are processed. A business should only process the personal data that it actually needs to process in order to achieve its processing purposes.<\/li>\n<li><strong>Retention <\/strong>\u2013 Personal data must be kept in a form that permits identi\ufb01cation of data subjects for no longer than is necessary for the purposes for which the personal data are processed.<\/li>\n<li><strong>Accuracy <\/strong>\u2013 Personal data must be accurate and, where necessary, kept up to date. A business must take every reasonable step to ensure that personal data that are inaccurate are either erased or recti\ufb01ed without delay.<\/li>\n<li><strong>Data security <\/strong>\u2013 Personal data must be processed in a manner that ensures appropriate security of those data, including protection against unauthorised or unlawful processing and against accidental loss, destruction or damage, using appropriate technical or organisational measures.<\/li>\n<li><strong>Accountability <\/strong>\u2013 The controller is responsible for, and must be able to demonstrate, compliance with the data protection principles set out above.<\/li>\n<\/ul>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">Are there any circumstances for which consent is required or typically obtained in connection with the processing of personal data? What are the rules relating to the form, content and administration of such consent? For instance, can consent be implied, incorporated into a broader document (such as a terms of service) or bundled with other matters (such as consents for multiple processing operations)?<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>As noted in answer to question [5], consent is one of the legal bases upon which personal data (including special categories of personal data) may be processed.<\/p>\n<p>The UK GDPR defines \u201c<em>consent<\/em>\u201d as meaning \u201c<em>any freely given, specific, informed and unambiguous indication of the data subject\u2019s wishes by which he or she, by a statement of by a clear affirmative action, signifies agreement to the processing of personal data relating to him or her<\/em>\u201d (Article 4(11) UK GDPR).<\/p>\n<p>Taking each of the core aspects in turn, to be valid under the UK GDPR consent must be:<\/p>\n<ul style=\"padding-left: 0\">\n<li><strong>Freely given<\/strong> \u2013 The data subject must have: (i) a genuine choice and control over how their personal data is used, without coercion or detriment for refusing; and (ii) the ability to easily withdraw their consent at any time (although withdrawal will not affect the lawfulness of processing up to that point).<\/li>\n<li><strong>Specific<\/strong> \u2013 Granular consent for each specific purpose and processing activity must be sought (where appropriate and not unduly disruptive or confusing).<\/li>\n<li><strong>Informed<\/strong> \u2013 At a minimum, the data subject must be informed of the identity of the data controller, the purposes of processing, the types of personal data being processed, and of their right to withdraw consent at any time. (Data subjects should also be provided with the information set out in Articles 13 and 14 UK GDPR to the extent applicable.)<\/li>\n<li><strong>Unambiguous<\/strong> \u2013 It must be obvious that the individual has consented, and what they have consented to by means of clear, affirmative action. This means consent cannot generally be implied.<\/li>\n<\/ul>\n<p>The UK GDPR is clear that consent should not be bundled up as a condition of service unless it is necessary for that service (Article 7(4) and Recital 43 UK GDPR).<\/p>\n<p>Consent to cookies and direct marketing is also required under PECR. Fresh consent may need to be obtained if cookie use changes over time, and individuals who have consented to direct marketing communications need to be provided with the option to \u2018opt-out\u2019 or \u2018unsubscribe\u2019 in all subsequent communications.<\/p>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">What special requirements, if any, are required for processing particular categories of personal data (e.g., health data, children\u2019s data, special category or sensitive personal data, etc.)? Are there any prohibitions on specific categories of personal data that may be collected, disclosed, or otherwise processed?<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>As noted in answer to question [5], when processing special categories of personal data, additional conditions must be satisfied. In particular, the processing of special categories of personal data is only permitted if one of the specific conditions provided for under the UK GDPR DPA 2018 are satisfied, namely:<\/p>\n<ul style=\"padding-left: 0\">\n<li>the data subject has given explicit consent;<\/li>\n<li>the processing is necessary in the context of employment law;<\/li>\n<li>the processing is necessary to protect the vital interests of the data subject (or of another natural person where the data subject is physically or legally incapable of giving consent);<\/li>\n<li>the processing is carried out in the course of legitimate activities with appropriate safeguards by a foundation, association or any other not-for-profit body with a political, philosophical, religious or trade union aim and on condition that the processing relates solely to the members or to former members of the body or to persons who have regular contact with it in connection with its purposes and that the personal data are not disclosed outside that body without the consent of the data subjects;<\/li>\n<li>the processing relates to personal data which are manifestly made public by the data subject;<\/li>\n<li>the processing is necessary for the establishment, exercise or defence of legal claims;<\/li>\n<li>the processing is necessary for reasons of substantial public interest;<\/li>\n<li>the processing is necessary for the purposes of preventative or occupational medicine, for the assessment of the working capacity of the employee, medical diagnosis, the provision of health or social care or treatment, or the management of health or social care systems and services (with a basis in law);<\/li>\n<li>the processing is necessary for reasons of public interest in the area of public health (with a basis in law); or<\/li>\n<li>the processing is necessary for archiving, research or statistical purposes (with a basis in law).<\/li>\n<\/ul>\n<p>The processing of personal data relating to criminal convictions and offences is only permitted where it takes place under the control of an official authority, or is authorised by applicable law in the UK.<\/p>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">Do the data protection laws in your jurisdiction include any derogations, exemptions, exclusions or limitations other than those already described? If so, please describe the relevant provisions.<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>Article 2 UK GDPR establishes certain processing activities that are not in-scope of the UK GDPR. Most notably, Article 2(2)(c) UK GDPR establishes that the processing of personal data by a natural person in the course of a purely personal or household activity is outside the scope of the UK GDPR.<\/p>\n<p>Besides Article 2 UK GDPR, there are limited exemptions to certain rights and obligations under the UK GDPR. For example:<\/p>\n<ul style=\"padding-left: 0\">\n<li>Data subjects seeking to exercise their right to access, rectification, restriction, erasure, and\/or not to be subject to automated decision-making may have their requests refused if such requests are \u201c<em>manifestly unfounded<\/em>\u201d or \u201c<em>manifestly excessive<\/em>\u201d; although a restrictive approach is adopted when interpreting these terms.<\/li>\n<li>Schedules 2-4 of the DPA 2018 outline specific and limited circumstances in which certain, specified provisions of the UK GDPR may be disapplied. For example, where personal data is processed: (i) for the prevention or detection of crime; (ii) the apprehension or prosecution of offenders; or (iii) the assessment or collection of a tax, duty, or imposition of a similar nature, Articles 13(1)-(3) and 14(1)-(4) (among others) may be disapplied.<\/li>\n<\/ul>\n<p>As noted above, the exemptions are limited in nature and are not generally available to commercial organisations which conduct usual data processing activities in the UK.<\/p>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">Does your jurisdiction require or recommend risk or impact assessments in connection with personal data processing activities and, if so, under what circumstances? How are these assessments typically carried out?<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>Data Protection Impact Assessments (\u201c<strong>DPIAs<\/strong>\u201d) are required where a type of processing (in particular using new technologies) is \u201c<em>likely to result in a high risk<\/em>\u201d to the rights and freedoms of data subjects (Article 35(1) UK GDPR).<\/p>\n<p>In particular, controllers are required to complete DPIAs in the case of (Article 35(3) UK GDPR):<\/p>\n<ul style=\"padding-left: 0\">\n<li>a systematic and extensive evaluation of personal data based on automated processing (including profiling) involving decisions that produce legal effects;<\/li>\n<li>processing special category or criminal offence data on a large scale; or<\/li>\n<li>systematic monitoring of a publicly accessible area on a large scale.<\/li>\n<\/ul>\n<p>The ICO has specified that the following is likely to result in a \u201c<em>high risk<\/em>\u201d (and therefore require a DPIA before processing begins):<\/p>\n<ul style=\"padding-left: 0\">\n<li><strong>Innovative technology<\/strong> \u2013 Processing that involves the use of innovative techniques, or the novel application of existing technologies (including AI).<\/li>\n<li><strong>Denial of service <\/strong>\u2013 Decisions about an individual\u2019s access to a product, service, opportunity or benefit that is based to any extent on automated decision-making (including profiling) or involves the processing of special category data.<\/li>\n<li><strong>Large-scale profiling<\/strong> \u2013 Any profiling of individuals on a large scale.<\/li>\n<li><strong>Biometrics<\/strong> \u2013 Any processing of biometric data.<\/li>\n<li><strong>Genetic data<\/strong> \u2013 Any processing of genetic data (other than that processed by an individual GP or health professional for the provision of health care direct to the data subject).<\/li>\n<li><strong>Data matching<\/strong> \u2013 Combining, comparing or matching personal data obtained from multiple sources.<\/li>\n<li><strong>Invisible processing<\/strong> \u2013 Processing of personal data that has not been obtained directly from the data subject in circumstances where the controller considers that compliance with Article 14 UK GDPR would prove impossible or involve disproportionate effort.<\/li>\n<li><strong>Tracking<\/strong> \u2013 Processing which involves tracking an individual\u2019s geolocation or behaviour, including but not limited to the online environment.<\/li>\n<li><strong>Targeting of children or other vulnerable individuals<\/strong> \u2013 The use of the personal data of children or other vulnerable individuals for marketing purposes, profiling or other automated decision-making, or if you intend to offer online services directly to children.<\/li>\n<li><strong>Risk of physical harm<\/strong> \u2013 Where the processing is of such a nature that a personal data breach could jeopardise the (physical) health or safety of individuals.<\/li>\n<\/ul>\n<p>If required, a DPIA must be carried out prior to the processing (Article 35(1) UK GDPR) and should contain at least the following (Article 35(7) UK GDPR):<\/p>\n<ul style=\"padding-left: 0\">\n<li>a systematic description of the envisaged processing activities (including the purposes of processing and, where applicable, the legitimate interests pursued);<\/li>\n<li>an assessment of the necessity and proportionality of processing in relation to the purposes;<\/li>\n<li>an assessment of the risks to the rights and freedoms of individuals; and<\/li>\n<li>the measures envisaged to address the risks.<\/li>\n<\/ul>\n<p>In addition, the ICO has stated that: (i) transfer risk assessments must be conducted when personal data is being transferred from the UK to a non-adequate jurisdiction pursuant to an Article 46 UK GDPR safeguard; and (ii) legitimate interest assessments should be conducted when relying on legitimate interest as a legal basis for processing.<\/p>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">Are there any specific codes of practice applicable in your jurisdiction regarding the processing of personal data (e.g., codes of practice for processing children\u2019s data or health data)?<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p><u>Children&#8217;s Data \u2013 The Age-Appropriate Design Code (\u201c<strong>AADC<\/strong>\u201d)<\/u><\/p>\n<p>In September 2021, the ICO\u2019s AADC took effect. The purpose of the AADC is to help ensure that service providers put the best interests of children first when designing any \u201c<em>information society service<\/em>\u201d (\u201c<strong>ISS<\/strong>\u201d).<\/p>\n<p>The AADC sets out 15 standards which businesses in the UK must comply with where they provide ISSs to children. These include standards on, among other things: (i) DPIAs; (ii) transparency; (iii) detrimental use of data; (iv) policies and community standards; (v) default settings; (vi) data sharing; (vii) parental controls; and (viii) connected toys and devices.<\/p>\n<p>The AADC explains that businesses failing to comply with the AADC are likely to find it more difficult to demonstrate processing is fair and complies with the GDPR and PECR, and would therefore be more likely to face sanctions.<\/p>\n<p><u>Health Data<\/u><\/p>\n<p>The DPA 2018 defines \u201c<em>data concerning health<\/em>\u201d as \u201c<em>personal data relating to the physical or mental health of an individual, including the provision of health care services, which reveals information about his or her health status<\/em>\u201d.<\/p>\n<p>On 31 August 2023, the ICO published guidance on processing employee health data (the \u201c<strong>Employee Health Data Guidance<\/strong>\u201d). The Employee Health Data Guidance is aimed at employers. It is designed to help employers understand their data protection obligations under the UK GDPR, and provides further information on appropriate legal bases for processing (including by way of retention) employee health data. The guidance also recommends that employers conduct DPIAs in relation to the processing of employee health data.<\/p>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">Are organisations required to maintain any records of their data processing activities or establish internal processes or written documentation? If so, please describe how businesses typically meet such requirement(s).<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>Records of processing activities (\u201c<strong>ROPAs<\/strong>\u201d) should be maintained by businesses that process personal data subject to the UK GDPR, and should cover all applicable processing activities (i.e., not just processing of employee data).<\/p>\n<p>Organisations which have fewer than 250 employees, are not required to maintain ROPAs unless such an organisation conducts processing that:<\/p>\n<ul style=\"padding-left: 0\">\n<li>is likely to result in a risk to the rights and freedoms of data subjects;<\/li>\n<li>is not occasional; or<\/li>\n<li>includes special category data or personal data relating to criminal convictions or offences.<\/li>\n<\/ul>\n<p>Article 30 UK GDPR states that ROPAs must contain:<\/p>\n<ul style=\"padding-left: 0\">\n<li>the name and contact details of the controller and, where applicable, the joint controller, the controller\u2019s representative and the data protection officer;<\/li>\n<li>the purposes of processing;<\/li>\n<li>a description of the of the categories of data subjects and of the categories of personal data;<\/li>\n<li>the categories of recipients to whom the personal data have been or will be disclosed, including recipients in third countries or international organisations;<\/li>\n<li>where applicable, details of transfers of personal data to a third country or an international organisation;<\/li>\n<li>where possible, the envisaged time limits for erasure of the different categories of data; and<\/li>\n<li>where possible, a general description of the technical and organisational security measures.<\/li>\n<\/ul>\n<p>The ICO is entitled to demand a copy of ROPAs, and failure to produce up-to-date ROPAs to the ICO on request is an infringement of the UK GDPR.<\/p>\n<p>In addition, it is advisable (and usual) for businesses to maintain a range of other data protection policies tailored to their activities, such as a data protection policy, a data retention and disposal policy, a data breach policy, and training materials.<\/p>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">Do the data protection laws in your jurisdiction require or recommend data retention and\/or data disposal policies and procedures? If so, please describe such requirement(s).<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>While the UK GDPR does not explicitly require data retention and\/or data disposal policies and procedures, it is nevertheless advisable to implement and maintain such policies and procedures in order to demonstrate compliance with the UK GDPR.<\/p>\n<p>For example, such policies and procedures will help businesses demonstrate compliance with certain key principles of the UK GDPR, namely:<\/p>\n<ul style=\"padding-left: 0\">\n<li><strong>Data minimisation<\/strong> \u2013 Personal data must be adequate, relevant and limited to what is necessary in relation to the purposes for which those data are processed. A business should only process the personal data that it actually needs to process in order to achieve its processing purposes.<\/li>\n<li><strong>Data retention<\/strong> \u2013 Personal data must be kept in a form that permits identi\ufb01cation of data subjects for no longer than is necessary for the purposes for which the personal data are processed. It is therefore advisable for businesses to establish data retention and data disposal policies and procedures.<\/li>\n<\/ul>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">Under what circumstances is it required or recommended to consult with the applicable data protection regulator(s)?<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>As noted in answer to question [9], controllers may be required to conduct DPIAs. Controllers are required to consult with the ICO where a DPIA indicates that the processing would result in a \u201c<em>high risk<\/em>\u201d to the rights and freedoms of data subjects and the controller cannot mitigate or reduce the risk (Article 36(1) GDPR).<\/p>\n<p>This involves:<\/p>\n<ul style=\"padding-left: 0\">\n<li>The controller sending to the ICO a copy of the DPIA, a description of the respective roles and responsibilities of any joint controllers or processors, the purposes and methods of the intended processing, the measures and safeguards to protect individuals, and contact details of the Data Protection Officer (if appointed);<\/li>\n<li>The ICO acknowledging receipt, checking that it has the necessary information, and then informing as to whether it accepts the DPIA for prior consultation within 10 days (with an explanation as to its reasoning); and<\/li>\n<li>If the ICO provides advice under the prior consultation process, it will respond within 8 weeks of receipt of the DPIA (extendable to 14 weeks for complex cases).<\/li>\n<\/ul>\n<p>As a result of consultation, the ICO could: (i) come to the view that risks have been sufficiently identified and mitigated, and that the controller may proceed with processing; (ii) provide advice on how risks can be further mitigated before the controller is allowed to proceed with processing; (iii) issue an official warning, explaining the reasons for its concern(s) and the recommended steps to avoid any contravention of the UK GDPR; or (iv) impose a limitation or ban on the intended processing.<\/p>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">Do the data protection laws in your jurisdiction require the appointment of a data protection officer, chief information security officer, or other person responsible for data protection? If so, what are their legal responsibilities?<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>Controllers and processors can voluntarily appoint a Data Protection Officer (\u201c<strong>DPO<\/strong>\u201d), but a DPO must be appointed in certain circumstances (Article 37(1) UK GDPR). Namely, a DPO must be appointed if:<\/p>\n<ul style=\"padding-left: 0\">\n<li>the processing is being carried out by a public authority or body (except for courts acting in their judicial capacity);<\/li>\n<li>the core activities of the controller or processor consist of processing activities requiring regular and systematic monitoring of data subjects on a large scale; or<\/li>\n<li>the core activities of the controller or processor consist of the large-scale processing of special category data or criminal offence data.<\/li>\n<\/ul>\n<p>A DPO should be involved in all issues that relate to the protection of personal data. The UK GDPR outlines the minimum tasks required by the DPO, which include: (i) informing the controller\/processor, including their relevant employees, who processes personal data, of their obligations under the UK GDPR; (ii) monitoring compliance with the UK GDPR, other national data protection legislation and internal policies in relation to the processing of personal data, including internal audits; (iii) advising on DPIAs and the training of staff; and (iv) co-operating with the ICO and acting as the primary contact point for the purposes of the ICO on issues related to the processing of personal data by the relevant entity (Article 39(1) UK GDPR).<\/p>\n<p>A group of undertakings may appoint a single DPO, provided that DPO is easily accessible from each establishment.<\/p>\n<p>Additionally, where an organisation is not established in the UK, but processes personal data in the context of either offering goods or services to individuals in the UK or monitoring the behavior of individuals in the UK, it must appoint a representative in the UK (Article 27 UK GDPR). The representative is responsible for receiving complaints and interacting with the ICO.<\/p>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">Do the data protection laws in your jurisdiction require or recommend employee training related to data protection? If so, please describe such training requirement(s) or recommendation(s).<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>The UK GDPR does not explicitly require employee training on data protection.<\/p>\n<p>It is generally recommended that organisations processing personal data provide training to their personnel in respect of such processing. This is because training for personnel may: (i) help demonstrate compliance with the accountability principle (described in answer to question [5]); and (ii) form part of the \u201c<em>appropriate and technical organisational measures<\/em>\u201d that controllers must implement under Article 24 UK GDPR.<\/p>\n<p>In addition, and as noted in answer to question [14], one of the DPOs responsibilities is to monitor compliance with applicable data protection laws, \u201c<em>including the\u2026 training of staff involved in processing operations<\/em>\u201d (Article 39(1) UK GDPR).<\/p>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">Do the data protection laws in your jurisdiction require controllers to provide notice to data subjects of their processing activities? If so, please describe such notice requirement(s) (e.g., posting an online privacy notice).<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>Data subjects have the right to be informed about the collection and use of their personal data under Articles 13 and 14 UK GDPR.<\/p>\n<p>At the time when personal data are obtained from the data subject, the controller must provide the data subject with (Article 13 UK GDPR):<\/p>\n<ul style=\"padding-left: 0\">\n<li>the identity and the contact details of the controller and, where applicable, of the controller\u2019s representative;<\/li>\n<li>the contact details of the DPO, where applicable;<\/li>\n<li>the purposes of the processing for which the personal data are intended as well as the legal basis for the processing;<\/li>\n<li>where processing is based on legitimate interest, the legitimate interests pursued by the controller or by a third party;<\/li>\n<li>the recipients or categories of recipients of the personal data, if any;<\/li>\n<li>where applicable, the fact that the controller intends to transfer personal data to a third country or international organisation and the existence or absence of an adequacy decision, or of the safeguards in place to protect such transfers where there is no adequacy decision being relied upon to allow the transfer, and how to obtain copies of the same;<\/li>\n<li>the period for which the personal data will be stored, or if that is not possible, the criteria used to determine that period;<\/li>\n<li>the rights available to the data subject (i.e., (i) the right of access; (ii) the right to rectification; (iii) the right to erasure; (iv) the right to restriction; (v) the right to object; (vi) the right to data portability; (vii) the right to withdraw consent (to the extent consent is relied upon); and (viii) the right to complain to a supervisory authority); and<\/li>\n<li>the existence of automated decision-making, including profiling.<\/li>\n<\/ul>\n<p>Where personal data has not been obtained from the data subject, the controller is required to provide the data subject with the above-mentioned information: (i) within a reasonable period after obtaining the personal data, but at the latest within one month; (ii) if the personal data are to be used for communication with the data subject, at the latest at the time of the first communication to that data subject; or (iii) if a disclosure to another recipient is envisaged, at the latest when the personal data are first disclosed (Article 14 UK GDPR).<\/p>\n<p>Such information is typically provided by way of an external privacy notice (e.g., on a website) and an internal privacy notice, made available to employees (e.g., on an intranet). Such information must be provided in a concise, transparent, intelligible, and easily accessible form, using clear and plain language.<\/p>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">Do the data protection laws in your jurisdiction draw any distinction between the responsibility of controllers and the processors of personal data? If so, what are the implications?<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>As noted in answer to question [4], the UK GDPR distinguishes between controllers and processors as follows:<\/p>\n<ul style=\"padding-left: 0\">\n<li>\u201c<em>Controller<\/em>\u201d means \u201c<em>the natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data<\/em>\u201d (Article 4(7) UK GDPR).<\/li>\n<li>\u201c<em>Processor<\/em>\u201d means \u201c<em>a natural or legal person, public authority, agency or other body who processes personal data on behalf of the controller<\/em>\u201d (Article 4(8) UK GDPR).<\/li>\n<\/ul>\n<p>In line with this distinction, controllers have a higher level of responsibility under the UK GDPR. For example, controllers have obligations to maintain ROPAs (Article 30 UK GDPR), conduct DPIAs where necessary (Article 35 UK GDPR), and notify the ICO in the case of a personal data breach (Article 33 UK GDPR).<\/p>\n<p>In contrast, processors have more limited obligations under the UK GDPR. For example, processors are obliged to conduct processing in accordance with Article 28(3) UK GDPR (which regulates data processing agreements), maintain a record of all categories of processing activities carried out on behalf of the controller (Article 30(2) UK GDPR), and notify the controller without undue delay after becoming aware of a personal data breach (Article 33(2) UK GDPR).<\/p>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">Please describe any restrictions on monitoring, automated decision-making or profiling in your jurisdiction, including through the use of tracking technologies such as cookies. How are these or any similar terms defined?<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p><u>Automated decision-making<\/u><\/p>\n<p>\u201c<em>Automated decision-making<\/em>\u201d is the making of a decision about an individual based solely on automated processing, including profiling, without any human involvement. Such decision-making is regulated by Article 22 UK GDPR.<\/p>\n<p>The UK GDPR further defines \u201c<em>profiling<\/em>\u201d as \u201c<em>any form of automated processing of personal data consisting of the use of personal data to evaluate certain personal aspects relating to a natural person, in particular to analyse or predict aspects concerning that natural person\u2019s performance at work, economic situation, health, personal preferences, interests, reliability, behaviour, location or movements<\/em>\u201d (Article 4(4) UK GDPR).<\/p>\n<p>Automated decision-making is permissible under the UK GDPR, provided there is a valid legal basis (Article 6 UK GDPR) for processing personal data in this context and the processing is sufficiently transparent (Articles 13 and 14 UK GDPR).<\/p>\n<p>Notably, data subjects have the right <em>not <\/em>to be subject to automated decision-making when it is solely based on automated processing, including profiling, which produces legal effects or similarly significant effects them (Article 22 UK GDPR). Such processing is only permissible if: (i) the decision is: (a) necessary for entering into, or performance of, a contract with the relevant data subject; (b) authorised by applicable law; or (c) based on the data subject\u2019s explicit consent; and (ii) the controller implements suitable measures to safeguard the data subject\u2019s rights and freedoms and legitimate interests, including at least the right to obtain human intervention on the part of the controller, express their point of view and contest the decision (Articles 22(2) and (3) UK GDPR).<\/p>\n<p>The use of special category personal data in automated decision-making (including profiling) is subject to further restrictions. Such data may only be processed in the context of automated decision-making where: (i) there are suitable measures to safeguard the data subject\u2019s rights; and (ii) the legal basis is explicit consent or necessity for reasons of substantial public interest on the basis of applicable law (Article 22(4) UK GDPR).<\/p>\n<p><u>Employee monitoring<\/u><\/p>\n<p>The ICO explains that employee monitoring means \u201c<em>any form of monitoring of people who carry out work on your behalf<\/em>\u201d. This can include monitoring workers on particular work premises or elsewhere, and is not limited to working hours. The types of monitoring technologies used may include CCTV, technologies for monitoring timekeeping or access control, or the tracking of internet activity and keystrokes.<\/p>\n<p>Employee monitoring must comply with applicable data protection laws. This means:<\/p>\n<ul style=\"padding-left: 0\">\n<li>a valid legal basis should be relied upon (Article 6 UK GDPR) when processing personal data in this context;<\/li>\n<li>the employee monitoring activities must be communicated to employees (Articles 13, 14 and 21(4) UK GDPR);<\/li>\n<li>a DPIA should be conducted in relation to such monitoring (and must be conducted if it is likely to cause a high risk to data subjects\u2019 interests); and<\/li>\n<li>the views of employees (or their representatives) should be sought when considering the use of monitoring technologies.<\/li>\n<\/ul>\n<p><u>Cookies<\/u><\/p>\n<p>\u201c<em>Cookies<\/em>\u201d are not defined in PECR, but the ICO has clarified that a \u201c<em>cookie<\/em>\u201d is \u201c<em>a small text file that is downloaded onto \u2018terminal equipment\u2019 (eg a computer or smartphone) when the user accesses a website [which] allows the website to recognise that user\u2019s device and store some information about the user\u2019s preferences or past actions<\/em>\u201d.<\/p>\n<p>The storage of cookies (or other data) on an end-user\u2019s device requires prior consent form that end user (the applicable standard of consent is derived from the UK GDPR). For consent to be valid, it must be informed, specific, freely given and must constitute a real and unambiguous indication of the individual\u2019s wishes (i.e., some form of clear affirmative action). This requirement for consent does not apply if the cookie or similar technology: (i) is for the sole purpose of carrying out the transmission of a communication over an electronic communications network; or (ii) is strictly necessary to provide an ISS (e.g., a service over the internet) requested by the subscriber or user, which means that it must be essential to fulfil their request. The ICO stated in the AADC that cookies placed for the sole purpose of age verification are considered to be \u201c<em>essential<\/em>\u201d, and therefore do not require consent.<\/p>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">Please describe any restrictions on targeted advertising and\/or behavioral advertising. How are these terms or any similar terms defined?<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>The UK GDPR does not explicitly define \u201c<em>targeted advertising<\/em>\u201d or \u201c<em>behavioral advertising<\/em>\u201d.<\/p>\n<p>Processing personal data for the purposes of such advertising must be compliant with applicable requirements of, amongst others, the UK GDPR and DPA 2018. For example, an organisation engaged in such processing must have a valid legal basis, comply with the transparency requirements, and comply with the relevant requirements of PECR (as outlined in answer to question [18] in the context of cookies).<\/p>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">Please describe any data protection laws in your jurisdiction restricting the sale of personal data. How is the term \u201csale\u201d or such related terms defined?<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>The UK GDPR does not explicitly define the term \u201c<em>sale<\/em>\u201d or establish any specific restrictions. However, the \u201c<em>sale<\/em>\u201d of personal data would constitute \u201c<em>processing<\/em>\u201d under the UK GDPR. As such, the sale of personal data should be caried out in accordance with the requirements of the UK GDPR, DPA 2018, and any other relevant laws and terms (e.g., consumer protection laws and contractual terms with the relevant individuals). Requirements would include, having a valid legal basis for the processing (Article 6 GDPR) of personal data in this context and processing in a sufficiently transparent manner (Articles 13 and 14 UK GDPR).<\/p>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">Please describe any data protection laws in your jurisdiction restricting telephone calls, text messaging, email communication, or direct marketing. How are these terms defined?<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>\u201c<em>Direct marketing<\/em>\u201d is generally understood as promoting services or goods to individuals.<\/p>\n<p>PECR requires businesses to obtain consent before sending electronic communications to individuals for the purpose of direct marketing. There are some narrow exemptions to this requirement. Also, data subjects have the right to object to the processing of personal data for the purpose of direct marketing, including pro\ufb01ling.<\/p>\n<p>PECR does not specifically restrict marketing in a business-to-business context, although it is generally considered good practice for businesses to offer an opt-out of electronic direct marketing, such as emails or text messages, to other corporate bodies (e.g., in the footer of any marketing email sent on a B2B basis).<\/p>\n<p>PECR does not generally prohibit unsolicited marketing calls; however, the UK has established an opt-out register (the Telephone Preference Services (the \u201c<strong>TPS<\/strong>\u201d)). It is a legal requirement not to make unsolicited marketing calls to numbers registered in the TPS without the consent of the relevant individual subscriber.<\/p>\n<p>The maximum fine for sending direct marketing communications in breach of applicable law is \u00a3500,000, although typical fines are generally below this level. The ICO does tend to be pro-active in taking enforcement action against entities which violate the legal requirements relevant to direct marketing.<\/p>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">Please describe any data protection laws in your jurisdiction addressing biometrics, such as facial recognition. How are such terms defined?<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>\u201c<em>Biometric data<\/em>\u201d means \u201c<em>personal data resulting from specific technical processing relating to the physical, physiological or behavioural characteristics of a natural person, which allow or confirm the unique identification of that natural person, such as facial images or dactyloscopic data<\/em>\u201d (Article 4(14) UK GDPR).<\/p>\n<p>Biometric data is a form of special category personal data if it is processed \u201c<em>for the purpose of uniquely identifying a natural person<\/em>\u201d (Article 9(1) UK GDPR). Accordingly, the processing of biometric data may be subject to further restrictions (as set out in answer to question [5]). For example, in addition to having a valid legal basis for processing such data (in accordance with Article 6(1) UK GDPR), and organisation must also satisfy one of the conditions for processing under Article 9(2) UK GDPR.<\/p>\n<p>Large-scale use of biometric data is likely to trigger the need for a DPIA, on the basis that the processing is likely to result in a high risk to the rights and freedoms of natural persons (Article 35 UK GDPR).<\/p>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">Please describe any data protection laws in your jurisdiction addressing artificial intelligence or machine learning (\u201cAI\u201d).<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>At present, the UK does not have a specific AI regulation. Instead, the UK encourages existing sector-specific regulators to interpret and apply a \u201c<em>principles-based framework<\/em>\u201d to the development and use of AI. The cross-sectoral principles for existing regulators to interpret and apply are as follows:<\/p>\n<ul style=\"padding-left: 0\">\n<li>Regulators should ensure that AI systems function in a <strong>robust, secure, and safe way<\/strong> throughout the AI life cycle, and that risks are continually identified, assessed and managed.<\/li>\n<li>Regulators should ensure that AI systems are appropriately <strong>transparent and explainable<\/strong>.<\/li>\n<li>Regulators should ensure that AI systems are <strong>fair<\/strong> (i.e., they do not undermine the legal rights of individuals or organizations, discriminate unfairly against individuals, or create unfair market outcomes).<\/li>\n<li>Regulators should ensure there are <strong>governance<\/strong> measures in place to allow for effective oversight of the supply and use of AI systems, with clear lines of <strong>accountability<\/strong> across the AI life cycle.<\/li>\n<li>Regulators should ensure that users, impacted third parties and actors in the AI life cycle are able to contest an AI decision or outcome that is harmful or creates a material risk of harm, and access suitable <strong>redress<\/strong>.<\/li>\n<\/ul>\n<p>Some sector-specific regulators have also outlined their strategic approach to AI. For example, the ICO\u2019s strategic approach establishes specific areas of focus in relation to AI and data protection, which include foundation models, high-risk AI applications (e.g., emotion recognition technology), facial recognition technology, and biometrics.<\/p>\n<p>The UK may enact a set of binding measures applicable to AI in the future. The UK Government has announced its intention to establish &#8220;<em>appropriate legislation to place requirements on those working to develop the most powerful [AI] models<\/em>&#8220;. The Digital Information and Smart Data Bill was also announced, which will be accompanied by reforms to data-related laws, to support the safe development and deployment of new technologies (which may include AI). It is not yet clear exactly how this will be implemented.<\/p>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">Is the transfer of personal data outside your jurisdiction restricted? If so, please describe these restrictions and how businesses typically comply with them (e.g., does a cross-border transfer of personal data require a specified mechanism or notification to or authorization from a regulator?)<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>Transfers of personal data to recipients outside of the UK can only take place if: (i) the transfer is to an \u201c<em>Adequate Jurisdiction<\/em>\u201d (as specified in the DPA 2018 or as further specified by the ICO); (ii) the transferor has implemented one of the required safeguards as specified by the UK GDPR; or (iii) one of the derogations specified in the UK GDPR applies to the relevant transfer.<\/p>\n<p>Although the UK has left the EU, the European Data Protection Board Guidelines (2\/2018) which concern data transfers are likely to remain relevant., These guidelines set out that a \u201c<em>layered approach<\/em>\u201d should be taken with respect to transfer mechanisms used to transfer data out of jurisdiction. If the transfer is not to an Adequate Jurisdiction, the transferor should first explore the possibility of implementing one of the safeguards provided for in the UK GDPR before relying on a derogation.<\/p>\n<p><u>Adequacy<\/u><\/p>\n<p>The UK has issued adequacy regulations in respect of: each of the EEA countries and their institutions; the jurisdictions that were considered \u201cadequate\u201d for the purposes of the (EU) GDPR by the European Commission as of 31 December 2020; Gibraltar; South Korea; Canada (partially); Japan (partially); and the United States (partially).<\/p>\n<p><u>Contractual Mechanisms<\/u><\/p>\n<p>Alternatively, common ways to ensure compliant international data transfers are the use of Standard Contractual Clauses or Binding Corporate Rules (\u201c<strong>BCRs<\/strong>\u201d).<\/p>\n<p><u>UK International Data Transfer Agreement and the UK Addendum <\/u><\/p>\n<p>In June 2021, the European Commission published a revised set of SCCs (the \u201c<strong>New SCCs<\/strong>\u201d). These revised SCCs replaced the 2001 and 2004 controller-to-controller versions, and the 2010 controller-to-processor version, previously maintained by the European Commission and used by data exporters to protect international transfers of personal data. However, due to Brexit, the New SCCs are not valid for restricted transfers of personal data under the UK GDPR. On 21 March 2022, the ICO introduced equivalent revised mechanisms: (i) a new UK International Data Transfer Agreement (the \u201c<strong>IDTA<\/strong>\u201d); and (ii) a UK-specific Addendum to the New SCCs, which modifies the New SCCs so that they can be used for the purposes of transfers of personal data out of the UK (the \u201c<strong>Addendum<\/strong>\u201d).<\/p>\n<p>The IDTA is the UK\u2019s equivalent to the New SCCs and is designed to facilitate restricted transfers of personal data under the UK GDPR between controllers, processors, sub-processors and third parties (as appropriate). The Addendum revises certain provisions of the New SCCs, when they are used in the context of transfers of personal data out of the UK.<\/p>\n<p>International data transfers may also take place on the basis of contracts agreed between the data exporter and data importer provided that they conform to the protections outlined in the UK GDPR, and they have prior approval by the ICO.<\/p>\n<p><u>BCRs<\/u><\/p>\n<p>International data transfers within a group of businesses can be safeguarded by the implementation of BCRs. BCRs require ICO approval. Most importantly, BCRs will need to include a mechanism to ensure they are legally binding and enforced by every member in the group of businesses. Among other things, the BCRs must set out the group structure of the businesses, the proposed data transfers and their purpose, the rights of data subjects, the mechanisms that will be implemented to ensure compliance with the UK GDPR and the relevant complainant procedures.<\/p>\n<p><u>UK Extension to the EU-US Data Privacy Framework<\/u><\/p>\n<p>In October 2023, the UK brought into force its extension to the EU\u2013US Data Privacy Framework (the \u201c<strong>UK Extension<\/strong>\u201d), to allow organisations in the UK to transfer personal data to US entities that are certified under the UK Extension, without the need for any other safeguards provided for under Chapter V of the UK GDPR.<\/p>\n<p><u>Transfer Risk Assessments<\/u><\/p>\n<p>The ICO requires entities to implement a transfer risk assessment prior to transferring personal data to a jurisdiction that is not the subject of an adequacy regulation in the UK.<\/p>\n<p>As part of such an assessment, the data exporter must analyse whether the protection afforded to the transferred personal data by the laws of the relevant third country needs to be supplemented by additional measures to ensure a level protection that is at least equivalent to that within the UK. The ICO has published a template transfer risk assessment tool that organisations may use for this purpose.<\/p>\n<p><u>Prior Regulatory Approval<\/u><\/p>\n<p>International transfers of personal data will require prior approval from the ICO unless a UK GDPR-compliant mechanism has been implemented. Some of those transfer mechanisms (e.g., BCRs) require approval from the ICO in any event, as noted above.<\/p>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">What personal data security obligations are imposed by the data protection laws  in your jurisdiction?<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>Personal data must be processed in a way which ensures security and safeguards against unauthorised or unlawful processing, accidental loss, destruction and damage of the data.<\/p>\n<p>Both controllers and processors must ensure they have appropriate technical and organisational measures to meet the requirements of the UK GDPR. Depending on the security risk, this may include the encryption of personal data, the ability to ensure the ongoing confidentiality, integrity and resilience of processing systems, an ability to restore access to data following a technical or physical incident, and a process for regularly testing and evaluating the technical and organisational measures for ensuring the security of processing.<\/p>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">Do the data protection laws in your jurisdiction impose obligations in the context of  security breaches which impact personal data? If so, how do such laws define a security breach (or similar term) and under what circumstances must such a breach be reported to regulators, impacted individuals, law enforcement, or other persons or entities?<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>\u201c<em>Personal data breach<\/em>\u201d means \u201c<em>a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data transmitted, stored or otherwise processed<\/em>\u201d (Article 4(12) UK GDPR).<\/p>\n<p><u>ICO<\/u><\/p>\n<p>The controller is responsible for reporting a personal data breach without undue delay (and in any case within 72 hours of first becoming aware of the breach) to the ICO, unless the breach is unlikely to result in a risk to the rights and freedoms of the data subject(s). A processor must notify any data breach to the controller without undue delay.<\/p>\n<p>The notification must include the nature of the personal data breach, including the categories and number of data subjects concerned, the name and contact details of the DPO or relevant point of contact, the likely consequences of the breach and the measures taken to address the breach, including attempts to mitigate possible adverse effects.<\/p>\n<p><u>Data subject<\/u><\/p>\n<p>Controllers are required to communicate personal data breaches to affected data subjects, without undue delay, if the breach is likely to result in a high risk to the rights and freedoms of the data subject.<\/p>\n<p>The notification must include the name and contact details of the DPO (or point of contact), the likely consequences of the breach and any measures taken to remedy or mitigate the breach.<\/p>\n<p>The controller may be exempt from notifying the data subject if the risk of harm is remote (e.g., because the affected data is encrypted), the controller has taken measures to minimise the risk of harm (e.g., suspending affected accounts) or the notification requires a disproportionate effort (e.g., a public notice of the breach).<\/p>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">Do the data protection laws in your jurisdiction establish specific rights for individuals, such as the right to access and the right to deletion? If so, please provide a general description of such rights, how they are exercised, and any exceptions.<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>Key rights include the following:<\/p>\n<ul style=\"padding-left: 0\">\n<li><strong>Right of access to (copies of) data\/information about processing<\/strong> \u2013 A data subject has the right to obtain from a controller the following information in respect of the data subject\u2019s personal data: (i) con\ufb01rmation of whether, and where, the controller is processing the data subject\u2019s personal data; (ii) information about the purposes of the processing; (iii) information about the categories of data being processed; (iv) information about the recipients or categories of recipients with whom the data may be shared; (v) information about the period for which the data will be stored (or the criteria used to determine that period); (vi) information about the existence of the rights to erasure, to recti\ufb01cation, to restriction of processing and to object to processing; (vii) information about the existence of the right to complain to the relevant data protection authority; (viii) where the data were not collected from the data subject, information as to the source of the data; and (ix) information about the existence of, and an explanation of the logic involved in, any automated processing that has a legal or other signi\ufb01cant effect on the data subject.<\/li>\n<li style=\"list-style-type: none\">Additionally, the data subject may request a copy of the personal data being processed, to the extent that the personal data requested does not adversely affect the rights and freedoms of others.<\/li>\n<li><strong>Right to rectification of errors <\/strong>\u2013 Controllers must ensure that inaccurate or incomplete data are erased or recti\ufb01ed.<\/li>\n<li style=\"list-style-type: none\">Data subjects have the right to recti\ufb01cation of inaccurate personal data.<\/li>\n<li><strong>Right to deletion \/ right to be forgotten<\/strong> \u2013 Data subjects have the right to erasure of their personal data (the right to be forgotten) if: (i) the data are no longer needed for their original purpose (and no new lawful purpose exists); (ii) the lawful basis for the processing is the data subject\u2019s consent, the data subject withdraws that consent, and no other lawful ground exists; (iii) the data subject exercises the right to object, and the controller has no overriding grounds for continuing the processing; (iv) the data have been processed unlawfully; or (v) erasure is necessary for compliance with UK law.<\/li>\n<li><strong>Right to object to processing <\/strong>\u2013 Data subjects have the right to object, on grounds relating to their particular situation, to the processing of personal data where the basis for that processing is either public interest or legitimate interest of the controller.<\/li>\n<li style=\"list-style-type: none\">The controller must cease processing when it receives a valid objection request unless it demonstrates compelling legitimate grounds for the processing which override the interests, rights and freedoms of the relevant data subject or it requires the data in order to establish, exercise or defend legal rights.<\/li>\n<li><strong>Right to restrict processing<\/strong> \u2013 Data subjects have the right to restrict the processing of personal data, which means that the data may only be held by the controller, and may only be used for limited purposes if: (i) the accuracy of the data is contested (and only for as long as it takes to verify that accuracy); (ii) the processing is unlawful and the data subject requests restriction (as opposed to exercising the right to erasure); (iii) the controller no longer needs the data for their original purpose, but the data are still required by the controller to establish, exercise or defend legal rights; or (iv) veri\ufb01cation of overriding grounds is pending, in the context of an erasure request.<\/li>\n<li><strong>Right to data portability <\/strong>\u2013 Data subjects have a right to receive a copy of their personal data in a commonly used machine-readable format, and to transfer their personal data from one controller to another or have the data transmitted directly between controllers.<\/li>\n<li><strong>Right to withdraw consent <\/strong>\u2013 A data subject has the right to withdraw their consent at any time. The withdrawal of consent does not affect the lawfulness of processing based on consent before its withdrawal.<\/li>\n<li style=\"list-style-type: none\">Prior to giving consent, the data subject must be informed of the right to withdraw consent. It must be as easy to withdraw consent as it is to give it.<\/li>\n<li><strong>Right to object to marketing <\/strong>\u2013 Data subjects have the right to object to the processing of personal data for the purpose of direct marketing, including pro\ufb01ling.<\/li>\n<li><strong>Right protecting against solely automated decision-making and profiling<\/strong> \u2013 Data subjects have the right to not be subject to a decision based solely on automated processing (including pro\ufb01ling) that produces legal effects (or similarly signi\ufb01cant effects).<\/li>\n<li style=\"list-style-type: none\">This restriction does not apply if the decision: (i) is necessary for entering into, or performance of, a contract between the data subject and the controller; (ii) is authorised by UK law to which the controller is subject and which also lays down suitable measures to safeguard the data subject\u2019s rights and freedoms and legitimate interests; or (iii) is based on the data subject\u2019s explicit consent.<\/li>\n<li style=\"list-style-type: none\">In the case of (i)\u2013(iii), the controller is required to implement suitable measures to safeguard the data subject\u2019s rights, freedoms and legitimate interests, including at least the right to obtain human intervention on the part of the controller, so that the data subject is able to express their point of view and to contest decisions reached.<\/li>\n<li><strong>Right to complain to the relevant data protection authority(ies) <\/strong>\u2013 Data subjects have the right to lodge complaints concerning the processing of their personal data with the ICO, if the data subject lives in the UK or the alleged infringement occurred in the UK.<\/li>\n<li><strong>Right to basic information<\/strong> \u2013 Data subjects have the right to be provided with information on the identity of the controller, the reasons for processing their personal data and other relevant information necessary to ensure fair and transparent processing of personal data.<\/li>\n<li><strong>Right to compensation<\/strong> \u2013 Data subjects who have suffered (material or non-material) damage as a result of the unlawful processing of their personal data have the right to receive compensation from the relevant controller and\/or processor for the harm suffered.<\/li>\n<\/ul>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">Do the data protection laws in your jurisdiction provide for a private right of action and, if so, under what circumstances?<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>Any person who has suffered material or non-material damage as a result of an infringement of the UK GDPR has the right to receive compensation from the controller or processor for the damage suffered (Article 82 UK GDPR). The ICO notes that \u201c<em>non-material damage<\/em>\u201d includes distress.<\/p>\n<p>Every data subject also has the right to lodge a complaint with the ICO (Article 77 UK GDPR), although the ICO cannot itself award compensation.<\/p>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">Are individuals entitled to monetary damages or compensation if they are affected by breaches of data protection law? Does the law require actual and material damage to have been sustained, or is non-material injury to feelings, emotional distress or similar sufficient for such purposes?<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>As noted in answer to question [28], any person has the right to receive compensation from the controller or processor or damage suffered, whether material (e.g., monetary) or non-material (e.g., distress). However, the UK courts have indicated that not every contravention of applicable data protection laws will confer a right to compensation; there must be damage suffered (see, for example, <em>Lloyd v Google LLC<\/em> [2021] UKSC 50).<\/p>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">How are data protection laws in your jurisdiction typically enforced?<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>The ICO is responsible for enforcement of the UK GDPR and PECR in the UK. The ICO\u2019s enforcement powers include:<\/p>\n<ul style=\"padding-left: 0\">\n<li><strong>Investigative powers <\/strong>\u2013 The ICO has wide powers to order the controller and the processor to provide any information it requires for the performance of its tasks, to conduct investigations in the form of data protection audits, to carry out \u00a0\u00a0\u00a0\u00a0 reviews on certi\ufb01cates issued pursuant to the UK GDPR, to notify the controller or processor of alleged infringements of the UK GDPR, to access all personal data and all information necessary for the performance of controllers\u2019 or processors\u2019 tasks and to access the premises of the data, including any data processing equipment.<\/li>\n<li><strong>Corrective powers<\/strong> \u2013 The ICO has a wide range of powers, including the ability to issue warnings or reprimands for non-compliance, to order the controller to disclose a personal data breach to the data subject, to impose a permanent or temporary ban on processing, to withdraw a certi\ufb01cation and to impose an administrative \ufb01ne (as below).<\/li>\n<li><strong>Authorisation and advisory powers<\/strong> \u2013 The ICO has a wide range of powers to advise the controller, accredit certification bodies and to authorise certificates, contractual clauses, administrative arrangements and BCRs as outlined in the UK GDPR.<\/li>\n<li><strong>Administrative fines<\/strong> \u2013 The UK GDPR provides for administrative \ufb01nes of up to the greater of \u00a317.5 million or 4% of the business\u2019s worldwide annual turnover during the preceding \ufb01nancial year.<\/li>\n<li><strong>Non-cooperation with a data protection authority<\/strong> \u2013 The UK GDPR provides for administrative \ufb01nes of up to the greater of \u00a317.5 million or 4% of the business\u2019s worldwide annual turnover during the preceding \ufb01nancial year.<\/li>\n<\/ul>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">What is the range of sanctions (including fines and penalties) for violation of data protection laws in your jurisdiction?<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>The ICO\u2019s enforcement powers are set out in answer to question [30].<\/p>\n<p>In relation to administrative fines, there is a two-tier system reflecting the severity of the breach (Articles 83(4) and (5) UK GDPR):<\/p>\n<ul style=\"padding-left: 0\">\n<li><strong>Higher-tier fines<\/strong> \u2013 For breaches which are considered more severe, the ICO may impose administrative fines of up to \u00a317.5 million or 4% of the total worldwide annual turnover of the preceding financial year, whichever is higher. Such breaches may include, for example, a failure to comply with data protection principles, data subject rights, or applicable rules regarding international data transfers.<\/li>\n<li><strong>Lower-tier fines<\/strong> \u2013 For breaches which are considered less severe, the ICO may impose administrative fines of up to \u00a38.7 million or 2% of the total worldwide annual turnover of the preceding financial year, whichever is higher. Such breaches may include, for example, a failure to maintain proper records, such as ROPAs and DPIAs.<\/li>\n<\/ul>\n<p>Notably, if a controller or processor infringes several provisions of the UK GDPR in relation to the same or linked processing operations, the total administrative fine shall not exceed the amount specified for the gravest infringement (Article 83(3) UK GDPR).<\/p>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">Are there any guidelines or rules published regarding the calculation of such fines or thresholds for the imposition of sanctions?<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>Administrative fines may be imposed in addition to, or instead of, other corrective measures. When deciding whether to impose an administrative fine, and on the amount of any such fine, the ICO must have regard to certain mandatory factors as set out in Article 83 UK GDPR. These include, for example, the nature, gravity and duration of the infringement taking into account the nature scope or purpose of the processing concerned as well as the number of data subjects affected and the level of damage suffered by them.<\/p>\n<p>The ICO has also published the \u201c<a href=\"https:\/\/ico.org.uk\/about-the-ico\/our-information\/policies-and-procedures\/data-protection-fining-guidance\/\">Data Protection Fining Guidance<\/a>\u201d (2024), which explains that administrative fines will be calculated by applying the following five-step approach:<\/p>\n<ul style=\"padding-left: 0\">\n<li><strong>Step 1<\/strong>: The ICO will assess the seriousness of the infringement.<\/li>\n<li><strong>Step 2<\/strong>: The ICO will account for turnover, where the controller or processor is part of an undertaking.<\/li>\n<li><strong>Step 3<\/strong>: The ICO will calculate the starting point, having regard to the seriousness of the infringement and, where relevant, the turnover of the undertaking.<\/li>\n<li><strong>Step 4<\/strong>: The ICO will make adjustments taking into account any aggravating or mitigating factors.<\/li>\n<li><strong>Step 5<\/strong>: The ICO will assess whether the fine is effective, proportionate and dissuasive.<\/li>\n<\/ul>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">Are enforcement decisions open to  appeal in your jurisdiction? If so, please provide an overview of the appeal options.<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>ICO decisions can be appealed against to the First-tier Tribunal within 28 days after the ICO sends its decision by completing the relevant \u201c<em>General Regulatory Chamber (First-tier Tribunal)<\/em>\u201d form.<\/p>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">Are there any identifiable trends or regulatory priorities in enforcement activity in your jurisdiction?<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>The ICO\u2019s enforcement action over the last 12 months has generally focused on breaches of applicable direct marketing law (i.e., PECR).<\/p>\n<p>The protection of the personal data of children also continues to be a focus of the ICO. As noted above, compliance with the AADC has been required since September 2021. According to the AADC, its purpose is to address how online services should design data protection safeguards to ensure that they are appropriate for use by, and meet the development needs of, children. The AADC goes on to state that businesses that fail to comply with the AADC would likely find it more difficult to demonstrate that their processing is fair and complies with the GDPR and PECR, and would therefore be more likely to face sanctions. On 3 March 2025, the ICO announced that, \u201c<em>as part of<\/em> [the ICO\u2019s] <em>wider interventions into how social media and video sharing platforms use children\u2019s data<\/em>\u201d, it was investigating how certain social media and video sharing platforms use the personal information of 13-17 year olds\u2019 to make recommendations, and how others assess the age of their child UK users.<\/p>\n<p>Finally, and as noted in answer to question [23], the ICO has identified AI (and its application in biometric technologies) as one of its three focus areas for 2024-2025, along with children\u2019s privacy and online tracking.<\/p>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">Do the cybersecurity laws in your jurisdiction require the implementation of specific cybersecurity risk management measures and\/or require that organisations take specific actions relating to cybersecurity? If so, please provide details.<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>The cybersecurity framework in the UK requires the implementation of a broad range of risk management measures. The obligation to implement measures can be explicit (i.e., mandated by cybersecurity legislation) or implicit (i.e., required to ensure best-practice).<\/p>\n<p>The specific measures that need to be implemented by organisations are dependent on a number of factors, including, for example, whether the organisation falls within the scope of either the NIS Regulations or the CA 2003 (as amended by the Security Act), but must generally be <em>appropriate <\/em>and <em>proportionate<\/em> to manage risks posed.<\/p>\n<p><u>NIS Regulations<\/u><\/p>\n<p>For in-scope organisations, the key obligations imposed by the NIS Regulations include:<\/p>\n<ul style=\"padding-left: 0\">\n<li>the requirement for an organisation to notify the fact that it is in-scope for the NIS Regulations to the relevant regulator;<\/li>\n<li>the requirement to implement <em>appropriate<\/em> and <em>proportionate<\/em> measures to manage risks posed to network and information systems and to prevent, and minimise the impact of, incidents affecting the security of the network and information systems; and<\/li>\n<li>the requirement to notify the relevant authority of the occurrence of incidents (including security breaches) which have an impact on the delivery of its services.<\/li>\n<\/ul>\n<p>Organisations subject to these obligations have freedom to determine what measures are <em>appropriate<\/em> and <em>proportionate<\/em>. In order to satisfy this obligation, an organisation must understand the risks posed to its network and information systems. Additionally, operators of essential services must take account of the guidance issued by the National Cyber Security Centre.<\/p>\n<p><u>CA 2003 and the Security Act<\/u><\/p>\n<p><u>CA 2003<\/u><\/p>\n<p>The CA 2003 requires providers of public electronic communications networks (\u201c<strong>PECN<\/strong>\u201d) and public electronic communication services (\u201c<strong>PECS<\/strong>\u201d) to:<\/p>\n<ul style=\"padding-left: 0\">\n<li>take <em>technical<\/em> and <em>organisational<\/em> measures <em>appropriate<\/em> to manage risks to the security of public electronic communications networks and public electronic communications services; and<\/li>\n<li>adopt measures that must, in particular, prevent or minimise the impact of security incidents on end-users.<\/li>\n<\/ul>\n<p>PECNs are additionally required to:<\/p>\n<ul style=\"padding-left: 0\">\n<li>adopt measures to prevent or minimise the impact of security incidents on the interconnection of public electronic communications networks; and<\/li>\n<li>take all appropriate steps to protect, so far as possible, the availability of the PECNs\u2019 network.<\/li>\n<\/ul>\n<p>The CA 2003 affords PECN and PECS providers a degree of freedom to determine the security measures adopted. However, PECN and PECS providers should have regard to the Security Act, Security Regulations, the Code of Practice, and guidance issued by Ofcom (as discussed in more detail below), which provides further specific details on how compliance with the requisite obligations may be achieved.<\/p>\n<p><u>Security Act Requirements<\/u><\/p>\n<p>The Security Act came into force on 1 October 2022. The Security Act amends the CA 2003 by, among other things, introducing strengthened security duties for PECN and PECS providers.<\/p>\n<p>The Security Act requires PECN and PECS providers to implement minimum security requirements. Specifically, the Security Act requires that PECN and PECS providers implement measures as are <em><u>appropriate<\/u><\/em> and <em><u>proportionate<\/u><\/em> for the purposes of:<\/p>\n<ul style=\"padding-left: 0\">\n<li><u>identifying<\/u> the risks of <u>security compromises<\/u> occurring;<\/li>\n<li><u>reducing<\/u> the risks of <u>security compromises<\/u> occurring; and<\/li>\n<li><u>preparing<\/u> for the occurrence of <u>security compromises<\/u>.<\/li>\n<\/ul>\n<p>In addition, on the occurrence of a security compromise, the Security Act requires that PECN and PECS providers take measures as are <u>appropriate<\/u> and <u>proportionate<\/u> in: (i) <u>preventing adverse effects<\/u> arising from the security compromise; and (ii) <u>remedying or mitigating the adverse effects<\/u> that have been caused by a security compromise.<\/p>\n<p>Other obligations imposed on PECN and PECS providers include:<\/p>\n<ul style=\"padding-left: 0\">\n<li>a duty to inform users where there is a significant risk of a security compromise occurring;<\/li>\n<li>a duty to inform Ofcom of any security compromise that has a significant effect on the operation of the network or service and\/or any security compromise that puts a person in a position to bring about further security compromises that would have a significant effect on the operation of the network or service; and<\/li>\n<li>a duty to comply with a designated vendor direction given by the Secretary of State.<\/li>\n<\/ul>\n<p><u>Security Regulations Requirements<\/u><\/p>\n<p>The Security Act is supplemented by the Security Regulations. The Security Regulations were introduced to further the power of the Secretary of State to make such regulations in accordance with changes to the CA 2003 introduced by the Security Act. The Security Regulations came into force on 1 October 2022.<\/p>\n<p>The Security Regulations detail specific security measures that must be implemented by PECN and PECS providers, including the following:<\/p>\n<ul style=\"padding-left: 0\">\n<li>design (and redesign, where appropriate) and construct networks in a manner that reduces the risks of security compromises, and maintain the network in manner which reduces the risk of security compromises occurring;<\/li>\n<li>use such technical means to protect data that relate to the operation of the network and\/or service and to protect functions of the network and\/or service;<\/li>\n<li>implement measures to monitor and analyse access to security critical functions to identify anomalous activity that may involve the risk of a security compromise occurring;<\/li>\n<li>identify and reduce the risks of security compromises occurring as a result of things done or omitted by third party suppliers;<\/li>\n<li>take measures to reduce the risk of security compromises occurring that consist of unauthorised access to the network, including through multi-factor authentication for access to an account capable of making changes to security critical functions and the implementation of a procedure regarding significant or manual changes to security critical functions;<\/li>\n<li>take measures to prepare for the occurrence of security compromises and to enable recovery from security compromises;<\/li>\n<li>provide appropriate and proportionate management of those responsible for taking measures to ensure the security of the network and\/or service in accordance with the provider\u2019s legal obligations, and ensure that those who are responsible are competent and given sufficient resources;<\/li>\n<li>regularly review the security measures implemented, taking into account relevant developments relating to the risks of security compromises occurring;<\/li>\n<li>deploy patches and\/or mitigations that are made available relating to risks of security compromises occurring, and identify the need for security updates and equipment upgrades;<\/li>\n<li>carry out tests in relation to the network and\/or for the purposes of identifying the risks of security compromises occurring. The tests should be carried out without notifying those responsible for identifying and responding to risks of security compromises occurring; and<\/li>\n<li>in certain circumstances, share information about security compromises with other providers and provide assistance.<\/li>\n<\/ul>\n<p><u>Companies Act 2006 (\u201c<strong>CA 06<\/strong>\u201d)<\/u><\/p>\n<p>Although company law in the UK does not impose direct cybersecurity obligations on companies, company directors have a number of legal duties and responsibilities as set out in the CA 06. Two of these duties may be interpreted as requiring company directors to take account of cyber-risks and ensure an adequate level of cybersecurity has been implemented. These duties are: (i) the duty to promote the success of the company; and (ii) the duty to exercise reasonable care, skill and diligence.<\/p>\n<p>In accordance with these duties, directors should inform themselves of the cybersecurity threats facing the company, understand the risk levels, and implement measures to mitigate these risks.<\/p>\n<p><u>ICO Guidance on Cybersecurity<\/u><\/p>\n<p>Organisations in the UK must also take account of the guidance issued by the ICO from time to time relating to cybersecurity. The guidance issued by the ICO on cybersecurity recommends that organisations adopt the following measures relevant to risk-management:<\/p>\n<ul style=\"padding-left: 0\">\n<li>consider obtaining Cyber Essentials certification;<\/li>\n<li>track and record all assets that process personal data;<\/li>\n<li>minimise the opportunity for attacks by minimising available services and controlling connectivity;<\/li>\n<li>implement access controls across systems, networks and software. Also implement physical access controls;<\/li>\n<li>manage end user devices to ensure that organisational controls can be implemented;<\/li>\n<li>use strong passwords and implement multi-factor authentication;<\/li>\n<li>deploy anti-virus and anti-malware products and ensure regular network scanning;<\/li>\n<li>keep software and hardware up-to-date and implement a policy that defines the patch management process, ensuring that priority is given to patches relating to internet-facing services, as well as critical and high risk patches;<\/li>\n<li>use encryption and\/or pseudonymisation where appropriate; \u2013 implement a robust back-up strategy (including use of at least one off-site back-up);<\/li>\n<li>train personnel to recognise cybersecurity threats and how to respond;<\/li>\n<li>implement a process for regularly checking security software messages, access control logs and other reporting systems for suspicious activity;<\/li>\n<li>run regular vulnerability scans, virus and malware scanning, and penetration tests. The results should be recorded together with remediating action plan;<\/li>\n<li>ensure that web services are protected from common security vulnerabilities (e.g., SQL injection and others described in widely-used publications);<\/li>\n<li>implement appropriate policies and procedures addressing cybersecurity and data privacy;<\/li>\n<li>take steps to minimise the volume of data (particularly personal data) being held; and<\/li>\n<li>conduct security audits on IT providers.<\/li>\n<\/ul>\n<p>A failure to adopt these measures without good reason may attract criticism from the ICO in the event of an investigation and exacerbate the level of any fines imposed.<\/p>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">Do the cybersecurity laws in your jurisdiction impose specific requirements regarding supply chain management? If so, please provide details of these requirements.<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>Certain requirements regarding supply chain management do exist pursuant to the UK\u2019s cybersecurity laws. A non-exhaustive list of requirements is set out below.<\/p>\n<p><u>NIS Regulations<\/u><\/p>\n<p>The NIS Regulations impose certain requirements on in-scope entities relevant to supply chain management. In particular:<\/p>\n<ul style=\"padding-left: 0\">\n<li>Operators of essential services must take <em>appropriate <\/em>and <em>proportionate <\/em>technical and organisational measures to manage risks posed to the security of the network and information systems on which their essential service relies; and<\/li>\n<li>Relevant digital service providers must identify and take <em>appropriate <\/em>and <em>proportionate <\/em>measures to manage the risks posed to the security of network and information systems on which they rely to provide, within the UK, the services of: (i) online marketplaces; (ii) online search engines; or (iii) cloud computing services.<\/li>\n<\/ul>\n<p>The National Cyber Security Centre (\u201c<strong>NCSC<\/strong>\u201d) has also published supply chain security guidance, which outlines 12 principles designed to help in-scope entities establish effective control and oversight over their supply chains.<\/p>\n<p><u>PSTI and PSTI Regulations<\/u><\/p>\n<p>The PSTI and PSTI Regulations establish obligations across the supply chain of in-scope actors, focusing on manufacturers, importers, and distributors of in-scope consumer connectable products. For example:<\/p>\n<ul style=\"padding-left: 0\">\n<li><u>Importers<\/u> have duties to not supply products where there is a compliance failure by a manufacturer, and to take action in relation to a manufacturer\u2019s compliance failure; and<\/li>\n<li><u>Distributors<\/u> have duties to take action in relation to a compliance failure by a distributor or manufacturer.<\/li>\n<\/ul>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">Do the cybersecurity laws in your jurisdiction impose information sharing requirements on organisations?<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>Information sharing requirements do exist pursuant to certain UK cybersecurity legislation. For example, the Security Act imposes a duty PECN and PECS providers to inform users where there is a significant risk of a security compromise occurring. The Security Regulations further specify that, in certain circumstances, PECN and PESC providers must share information about security compromises with other providers and provide assistance.<\/p>\n<p>Incident reporting obligations are discussed in answer to question [41].<\/p>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">Do the cybersecurity laws in your jurisdiction require the appointment of a chief information security officer, regulatory point of contact, or other person responsible for cybersecurity? If so, what are their legal responsibilities?<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>UK cybersecurity laws do not specifically mandate the appointment of a chief information security officer or person responsible for cybersecurity. However, various UK cybersecurity laws impose a requirement on in-scope businesses to take \u201c<em>appropriate and proportionate<\/em>\u201d measures to manage cybersecurity related risks, such as NIS, the Security Act, and the Security Regulations. The appointment of a chief information security officer (or similar) may amount to an appropriate and proportionate measure to manage such risks.<\/p>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">Are there specific cybersecurity laws \/ regulations for different industries (e.g., finance, healthcare, government)? If so, please provide an overview.<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>As noted in answer to question [1], the legal framework relating to cybersecurity in the UK spans a number of distinct laws, with specific laws and regulations for different industries. For example, a separate regime monitors compliance for the financial services and government authorities respectively. The following is offered by way of a non-exhaustive overview.<\/p>\n<p><u>Financial Services<\/u><\/p>\n<p>Financial services organisations in the UK are subject to regulation primarily originating from the Financial Services and Markets Act 2000.<\/p>\n<p>Organisations falling within the remit of the Financial Conduct Authority (\u201c<strong>FCA<\/strong>\u201d) or the Prudential Regulatory Authority (\u201c<strong>PRA<\/strong>\u201d) are also subject to specific obligations, as set out in the FCA Handbook and PRA Rulebook. Banks, building societies, credit unions, insurers and certain high-risk investment firms are subject to FCA and\/or PRA oversight.<\/p>\n<p><u>FCA Handbook<\/u><\/p>\n<p>Organisations subject to the FCA Handbook are required to establish and maintain <em>appropriate<\/em> <em>systems<\/em> and <em>controls<\/em> for managing operational risks that can arise from inadequacies or failures in their processes and systems.<\/p>\n<p>In complying with these obligations, an organisation firm should consider:<\/p>\n<ul style=\"padding-left: 0\">\n<li>the importance and complexity of processes and systems used in the end-to-end operating cycle for its products and activities;<\/li>\n<li>controls that will help prevent or identify system and process failures;<\/li>\n<li>whether the design and use of its processes and systems allow it to comply adequately with its regulatory and other requirements;<\/li>\n<li>the arrangements it has to ensure the continuity of its operations in the event that a significant process or system becomes unavailable; and<\/li>\n<li>the importance of monitoring any indicators of process or system risk.<\/li>\n<\/ul>\n<p>In addition to these requirements, organisations should establish and maintain appropriate systems and controls to manage their IT systems and information security risks. Organisations subject to the requirements of the FCA Handbook must also implement measures to address operational resilience requirements.<\/p>\n<p><u>PRA Requirements<\/u><\/p>\n<p>The PRA Rulebook requires that organisations establish, implement and maintain systems and procedures that are adequate to safeguard the security, integrity and confidentiality of information, taking into account the nature of the information in question.<\/p>\n<p>Organisations must have appropriate security mechanisms in place to guarantee the security and authentication of the means of transfer of information, minimise the risk of data corruption and unauthorised access, and maintain the confidentiality of data at all times.<\/p>\n<p><u>Public Authorities<\/u><\/p>\n<p>Public authorities in the UK are subject to many of the same obligations concerning cybersecurity and the protection of personal data as detailed above (including obligations contained in the UK GDPR and the NIS Regulations). In addition, the Official Secrets Act 1989 (\u201c<strong>OSA<\/strong>\u201d) imposes obligations primarily on employees of UK government bodies. The OSA does not impose cybersecurity requirements as such; however, individuals subject to the OSA must take care to prevent the unauthorised disclosure of documents or articles in their possession which are subject to the OSA.<\/p>\n<p>A breach of the OSA is a criminal offence, punishable by fines or imprisonment.<\/p>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">What impact do international cybersecurity standards have on local laws and regulations?<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>International cybersecurity standards often influence UK cybersecurity laws by providing a benchmark for compliance. For example, the NIS Regulations, Security Act, and Security Regulations require businesses to implement <em>appropriate <\/em>and <em>proportionate <\/em>cybersecurity measures. Adhering to international standards and achieving, for example, ISO certification(s) can help organisations demonstrate compliance with such legal obligations.<\/p>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">Do the cybersecurity laws in your jurisdiction impose obligations in the context of  cybersecurity incidents? If so, how do such laws define a cybersecurity incident and under what circumstances must a cybersecurity incident be reported to regulators, impacted individuals, law enforcement, or other persons or entities?<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>The UK\u2019s cybersecurity laws impose various obligations in the context of cybersecurity incidents.<\/p>\n<p>Key definitions include:<\/p>\n<ul style=\"padding-left: 0\">\n<li><strong>NIS Regulations <\/strong>&#8211; An incident means \u201c<em>any event having an actual adverse effect on the security of network and information systems<\/em>\u201d.<\/li>\n<li><strong>NCSC <\/strong>&#8211; The NCSC has defined a \u201c<em>cyber incident<\/em>\u201d as a \u201c<em>breach of a system\u2019s security policy in order to affect its integrity or availability and\/or the unauthorized access or attempted access to a system or systems<\/em>\u201d.<\/li>\n<li><strong>FCA Materiality <\/strong>&#8211; Organisations subject to FCA oversight must report <em>material <\/em>cyber incidents, and an incident is considered \u201c<em>material<\/em>\u201d if, for example, it results in a significant loss of data or loss of availability of a firm\u2019s IT systems, affects a large number of customers, or results in authorised access to information and communication systems.<\/li>\n<\/ul>\n<p><u>NIS Regulations<\/u><\/p>\n<p>One of the NIS Regulations\u2019 key obligations is the requirement to notify the relevant authority of the occurrence of incidents (including security breaches) which have had an impact on the delivery of its services.<\/p>\n<p>If an operator of an essential service or a digital service provider suffers an incident which has a significant impact on, respectively, the continuity of the essential service, or the provision of the digital service, it must notify the relevant authority without undue delay and in any event no later than 72 hours after becoming aware of the incident.<\/p>\n<p>Factors that must be considered include the number of users affected, the duration of the incident, the geographical spread, the extent of the disruption and the extent of the incident\u2019s impact. When considering these factors, in-scope organisations are not required to collect additional information to which they do not have access.<\/p>\n<p>If reportable, the organisation notifying must provide the following information:<\/p>\n<ul style=\"padding-left: 0\">\n<li>its name and the essential service or digital service it provides;<\/li>\n<li>the time that the incident occurred;<\/li>\n<li>the duration of the incident;<\/li>\n<li>information concerning the nature and impact of the incident;<\/li>\n<li>information concerning any, or any likely, cross-border impact of the incident; and<\/li>\n<li>any other information that may be helpful to the relevant authority.<\/li>\n<\/ul>\n<p><u>Directors Duties<\/u><\/p>\n<p>In line with a directors duty to promote the success of the company, and to exercise reasonable care, skill, and diligence (CA 06), in response to the occurrence of a cybersecurity incident organisations should:<\/p>\n<ul style=\"padding-left: 0\">\n<li>execute the applicable breach response policy and procedures;<\/li>\n<li>consider what, if any, notifications to regulators or other persons must be made;<\/li>\n<li>address the incident and takes steps to mitigate the damage caused;<\/li>\n<li>report the incident to the relevant authorities;<\/li>\n<li>report the incident to any relevant insurance providers; and<\/li>\n<li>investigate the incident and maintain a record of the incident and investigation.<\/li>\n<\/ul>\n<p>Where relevant, organisations should also consider whether the cybersecurity incidents need to be disclosed in annual reports or to the market if the cybersecurity incident is considered \u201cinsider information\u201d.<\/p>\n<p>In addition, if a company is preparing a prospectus as part of the process for raising equity or debt on the market there is a requirement to describe relevant risks. A company that has suffered cybersecurity incidents should consider whether to disclose this in its prospectus.<\/p>\n<p><u>CMA<\/u><\/p>\n<p>Upon the discovery of any cybersecurity incidents or breaches of the CMA 1990, organisations should take steps to preserve all relevant records relating to such incidents and report to the relevant authorities as soon as possible.<\/p>\n<p>A notification to the police for a suspected CMA 1990 offence might also require a notification to the ICO (or other regulators) if the incident is also a relevant incident for the purposes of the DPA,\u00a0 NIS Regulations, Security Act, PECR or Financial Conduct Authority Handbook\/Prudential Regulatory Authority Rulebook.<\/p>\n<p><u>FCA Notification<\/u><\/p>\n<p>Organisations subject to FCA oversight must report <em>material<\/em> cyber incidents. As explained above, an incident is considered material if, for example, it results in a significant loss of data or loss of availability of a firm\u2019s IT systems, affects a large number of customers, or results in authorised access to information and communication systems.<\/p>\n<p><u>PRA Notification<\/u><\/p>\n<p>Organisations subject to the PRA Rulebook are also subject to general notifications requirements.<\/p>\n<p>Organisations must notify the PRA if they become aware, or have information which reasonably suggests that, any matter which could have a <em>significant adverse impact<\/em> on the firm\u2019s reputation or affect the organisation\u2019s ability to continue to provide adequate services to its customers has occurred, may have occurred, or may occur in the foreseeable future. A data breach or other cybersecurity incident of a material nature is likely to trigger this general requirement to notify the PRA.<\/p>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">How are cybersecurity laws in your jurisdiction typically enforced?<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>In the UK, cybersecurity law is enforced as a matter of civil and criminal law.<\/p>\n<p>The authority responsible for enforcement varies depending on the relevant legislation and sector in which businesses operate. By way of example:<\/p>\n<ul style=\"padding-left: 0\">\n<li><strong>Ofcom <\/strong>\u2013 Ofcom is also responsible for overseeing compliance with the CA 2003 and the Security Act, and the relevant requirements on security (including cybersecurity) of telecommunications service providers.<\/li>\n<li><strong>OPSS<\/strong> \u2013 The OPSS is responsible for overseeing compliance with the PSTI 2022 and PSTI Regulations.<\/li>\n<li><strong>NIS Regulations<\/strong> &#8211; The NIS Regulations are enforced by a variety of competent authorities which vary according to the sectors in which the relevant in-scope entity operates.<\/li>\n<li><strong>PSTI 2022 and PSTI Security Regulations<\/strong> &#8211; The Secretary of State is empowered to enforce the PSTI 2022 and PSTI Security Regulations (although the Secretary of State may also delegate its enforcement powers).<\/li>\n<li><strong>FCA <\/strong>&#8211; The FCA may take enforcement action against organisations in breach of its \u201cPrinciples for Business\u201d, which includes a general requirement for in-scope organisations to disclose things to the FCA that the regulator would reasonably expect to be notified about.<\/li>\n<\/ul>\n<p>Typically, authorities responsible for enforcement will engage with the relevant in-scope entity before commencing enforcement action.<\/p>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">What powers of oversight \/ inspection \/ audit do regulators have in your jurisdiction under cybersecurity laws.<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>Regulators are given wide-reaching powers to ensure compliance with cybersecurity laws in the UK. By way of example, the NIS Regulations allow: (i) competent authorities to conduct inspections to assess if the an in-scope organisation has met its obligations under the NIS Regulations; and (ii) provides the ICO with the power to inspect relevant organisations (i.e., those that provide online search engines, online marketplaces and cloud computing services), to assess whether they are meeting cybersecurity obligations.<\/p>\n<p>The ICO is able to inspect in-scope organisations themselves, appoint a third party to complete an inspection, or require the organisation to appoint a third party, and providers of in-scope online services must take steps to assist with any such inspection (which can include paying for \u2018reasonable costs\u2019 of the inspection, co-operating with the inspectors, and allowing the inspectors access to documents and information that may be relevant). Failure to take these steps can lead to the ICO imposing a penalty.<\/p>\n<p>Such inspections will include reviews of personal data and associated logs and audit trails, and are likely to include a review of both manually and electronically stored data. The ICO will use the data obtained in the inspection to evaluate how the relevant organisation maintains systems to protect data and prevent cybersecurity breaches.<\/p>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">What is the range of sanctions (including fines and penalties) for violations of cybersecurity laws in your jurisdiction?<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>Regulators are given wide-reaching powers to ensure compliance with cybersecurity laws in the UK. The following is provided is a non-exhaustive overview,<\/p>\n<p><u>NIS Regulations <\/u><\/p>\n<p>The NIS Regulations allow competent authorities to:<\/p>\n<ul style=\"padding-left: 0\">\n<li>impose significant fines on organisations for non-compliance (the level of the applicable fine will be determined with reference to the nature of the non-compliance, and fines can reach a maximum of \u00a317 million);<\/li>\n<li>conduct inspections to assess if the an in-scope organisation has met its obligations under the NIS Regulations;<\/li>\n<li>serve information notices to require an organisation to provide information to enable the regulator to assess the organisation\u2019s compliance with the NIS Regulations; and<\/li>\n<li>serve enforcement notices which set out the steps that the organisation must take to rectify identified failures by the organisation.<\/li>\n<\/ul>\n<p>Penalties issued under the NIS Regulations must be appropriate and proportionate to the failure. Penalty notices are reserved for the most serious breaches, for example, when there has been \u201c<em>willful, deliberate or negligent acts, or repeated breaches of information rights obligations<\/em>\u201d that cause \u201c<em>harm or damage to individuals<\/em>\u201d.<\/p>\n<p><u>PSTI and PSTI Regulations <\/u><\/p>\n<p>Similarly, under the PSTI and PSTI Security Regulations the Secretary of State (or a recipient of the Secretary of State\u2019s powers) can:<\/p>\n<ul style=\"padding-left: 0\">\n<li>issue compliance notices where there are reasonable grounds to believe that a person has failed to comply with their obligations under PSTI 2022 or the PSTI Security Regulations;<\/li>\n<li>issue a stop notice where there are reasonable grounds to believe that a person is carrying on, or is likely to carry on, an activity in violation of PSTI 2022 or the PSTI Security Regulations; or<\/li>\n<li>issue a recall notice where the Secretary of State: (i) has reasonable grounds to believe that there is a compliance failure in relation to any UK consumer connectable products that have been supplied to customers; (ii) considers that the action (if any) being taken by any relevant person in relation to the compliance failure is inadequate; and (iii) considers that any other action which they may take would not be sufficient to deal with the risks posed by the compliance failure.<\/li>\n<\/ul>\n<p>If the Secretary of State is satisfied (on the balance of probabilities) that there has been a failure to comply with the requirements of PSTI 2022 and the PSTI Security Regulations, a monetary penalty notice may be issued (up to a maximum of the greater of \u00a310 million or 4% or worldwide revenue).<\/p>\n<p><u>The Security Act <\/u><\/p>\n<p>The maximum penalties for non-compliance with an obligation set forth in the Security Act are fines of up to \u00a3100,000 per day or 10% of turnover.<\/p>\n<p>PECN and PECS providers that violate their obligations under the Security Act are also exposed to civil liability. The Security Act explicitly provides that the obligations on PECN and PECS providers with respect to security of the PECN and PECS are owed to every person who may be affected by a violation of such obligations. Where a breach of an obligation set out in the Security Act causes a person to sustain loss or damage, this is actionable as a civil claim. The level of the applicable fine will be determined with reference to the nature of the non-compliance.<\/p>\n<p><u>CMA 1990<\/u><\/p>\n<p>A person guilty of an offence under the CMA 1990 may be subject to a fine or imprisonment. The level of the fine or the length of the sentence will vary according to the offence and its severity. For the most serious offences, it is possible to be imprisoned for life.<\/p>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">Are there any guidelines or rules published regarding the calculation of such fines or thresholds for the imposition of sanctions?<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>Yes, penalty fines are calculated with reference to a number of guidelines. Thresholds are also contained within the provisions of many relevant pieces of legislation.<\/p>\n<p>For example:<\/p>\n<ul style=\"padding-left: 0\">\n<li><strong>NIS Regulations<\/strong> &#8211; Penalty fines issued under the regime established by the NIS Regulations are calculated with reference to the provisions of Regulation 18.<\/li>\n<li style=\"list-style-type: none\">As outlined in Regulation 18, the amount of penalty fine will depend on whether the organisation\u2019s breach is judged to be \u201cmaterial\u201d, and the NIS Regulations define a \u201cmaterial contravention\u201d as one that indicates a failure to take (or to adequately take) one or more steps required under an enforcement notice within the period specified in the notice, or if no enforcement notice was served, one of the failures outlined in Regulation 17 (1).\n<ul style=\"padding-left: 5\">\n<li>If the enforcement authority determines that contravention was not material, the fine cannot exceed \u00a31 million.<\/li>\n<li>If the enforcement authority determines that the contravention is material the fine cannot exceed \u00a38.5 million.<\/li>\n<li>However, if the contravention is judged as being material, and something that could have created significant risk to, or significant impact on, or in relation to, the service provision by the operator of an essential service or a relevant digital service provider, the fine can be as much as \u00a317 million.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Ofcom <\/strong>&#8211; As discussed in question [1], Ofcom is the authority responsible for issuing penalty fines for organisations who fail to comply with obligations set forth in the Security Act. The maximum penalties are fines of up to \u00a3100,000 per day of 10% of turnover.<\/li>\n<\/ul>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">Are enforcement decisions open to appeal in your jurisdiction? If so, please provide an overview of the appeal options.<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>Enforcement decisions in the UK are open to appeal, although the precise mechanism for appealing will vary between legislation. For example:<\/p>\n<ul style=\"padding-left: 0\">\n<li><strong>NIS Regulations <\/strong>&#8211; Appeals against decisions made by a competent authority under the NIS Regulations can be made to the First-tier Tribunal.<\/li>\n<li><strong>Communications Act<\/strong> &#8211; Appeals against decisions made by Ofcom or the Secretary of State under certain provisions of the Communications Act can be made to the Competition Appeal Tribunal.<\/li>\n<li><strong>PSTI <\/strong>&#8211; Appeals against enforcement notices made by the Secretary of State under the PSTI and PSTI Regulations can be made to the First-tier Tribunal.<\/li>\n<\/ul>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\t\t\t\t\t<li class=\"question-block filter-container__element\">\r\n\t\t\t\t\t\t<h3 class=\"filter-container__match-html\">Are there any identifiable trends or regulatory priorities in enforcement activity in your jurisdiction?<\/h3>\r\n\t\t\t\t\t\t<button id=\"show-me\">+<\/button>\r\n\t\t\t\t\t\t<div class=\"question_answer filter-container__match-html\" style=\"display:none;\"><p>The ICO has shown a willingness to bring enforcement action against organisations that fail to fully implement appropriate cybersecurity measures. Particular attention appears to be being paid to organisations who operate in the healthcare sector, or support other essential public services.\u00a0 In this context, ransomware attacks continue to generate significant enforcement interest.<\/p>\n<\/div>\r\n\r\n\r\n\t\t\t\t\t<\/li>\r\n\r\n\t\t\t\t\r\n<div class=\"word-count-hidden\" style=\"display:none;\">Estimated word count: <span class=\"word-count\">17833<\/span><\/div>\r\n\r\n\t\t\t<\/ol>\r\n\r\n<script type=\"text\/javascript\" src=\"\/wp-content\/themes\/twentyseventeen\/src\/jquery\/components\/filter-guides.js\" async><\/script><\/div>"}},"_links":{"self":[{"href":"https:\/\/my.legal500.com\/guides\/wp-json\/wp\/v2\/comparative_guide\/103988","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/my.legal500.com\/guides\/wp-json\/wp\/v2\/comparative_guide"}],"about":[{"href":"https:\/\/my.legal500.com\/guides\/wp-json\/wp\/v2\/types\/comparative_guide"}],"wp:attachment":[{"href":"https:\/\/my.legal500.com\/guides\/wp-json\/wp\/v2\/media?parent=103988"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}