There is increasing hype about Artificial Intelligence (AI) and machine learning progressively being integrated into more domains of our personal, social and professional life; dating applications “choose” the “right” match, ...
Across the globe, countless government, private and third sector organisations are working to promote and sustain the security of vulnerable populations. During acute or protracted crises, the protection of individuals ...
Contemporary terrorist and criminal organizations increasingly exploit the Internet to spread their message and gain support throughout the world, using the Web as a communication tool, in particular for recruitment ...
A recent editorial (March 2019) and article (Jan 2019) in the British Medical Journal have focused on how medical mobile apps, currently a booming market, routinely share users’ data. Given the purpose ...
When a disaster occurs, functioning interoperability could mean the difference between life and death, particularly when there is a need for international or cross border responses; for example when responding ...
Trilateral’s Data Science team has built interactive cloud-based dashboards to bring data-driven insights into modern slavery risk assessments. Trilateral Research is working in conjunction with the UK’s Ministry of Defence ...
Many organisations have already recognised the need to appoint specialist personnel to ensure they are meeting their obligations in relation to the protection of personal data. For example, the General ...
Map the data flows within your organisation to better understand how personal information flows between departments
Data Protection Impact Assessments
Where required by the GDPR or national law, conduct or review DPIAs using our library of good practices
Article reference: 35
Consent and Privacy Notice Requirements
Revise and improve consent and privacy notices to meet transparency and accoutnability requirements
Identify gaps in your organisation's compliance with the GDPR, national data protection legislation or sectoral legislation
Data Protection Audit
Audit your organisation's activities to assess your compliance with applicable data protection law
Data Protection-by-design and -default
Work with your technical and admin teams to operationalise Data Protection-by-design and -default, using established good practice
Article reference: 25
We offer general, role-based (e.g., HR) and activity based (e.g., DPIA) training. All our training materials are designed to be accessible to non-experts and easy to use
General compliance support
Support for creating required documentation, including, but not limited to Records of Processing activities, Data retention (and deletion) schedules, Personal Data Breach procedures, Subject Access Request procedures, Training materials, Legitimate Interest Assessments, etc.)